Information security and management practitioners include civil servants, software testers, public institutions, police, network and information security engineers, IT technical support, maintenance engineers, military personnel, software engineers and so on.
1, information security major: after graduation, students can engage in the research, design, development and management of various information security systems and computer security systems in government agencies, national security departments, banks, finance, securities, communications and other departments, and can also engage in computer applications in the IT field.
2. Industry: After graduation, I mainly engaged in new energy, Internet, e-commerce, computer software, real estate, trade, import and export and other industries.
3. Position: After graduation, I mainly work as a project manager, network engineer, network administrator, sales manager and administrative assistant.
4. National route: government agencies, security bureaus, military departments of the Ministry of National Defense, relevant national security departments, banks, financial securities and telecommunications, mainly engaged in the security protection of various information security systems and computer security systems.
5.IT-related, Internet companies and large enterprises: game security posts and game protection mechanisms of game companies; 360, Jinshan, Rising and other virus analysis positions of killing soft companies; Information security departments of large Internet companies such as BAT; Software vulnerability mining in security companies.
Introduction to information technology
Internet technology refers to information technology developed and established on the basis of computer technology. Internet technology connects different devices through the wide area network of computer network, which speeds up the transmission of information, broadens the access channels of information, promotes the development of various software applications and changes people's life and learning methods. The universal application of Internet technology is a sign of entering the information society.
Internet technology has three meanings, namely hardware, software and application:
1, the first layer is hardware, which mainly refers to the host computer and network communication equipment used for data storage, processing and transmission;
2. The second layer refers to software, including all kinds of software that can be used to collect, store, retrieve, analyze, apply and evaluate information. Including ERP (enterprise resource planning), CRM (customer relationship management), SCM (supply chain management) and other business management software, as well as WF (workflow) management software to strengthen process management and DW/DM (data warehouse) to assist analysis.
3. The third layer refers to the application, which refers to the collection, storage, retrieval, analysis, application, evaluation and use of all kinds of information, including the application of ERP, CRM, SCM and other software to directly assist decision-making, and the use of other decision-making analysis models or DW/DM and other technical means to further improve the analysis quality and assist decision-makers to make decisions (to emphasize one point, it only assists rather than replaces people's decisions).