homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. How to Get Started in Cyber Security with a Non-Technical Background
370x370_Lance-Spitzner.jpg
Lance Spitzner

How to Get Started in Cyber Security with a Non-Technical Background

As organizations and governments around the world are increasingly vulnerable to cyber threats and continue to get hacked, it might feel like we’re...

September 7, 2022

*This blog was originally published in March 2018 and last updated in September 2022.

As organizations and governments around the world are increasingly vulnerable to cyber threats and continue to get hacked, there's a growing demand for people to be trained in cybersecurity to help defend against this increasing threat. Cybersecurity is a fast-paced, highly dynamic field with a vast array of specialties to choose from, allowing you to work almost anywhere in the world, with amazing benefits, and an opportunity to make a real difference. Have you considered a career as a cybersecurity professional, but weren’t really sure if you had the background needed for success? Don’t sell yourself short! Here's how to get into cyber security.

But Don’t I Need a Cybersecurity or Computer Science Degree?

Absolutely not. Many of the best security professionals I know have non-technical degrees such as English, pre-Med, or Psychology majors or even backgrounds in fields such as auto-mechanics, graphic designers, or stay-at-home moms. Just like the famous saying, “Anyone can cook” from the Pixar movie, Ratatouille, so too can anyone get started in cybersecurity. Speaking as a history major who rode main battle tanks for a living, you can have a successful career in cybersecurity, even if you bring a non-technical background to the table. In many cases, having a non-technical background can actually be an advantage in cybersecurity as you bring unique experiences and perspectives that we need.

Many people think cybersecurity is all about hacking into or breaking things, but cybersecurity is really learning about and helping protect how both technology and people work. The key to your success is not a technical background, but your willingness and desire to learn how technology works and to never stop playing. In addition, there are a growing number of fields in cybersecurity that do not focus on solving technical problems, but instead on human problems. These require softer skills, such as policy development, security awareness, and training, governance, security communications, privacy or cyber law, and ethics.

Getting Your Career Started in Cybersecurity

In many ways, cybersecurity is similar to engineering or healthcare. There are so many different paths you can specialize in, from mobile device forensics and incident response to penetration testing, endpoint security, secure software development or security awareness. In fact, the National Institute of Standards and Technology (NIST) has created a framework listing all the different jobs and opportunities in cybersecurity. If you are interested in learning about many of the different fields and specialties that exist, this is a great place to start exploring.

Don’t worry about what path you should take at first. Give yourself time to play with and understand the different technologies and fields. Over time, your interests will guide your path. (Interject Yoda voice here.) To get started, I’d recommend you first get an overview of the basics.

    • Coding: Explore the basics of coding. Coding is what software programmers (often called developers) do. They create the operating systems and applications that run your computers, mobile devices, and web applications that power the Internet. Perhaps start first with simpler languages such as Python, Hypertext Markup Language (HTML), or Javascript. If you discover that you enjoy coding you can then move on to more advanced coding languages and frameworks. Not sure where to start? Consider online training such as Code Academy or grab any beginner’s coding book. All you need is a computer and some guidance and you can start coding right away.
    • Systems: Learn the basics of administrating the operating systems that run the computers (called servers) that support and run organizations and the Internet. The two most common operating systems are Linux and Windows. If the resources are available, I recommend you start with Linux first and learn how to administer Linux using the Command Line Interface (CLI), as opposed to the Graphical User Interface (GUI). Learning how to administer a Linux system from the command line, to include scripting, is an extremely powerful skill that will help you no matter what path you take. It's also easier to change from Linux to Windows than the other way around
    • Applications: Applications are programs that run on servers, these are what provide the services organizations need to function. For example, applications like file servers, DNS servers, mail servers or web servers. Your job is to see if you can install, set up, and configure such applications to function properly.
    • Networking: A network is a group of computers or devices that communicate with each other. Learning how a network works is an invaluable skill, to include configuring them to interconnect with each other and the Internet. Other skills include capturing and analyzing network traffic. You don’t realize it, but you most likely already have a network at home. Think of all the devices connected to your home Wi-Fi network.

    Not sure where to start learning with any of the four areas listed? Start by searching on Google or YouTube. There is no single site or resource where you can learn everything you need, so over time you will use a variety of different resources. Start with the basics and grow over time (it takes years to really learn all this stuff). In addition, the skills you develop now in searching and learning about these topics are critical not only for starting your career but a key part of your entire career.


    Build a Lab / Hands-on Learning Environment

    il_cybersecurity-career-lab.png

    One of the best ways to learn all of the above is to set up your own lab at home. A lab is a collection of computers and applications that you can experiment and learn, a safe environment to make mistakes. Make all the mistakes you want, then simply reboot or reinstall the systems and start all over again. It's relatively simple to create your own home lab, as you can create multiple virtual operating systems on the same physical computer at home, or setup up a lab online in the Cloud, such as using Amazon's AWS or Microsoft’s Azure. Not sure where to start? Once again do a quick search on Google or YouTube. There are numerous sites that can walk you through how to set up your lab properly. Don’t worry about the best way to start, just start.

