new

SEC275: Foundations - Computers, Technology, & Security

GIAC Foundational Cybersecurity Technologies (GFACT)
GIAC Foundational Cybersecurity Technologies (GFACT)
  • Online
38 CPEs

SANS Foundations is the best course available to learn the core knowledge and develop practical skills in computers, technology, and security foundations that are needed to kickstart a career in cybersecurity. The course features a comprehensive variety of innovative, hands-on labs, and practical exercises that go far beyond what is offered in any other foundational course in cybersecurity. These labs are developed by leading subject-matter experts, drawing on the latest technology, techniques, and concepts in cybersecurity.

What You Will Learn

The course provides students with the practical learning and key skills to empower future cybersecurity learning and professional development.

What is included with SANS Foundations?

  • Over 120 hours of curated content
  • Hands-on labs experience
  • Quizzes to consolidate learning outcomes
  • Training by world-renowned experts
  • Engaging 4K video content
  • Proctored final exam delivered by GIAC

The course provides exactly what you need to go from zero technical and security knowledge to a level of sufficient theoretical understanding and applied practical skills that will enable you to speak the same language as industry professionals. Students will develop fundamental skills and knowledge in key IT subject areas such as:

  • Computer Components & Concepts
  • Operating Systems, Containers, & Virtualization
  • Linux
  • Networking Fundamentals
  • The Web: Search Engine & Servers
  • Practical Programming in Python and C
  • Windows Foundations
  • Advanced Computer Hardware (e.g. CPU & Memory)
  • Encryption
  • Introduction to Basic Security Concepts
  • Introduction to Forensics
  • Introduction to Reconnaissance, Exploitation, and Privilege Escalation
  • Introduction to Network & Computer Infiltration (e.g. Lateral Movement)

Course FAQ

Q: How long does it take to complete the course?

A: The course content can be completed in 50 to 60 hours, but many students take longer to maximize their learning outcomes and skills development. Most students review course content multiple times, repeat labs and quizzes, or do the extra exercises and the average completion time is 120 to 140 hours.

Q: How long do I have access to the course?

A: Students have access to the course for 4 months, providing plenty of time to go over the material in bite size chunks and to review the labs and lecture. During this time, you can go back over all of the course components and complete them as many times as you wish to do so.

Q: How do the labs work?

A: The learning platform for SANS Foundations has an online labs system where you can interact with security tools, get your hands on the Linux command line, and use an Integrated Development Environment (IDE) to write and test code. There are over 90 labs in the course, and all can be completed from a web browser, providing you access to your own personal and isolated lab network

Q: What do the quizzes test?

A: The quizzes benchmark your knowledge and measure if you understood the key concepts and topics of each module. The quizzes are based on the course content and a fantastic indicator of your familiarity and retention. You can take them multiple times until you feel confident and are ready to move onto the next module.

Q: How do I access the course?

A: After successfully registering for the course, you will receive an email with instructions to access the course content within two business days of full payment.

Q: What are good training courses or learning pathways to pursue after completing SANS Foundations?

A: The SANS Cyber Security Skills Roadmap shows how you can develop your cyber security skills across multiple career pathways, be it Cyber Defense Analyst, Incident Responder, or Penetration Tester. The SANS Foundations course is designed to prepare you for any of the pathways depending on your career goals and interests.

Syllabus (38 CPEs)

Download PDF
  • Overview

    The course starts with an introduction to the course and learning platform, but quickly dives into computer components and concepts, including hardware, data storage & representation, logic & data manipulation, and cloud computing.

    Next, learn all about operating systems, virtualization, and containers. Understanding the lower levels of your operating system will help when it comes to troubleshooting, advanced configuration, and cybersecurity fundamentals.

    Linux is a modular and powerful platform from which to chain together tools for complex tasks. Build your knowledge of Linux and the concepts that help secure it. This section is rich in labs covering commands such as grep, cp, apropos, and many more.

    Exercises
    • Debugging Challenge
    • Linux Architecture and Components
    • Linux Commands
    • Linux Navigation
    • The Linux Environment
    Topics
    • Intro to Computer Hardware
    • Data Storage and Representation
    • Logic and Data Manipulation
    • Storing Data and Files
    • Cloud Computing
    • CPU and Memory
    • Monitoring and Execution
    • Advanced Storage
    • Operating Systems
    • Virtualization
    • Containers
    • Introduction to Linux
    • The Linux Environment
    • Linux Navigation
    • Linux Commands
      • Basics
      • Remote Access
      • Building Software
      • Troubleshooting
    • Linux Architecture & Components
  • Overview

    This section provides a look into how search engines work and the most efficient ways to use them. You will be able to search Google with style and efficiency; perform advanced searches using keywords to narrow results by filetype; and troubleshoot basic computer problems using Google and other search engines.

    Web applications and websites represent a huge volume of modern business and consumer applications. Understand what happens when you visit a web page by learning about concepts such as web servers, HTTP, JavaScript, cookies, and more.

    In this section, we cover the inner workings of a network in order to understand how computers communicate with each other, and for what reasons. Learn about networking concepts such as IP addresses, packets, protocols, and more.

