当前位置:网站首页>I plan to take part in security work. How about information security engineers and how to prepare for the soft exam?
I plan to take part in security work. How about information security engineers and how to prepare for the soft exam?
2022-07-07 10:36:00 【qq123yyy】
Information security engineer is an intermediate subject in the soft exam , Only two subjects are needed . Information security engineer is a new exam in recent years , Belong to “ The information system ” major .
The intermediate information security engineer of the soft exam takes two subjects :
Morning subject 1 : Basic knowledge of information security ,150 minute , written examination 75 Multiple choice questions
Afternoon subject 2 : Information security application technology ,150 minute , written examination 5/6 Questions and answers
Post requirements :
- Proficient in network security technology : Including ports 、 Service Vulnerability Scanning 、 Program vulnerability analysis and detection 、 Rights management 、 Intrusion and attack analysis tracking 、 Website penetration 、 Virus and Trojan horse prevention, etc .
- be familiar with tcp/ip agreement , be familiar with sql Injection principle and manual detection 、 Familiar with the principle of memory buffer overflow and preventive measures 、 Familiar with information storage and transmission security 、 Familiar with packet structure 、 be familiar with ddos There are some differences in attack types and principles ddos Attack and defense experience , be familiar with iis Security Settings 、 be familiar with ipsec、 Group policy and other system security settings .
- be familiar with windows or linux System , Master php/shell/perl/python/c/c++ Wait for at least one language ; Be responsible for discovering and verifying the security vulnerabilities of the company's information system , Provide technical support , Promote vulnerability repair .
How to prepare for exams efficiently :
Information security engineer examination requirements , Is more technical , So the difficulty is certain . The basic knowledge must be thoroughly mastered 、 Full understanding . Applied technology is to examine the ability to apply knowledge and the ability to analyze topics at the first level , So preparing for the exam requires more time to study .
Refer to the official tutorial 《 Information Security Engineer tutorial 》, The true theme of the past years ( Including resolution ), Video Course
- The first stage is mainly to understand the examination situation , On the examination form 、 You need to have a clear understanding of the exam requirements , And have a clear understanding of the distribution of examination sites over the years , Be able to sort out the core test site content .
- The second stage , It is also the core of the learning stage of information security engineers . Learn the course of information security engineer to lay a solid foundation , Understand and master the important contents of the information security engineer exam , We should not only know what it is, but also know why .
Have a holistic concept , You can't cut them apart . Laws and regulations 、 security management 、 Safety technology 、 Case studies are actually It's a whole , An information security engineer should know and know 、 Theory and knowledge that should be mastered .
- The third stage , Connect the knowledge of information security engineers , Have a more systematic understanding . Through a period of knowledge exercises to strengthen training , Form a more reasonable way to solve problems .
- The fourth stage , Brush the question sprint stage ( Consolidate knowledge -- Brush problem -- Leak filling — summary ) Knowledge points for information security engineers 、 The whole framework system is clear in my heart .
Basic knowledge of information security ( Morning questions )
Information security application technology ( Afternoon question )
Exam notes :
- 1. Admission ticket Print :A4 Paper printing , Black and white ; Try to print on one page , It is recommended to use UC Browser printing , Remove header and footer ; Or print at a nearby printing shop .
- 2. Essential tools : Admission ticket 、 Original ID card 、 For examination 2B The pencil 、 Eraser 、 Black neutral pen ;
- ( Prepare a transparent file bag , Put the certificate into the bag in advance , Avoid the entrance invigilator taking out his certificate in a hurry and losing it .) 3. Bar code The invigilator will distribute it uniformly before the exam .
- 4. Check the bus route in advance , Please advance 30 Arrive at the examination room in about minutes , Don't be late for the exam . If the distance is too far, it is recommended to book a hotel in advance , So as not to delay the exam .
- 5. Please read carefully the instructions for candidates on the admission ticket , The items required for the exam are all explained .
- 6. If you encounter any problems in the exam, please raise your hand in time to signal the invigilator .
- 7. Keep a good attitude when approaching the exam , Win in stability ~
- 8. Remember to set the alarm clock the day before the exam , Get enough sleep , relax ~
- 9. Please turn your mobile phone off after the exam / Mute state .
- 10. Try to drink less before the exam , You can prepare some chocolate 、 Mineral water , Long exam time , Replenish energy at critical moments .
边栏推荐
- Study summary of postgraduate entrance examination in July
- IDA中常见快捷键
- leetcode-304:二维区域和检索 - 矩阵不可变
- 基于HPC场景的集群任务调度系统LSF/SGE/Slurm/PBS
- JMeter loop controller and CSV data file settings are used together
- 0x0fa23729 (vcruntime140d.dll) (in classes and objects - encapsulation.Exe) exception thrown (resolved)
- Schnuka: machine vision positioning technology machine vision positioning principle
- CC2530 ZigBee iar8.10.1 environment construction
- Find the greatest common divisor and the least common multiple (C language)
- [dai6] mirror image of JZ27 binary tree
猜你喜欢
leetcode-304:二维区域和检索 - 矩阵不可变
555电路详解
Using U2 net deep network to realize -- certificate photo generation program
简单易修改的弹框组件
Cluster task scheduling system lsf/sge/slurm/pbs based on HPC scenario
555 circuit details
leetcode-560:和为 K 的子数组
中级软件评测师考什么
[STM32] solution to the problem that SWD cannot recognize devices after STM32 burning program
高级软考(网络规划设计师)该如何备考?
随机推荐
嵌入式工程师如何提高工作效率
Kotlin realizes wechat interface switching (fragment exercise)
Study summary of postgraduate entrance examination in July
Remote meter reading, switching on and off operation command
BigDecimal value comparison
P1223 queuing for water /1319: [example 6.1] queuing for water
openinstall与虎扑达成合作,挖掘体育文化产业数据价值
Several schemes of building hardware communication technology of Internet of things
[daiy5] jz77 print binary tree in zigzag order
Some superficial understanding of word2vec
Find the root of equation ax^2+bx+c=0 (C language)
Pre knowledge reserve of TS type gymnastics to become an excellent TS gymnastics master
BUUCTF---Reverse---reverse1
Some properties of leetcode139 Yang Hui triangle
HDU-2196 树形DP学习笔记
P2788 数学1(math1)- 加减算式
[higherhrnet] higherhrnet detailed heat map regression code of higherhrnet
[dai6] mirror image of JZ27 binary tree
JMeter loop controller and CSV data file settings are used together
When there are pointer variable members in the custom type, the return value and parameters of the assignment operator overload must be reference types