    Another option is to identify all the different devices on your home Wi-Fi network. Once you set up your lab or map your home network, start interacting with all the different computers or devices on your home network and learn everything you can. Have a browser on one computer connect to a webserver you set up on another computer. Capture the network traffic from your house’s thermostat and decode what information you are actually sending to the Internet. The possibilities are endless. However, don't start hacking into and breaking things until you first understand the fundamentals of how these technologies work.

    Learn from Others in Cybersecurity

    The other key element toward launching your career in cybersecurity is to meet with and learn from others. Try attending a cybersecurity conference in your area. Just about every major city has several events a year. One of the best series of conferences is Bsides, which most likely has an event near you.

    Can’t make it to a conference or looking for more interaction? Many cities have monthly cybersecurity community meet-ups. Once you attend one, your network and opportunities will flourish. You can also join online cybersecurity or technology communities, there are even communities that serve special demographics, such as Women in Cyber.

    In addition, there are numerous cybersecurity professionals you can follow online and learn from. As you begin to learn what areas interest you the most, you will find experts in that field you can follow. Here are some thought leaders I follow on Twitter, for example:

    • @briankrebs
    • @schneierblog
    • @lennyzeltser
    • @robertMLee
    • @hacks4pancakes

    Cybersecurity Programs

    Undergraduate certificate programs like the Certificate in Applied Cybersecurity at the SANS Technology Institute offer a rapid pathway for college students and career changers who want to enter the cybersecurity workforce. No prior cybersecurity experience is required for that program and students gain the foundational skills needed to enter the workforce in 7 to 18 months, studying online or at live weeklong SANS events held across the country and around the world.

    College students have free programs designed specifically for their needs as well. At Cyber-Fasttrack, you all compete in a two-day Capture-the-Flag event for the chance to win a scholarship worth $18,000 from the world’s largest and most trusted cybersecurity college.

    In Summary

    If you’ve been curious about getting started in cybersecurity, don’t let your education or background determine your career path or limit your options. No matter what your background is, you bring something unique and special to this field, which we desperately need. As long as you have passion, and desire to learn and help others, you’re on the right track. Never lose that desire to learn. Once you start to develop your skills and you begin to develop a network of people, trust me, the opportunities will come.