    Exercises
    • Search Superpowers
    • WWW and Serving
    • Networking
    • Types of Networks
    • Protocols
    • Email networking
    • DNS
    • IP addresses
    Topics
    • Search Superpowers
    • WWW and Serving
    • Networking
    • Types of Networks
      • Protocols
      • Email networking
      • DNS
      • IP addresses
  • Overview

    Servers are a crucial part of any network and a key location where lots of data is held, making them a tempting target for attackers. We take a look at some common server types, including web, DNS, log, and email, their basic setup, and installation procedures.

    We start this section with a basic introduction of what a computer program is, how it works, and different types of programming languages. We cover programming in Python and C, writing basic programs and introduce various strategies, tools, and conventions. The concepts taught in this section are invaluable in understanding how mistakes made during development can lead to security issues.

    Exercises
    • Git Hands On
    • Printing in Python
    • Variables in Python
    • String Manipulation Practice
    • Manipulating Numbers
    • Type Conversion
    • Dictionary Practice
    • Bringing It Together
    • For Loops
    • User Input Prompts
    • CLI User Input Lab
    • Conditionals
    • Class and Objects Lab
    • While Loops
    • Exceptions Lab
    • Functions
    • Reading and Writing Files
    • Create a Portscanner
    • Printing
    • String Handling
    • Variables
    • Comments
    • Pointers and Memory
    Topics
    • Introduction to Servers
    • Web Servers
    • Database Servers
    • DNS Servers
    • Log Servers
    • Email Servers
    • Programming
      • Python
      • Conditionals, loops, functions, user input, and objects
      • PEP 8 style guide
      • C
      • Pointers
  • Overview

    This section provides an introductory understanding of a wide variety of security concepts, terminology, and tools. Familiarize yourself with common security terminology, including Red Team vs. Blue Team, Critical Security Controls, and the stages of an attack. Learn to recognize tools like Slingshot, SIFT, and Kali. Dive deeper into concepts across disciplines including digital forensics, offensive security, and risk management.

    Exercises
    • Symmetric Encryption Challenge
    • Asymmetric Encryption Challenge
    • Hashing Challenge
    • Break Me Challenge
    • Steganography Challenge
    • Exfiltration Challenge Lab
    • Buffer Overflows
    • Format String Lab
    • Privilege Escalation Lab
    Topics
    • Encryption
    • Security
    • Security Distributions
    • Reconnaissance
    • Forensics
    • Exploitation
    • Privilege Escalation
    • Persistence
    • Lateral Movement
    • Exfiltration

GIAC Foundational Cybersecurity Technologies

The GFACT certification validates a practitioner's knowledge of essential foundational cybersecurity concepts. GFACT-certified professionals are familiar with practical skills in computers, technology, and security fundamentals that are needed to kickstart a career in cybersecurity.

  • Core Computing Components: Hardware and Virtualization, Networking, Operating Systems, Web, Cloud, and Data Storage
  • IT Fundamentals and Concepts: Logic and Programming, Windows, and Linux
  • Security Foundations and Threat Landscape: Concepts, Exploitation and Mitigation, Forensics and Post Exploitation
More Certification Details

Prerequisites

  • There are no prerequisites.
  • No prior security knowledge is needed.

Laptop Requirements

Any modern web browser (Chrome, Firefox, Safari) will be suitable, and you can change between devices and pick up where you left off at any time.

No software is required to participate in the course, everything is provided in the online learning platform! Even when learning Python or C and how to build programs, or exploring security tools - everything can be done online!

Author Statement

Cybersecurity is an exciting and fast-growing field, and it must be at a time when the global talent shortage continues to grow, and both the number of threats and malicious actors continues to rise. While job roles in application security, reverse malware engineering, and threat hunting may sound enticing, practitioners in these roles all had to start by learning the basics. There are essential computing and technology skills that all successful cybersecurity professionals first learn that serve as the baseline for careers and future education in the field. SANS Foundations serves as the launch of an IT education and career or can fill in the gaps by introducing students to these fundamentals.

By providing students with minimal technology proficiency and the ability to recognize key terms and develop competencies with tools and systems in a comfortable atmosphere, they are prepared for future skills development. Whether you are a career seeker, self-driven learner, or in an immersive training program, SANS Foundations will provide you with the core IT and computer knowledge and abilities integral to a future career in cybersecurity.

SANS Foundations teaches students a broad array of fundamental knowledge in areas such as computer hardware, networking, Linux, operating systems, data storage, and much more. The skills gained are applicable to everyone in an IT, computing, or security role. Practical skills are key to success in cybersecurity, and thus there are over 100 labs and hands-on exercises in the course to kickstart your cybersecurity journey. The course will set you up for entering the workforce and be ready to continue learning in more advanced, technical areas across cybersecurity.

- James Lyne, SANS Chief Technology Officer

Reviews

“Great content and learning, very positive. Really a great way to step into cybersecurity and build skills day to day.”
“The labs were a great way to practice and learn the new commands, I loved them. Another great tool were the videos with execution examples."
“I think the biggest value add for SANS Foundations was simply how comprehensive it was. It covered a lot of topics, but each was covered in enough depth for a better handle on the basics without being overwhelming.”

    Register for SEC275

    • In Person

    Training events and topical summits feature presentations and courses in classrooms around the world.

    Learn more
    • Live Online

    Live, interactive sessions with SANS instructors over the course of one or more weeks, at times convenient to students worldwide.

    Learn more
    • OnDemand

    Study and prepare for GIAC Certification with four months of online access. Includes labs and exercises, and support.

    Learn more

    Loading...