    Share:
    TwitterLinkedInFacebook
    Copy url Url was copied to clipboard
    Subscribe to SANS Newsletters
    Receive curated news, vulnerabilities, & security awareness tips
    United States
    Canada
    United Kingdom
    Spain
    Belgium
    Denmark
    Norway
    Netherlands
    Australia
    India
    Japan
    Singapore
    Afghanistan
    Aland Islands
    Albania
    Algeria
    American Samoa
    Andorra
    Angola
    Anguilla
    Antarctica
    Antigua and Barbuda
    Argentina
    Armenia
    Aruba
    Austria
    Azerbaijan
    Bahamas
    Bahrain
    Bangladesh
    Barbados
    Belarus
    Belize
    Benin
    Bermuda
    Bhutan
    Bolivia
    Bonaire, Sint Eustatius, and Saba
    Bosnia And Herzegovina
    Botswana
    Bouvet Island
    Brazil
    British Indian Ocean Territory
    Brunei Darussalam
    Bulgaria
    Burkina Faso
    Burundi
    Cambodia
    Cameroon
    Cape Verde
    Cayman Islands
    Central African Republic
    Chad
    Chile
    China
    Christmas Island
    Cocos (Keeling) Islands
    Colombia
    Comoros
    Cook Islands
    Costa Rica
    Cote D'ivoire
    Croatia (Local Name: Hrvatska)
    Curacao
    Cyprus
    Czech Republic
    Democratic Republic of the Congo
    Djibouti
    Dominica
    Dominican Republic
    East Timor
    Ecuador
    Egypt
    El Salvador
    Equatorial Guinea
    Eritrea
    Estonia
    Eswatini
    Ethiopia
    Falkland Islands (Malvinas)
    Faroe Islands
    Fiji
    Finland
    France
    French Guiana
    French Polynesia
    French Southern Territories
    Gabon
    Gambia
    Georgia
    Germany
    Ghana
    Gibraltar
    Greece
    Greenland
    Grenada
    Guadeloupe
    Guam
    Guatemala
    Guernsey
    Guinea
    Guinea-Bissau
    Guyana
    Haiti
    Heard And McDonald Islands
    Honduras
    Hong Kong
    Hungary
    Iceland
    Indonesia
    Iraq
    Ireland
    Isle of Man
    Israel
    Italy
    Jamaica
    Jersey
    Jordan
    Kazakhstan
    Kenya
    Kiribati
    Korea, Republic Of
    Kosovo
    Kuwait
    Kyrgyzstan
    Lao People's Democratic Republic
    Latvia
    Lebanon
    Lesotho
    Liberia
    Liechtenstein
    Lithuania
    Luxembourg
    Macau
    Madagascar
    Malawi
    Malaysia
    Maldives
    Mali
    Malta
    Marshall Islands
    Martinique
    Mauritania
    Mauritius
    Mayotte
    Mexico
    Micronesia, Federated States Of
    Moldova, Republic Of
    Monaco
    Mongolia
    Montenegro
    Montserrat
    Morocco
    Mozambique
    Myanmar
    Namibia
    Nauru
    Nepal
    Netherlands Antilles
    New Caledonia
    New Zealand
    Nicaragua
    Niger
    Nigeria
    Niue
    Norfolk Island
    North Macedonia
    Northern Mariana Islands
    Oman
    Pakistan
    Palau
    Palestine
    Panama
    Papua New Guinea
    Paraguay
    Peru
    Philippines
    Pitcairn
    Poland
    Portugal
    Puerto Rico
    Qatar
    Reunion
    Romania
    Russian Federation
    Rwanda
    Saint Bartholemy
    Saint Kitts And Nevis
    Saint Lucia
    Saint Martin
    Saint Vincent And The Grenadines
    Samoa
    San Marino
    Sao Tome And Principe
    Saudi Arabia
    Senegal
    Serbia
    Seychelles
    Sierra Leone
    Sint Maarten
    Slovakia
    Slovenia
    Solomon Islands
    South Africa
    South Georgia and the South Sandwich Islands
    South Sudan
    Sri Lanka
    St. Helena
    St. Pierre And Miquelon
    Suriname
    Svalbard And Jan Mayen Islands
    Sweden
    Switzerland
    Taiwan
    Tajikistan
    Tanzania, United Republic Of
    Thailand
    Togo
    Tokelau
    Tonga
    Trinidad And Tobago
    Tunisia
    Turkey
    Turkmenistan
    Turks And Caicos Islands
    Tuvalu
    Uganda
    Ukraine
    United Arab Emirates
    United States Minor Outlying Islands
    Uruguay
    Uzbekistan
    Vanuatu
    Vatican City State
    Venezuela
    Vietnam
    Virgin Islands (British)
    Virgin Islands (U.S.)
    Wallis And Futuna Islands
    Western Sahara
    Yemen
    Zambia
    Zimbabwe

    By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Tags:
    • Cybersecurity and IT Essentials
    • Security Awareness

    Related Content

    Blog
    340x340_Blog_CybDef_Get-Into-OSINT.jpg
    Open-Source Intelligence (OSINT), Cybersecurity and IT Essentials
    August 31, 2023
    How to Get Into OSINT
    This blog post shares how to find OSINT resources and communities, practice techniques to build your skillset, and how to find a job in OSINT.
    Ritu_Gill.jpg
    Ritu Gill
    read more
    Blog
    Blog_-_N2C_-_What_is_Linux_-_340x340_Thumb.jpg
    Cyber Defense, Cybersecurity and IT Essentials
    July 10, 2023
    What Is Linux?
    In this blog, we will take a closer look at what Linux is, how it works, and why it is essential to learn for cybersecurity professionals.
    Emily_Neuens_370x370.png
    Emily Neuens
    read more
    Blog
    N2C_Blog_Image.png
    Offensive Operations, Pen Testing, and Red Teaming, Cyber Defense, Cybersecurity and IT Essentials, Open-Source Intelligence (OSINT), Digital Forensics, Incident Response & Threat Hunting
    March 14, 2023
    A Visual Summary of SANS New2Cyber Summit 2023
    Check out these graphic recordings created in real-time throughout the event for SANS New2Cyber Summit 2023
    No Headshot Available
    Alison Kim
    read more
    • Company
    • Mission
    • Instructors
    • About
    • FAQ
    • Press
    • Contact Us
    • Careers
    • Policies
    • Training Programs
    • Work Study
    • Academies & Scholarships
    • Public Sector Partnerships
    • Law Enforcement
    • SkillsFuture Singapore
    • Degree Programs
    • Get Involved
    • Join the Community
    • Become an Instructor
    • Become a Sponsor
    • Speak at a Summit
    • Join the CISO Network
    • Award Programs
    • Partner Portal
    Subscribe to SANS Newsletters
    Receive curated news, vulnerabilities, & security awareness tips
    United States
    Canada
    United Kingdom
    Spain
    Belgium
    Denmark
    Norway
    Netherlands
    Australia
    India
    Japan
    Singapore
    Afghanistan
    Aland Islands
    Albania
    Algeria
    American Samoa
    Andorra
    Angola
    Anguilla
    Antarctica
    Antigua and Barbuda
    Argentina
    Armenia
    Aruba
    Austria
    Azerbaijan
    Bahamas
    Bahrain
    Bangladesh
    Barbados
    Belarus
    Belize
    Benin
    Bermuda
    Bhutan
    Bolivia
    Bonaire, Sint Eustatius, and Saba
    Bosnia And Herzegovina
    Botswana
    Bouvet Island
    Brazil
    British Indian Ocean Territory
    Brunei Darussalam
    Bulgaria
    Burkina Faso
    Burundi
    Cambodia
    Cameroon
    Cape Verde
    Cayman Islands
    Central African Republic
    Chad
    Chile
    China
    Christmas Island
    Cocos (Keeling) Islands
    Colombia
    Comoros
    Cook Islands
    Costa Rica
    Cote D'ivoire
    Croatia (Local Name: Hrvatska)
    Curacao
    Cyprus
    Czech Republic
    Democratic Republic of the Congo
    Djibouti
    Dominica
    Dominican Republic
    East Timor
    Ecuador
    Egypt
    El Salvador
    Equatorial Guinea
    Eritrea
    Estonia
    Eswatini
    Ethiopia
    Falkland Islands (Malvinas)
    Faroe Islands
    Fiji
    Finland
    France
    French Guiana
    French Polynesia
    French Southern Territories
    Gabon
    Gambia
    Georgia
    Germany
    Ghana
    Gibraltar
    Greece
    Greenland
    Grenada
    Guadeloupe
    Guam
    Guatemala
    Guernsey
    Guinea
    Guinea-Bissau
    Guyana
    Haiti
    Heard And McDonald Islands
    Honduras
    Hong Kong
    Hungary
    Iceland
    Indonesia
    Iraq
    Ireland
    Isle of Man
    Israel
    Italy
    Jamaica
    Jersey
    Jordan
    Kazakhstan
    Kenya
    Kiribati
    Korea, Republic Of
    Kosovo
    Kuwait
    Kyrgyzstan
    Lao People's Democratic Republic
    Latvia
    Lebanon
    Lesotho
    Liberia
    Liechtenstein
    Lithuania
    Luxembourg
    Macau
    Madagascar
    Malawi
    Malaysia
    Maldives
    Mali
    Malta
    Marshall Islands
    Martinique
    Mauritania
    Mauritius
    Mayotte
    Mexico
    Micronesia, Federated States Of
    Moldova, Republic Of
    Monaco
    Mongolia
    Montenegro
    Montserrat
    Morocco
    Mozambique
    Myanmar
    Namibia
    Nauru
    Nepal
    Netherlands Antilles
    New Caledonia
    New Zealand
    Nicaragua
    Niger
    Nigeria
    Niue
    Norfolk Island
    North Macedonia
    Northern Mariana Islands
    Oman
    Pakistan
    Palau
    Palestine
    Panama
    Papua New Guinea
    Paraguay
    Peru
    Philippines
    Pitcairn
    Poland
    Portugal
    Puerto Rico
    Qatar
    Reunion
    Romania
    Russian Federation
    Rwanda
    Saint Bartholemy
    Saint Kitts And Nevis
    Saint Lucia
    Saint Martin
    Saint Vincent And The Grenadines
    Samoa
    San Marino
    Sao Tome And Principe
    Saudi Arabia
    Senegal
    Serbia
    Seychelles
    Sierra Leone
    Sint Maarten
    Slovakia
    Slovenia
    Solomon Islands
    South Africa
    South Georgia and the South Sandwich Islands
    South Sudan
    Sri Lanka
    St. Helena
    St. Pierre And Miquelon
    Suriname
    Svalbard And Jan Mayen Islands
    Sweden
    Switzerland
    Taiwan
    Tajikistan
    Tanzania, United Republic Of
    Thailand
    Togo
    Tokelau
    Tonga
    Trinidad And Tobago
    Tunisia
    Turkey
    Turkmenistan
    Turks And Caicos Islands
    Tuvalu
    Uganda
    Ukraine
    United Arab Emirates
    United States Minor Outlying Islands
    Uruguay
    Uzbekistan
    Vanuatu
    Vatican City State
    Venezuela
    Vietnam
    Virgin Islands (British)
    Virgin Islands (U.S.)
    Wallis And Futuna Islands
    Western Sahara
    Yemen
    Zambia
    Zimbabwe

    By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
    • Privacy Policy
    • Terms and Conditions
    • Do Not Sell/Share My Personal Information
    • Contact
    • Careers
    © 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
    • Twitter
    • Facebook
    • Youtube
    • LinkedIn