Talk With an Expert

SEC301: Introduction to Cyber Security

SEC301Cyber Defense
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course authored by:
Rich Greene
Rich Greene
SEC673: Advanced Information Security Automation with Python
Course authored by:
Rich Greene
Rich Greene
  • GIAC Information Security Fundamentals (GISF)
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • 14 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

SEC301 introduces cybersecurity fundamentals for non-technical professionals, empowering them to understand risks, terminology, and best practices to support security in any role.

Course Overview

This course is designed for cyber-adjacent professionals, managers, HR, legal, auditors, and other non-technical roles who need a strong foundation in cybersecurity fundamentals. Through engaging instruction and relatable examples, this course builds confidence in key areas like threats, risks, defenses, and cyber hygiene. Whether you're supporting a security team, shaping policy, or guiding business decisions, SEC301 helps you understand the language of cybersecurity and your role in protecting the organization. No technical experience required just curiosity and a desire to be cyber smart.

This course also prepares you to earn the GISF certification (GIAC Information Security Fundamentals), a globally respected credential that validates your understanding of essential cybersecurity concepts.

What You’ll Learn

  • Learn key cybersecurity terms and concepts without technical jargon.
  • Understand how cyber threats like phishing and malware work.
  • Explore how networks, devices, and the cloud function securely.
  • Discover modern authentication methods like passphrases and MFA.
  • Get a simple breakdown of encryption, firewalls, and other defenses.
  • See how your role supports security policies and risk reduction.
  • Build confidence to collaborate with technical cybersecurity teams.

Business Takeaways

  • Speak confidently about cybersecurity in meetings and strategy sessions.
  • Better support security initiatives across departments and projects.
  • Identify and communicate risks that impact business operations.
  • Strengthen collaboration between technical and non-technical teams.
  • Make informed decisions that align with security best practices.
  • Help shape policies that reduce organizational cyber risk.
  • Contribute to a stronger security culture within your organization.

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC301: Introduction to Cyber Security.

Section 1Cyber Security Foundation

Section 1 covers core security principles, including the Principle of Least Privilege and the CIA triad. You'll learn key concepts like risk management, OS functions, mobile security, and the impacts of IoT and AI. You'll also gain skills in file manipulation, value conversion, and system knowledge for both Windows and Linux.

Labs

  • Using the Lab Environment
  • Converting Number Systems
  • Graphical User Interface
  • Command Line Interface

Section 2Introduction to Cryptography

Section 2 dedicates a full day to cryptography, covering key concepts without delving into the math. You'll learn cryptographic terms, historical examples, and modern encryption methods. Topics include symmetric and asymmetric cryptography, Diffie-Hellman, email encryption, VPNs, and PKI, focusing on practical applications.

Labs

  • Crypto by Hand
  • Visual Crypto
  • Using Crypto

Section 3Authentication, Authorization, & Networking

In Section 3, you’ll explore authentication systems, creating strong but memorable passphrases, using password managers, and understanding password cracking. You'll learn about token-based and biometric authentication. The day also covers Windows and Linux permission management, and networking basics with protocols like IP, TCP, and DNS.

Labs

  • Building Better Passwords: The Haystack
  • Bitwarden & 2FA
  • Linux File Permissions
  • Networking & Wireshark

Section 4Wireless Security, Network Attacks, & Malware

Section 4 explores wireless network security, focusing on Wi-Fi and Bluetooth standards, their vulnerabilities, and improvements. You'll dive into social engineering tactics like phishing and learn defense strategies. The section covers network attacks, malware types, and countermeasures like anti-malware and firewalls.

Labs

  • Wireless Access Point Configuration
  • Port Scanning with Zenmap
  • Malware Scanning with Malwarebytes

Section 5Cyber Security Technologies & Web Security

In Section 5, you'll learn about key security technologies like firewalls, IDS/IPS, sniffers, and ethical hacking. This section covers browser and web security challenges, and teaches common browser security features. It concludes with system security, including OS hardening, patching, cloud computing, and backups.

Labs

  • Firewall Builder

Things You Need To Know

Relevant Job Roles

Systems Security Analyst (DCWF 461)

DoD 8140: Software Engineering

Ensures systems and software security from development to maintenance by analyzing and improving security across all lifecycle phases.

Explore learning path

Systems Developer (DCWF 632)

DoD 8140: Cyber IT

Oversees full lifecycle of information systems from design through evaluation, ensuring alignment with functional and operational goals.

Explore learning path

IT Investment/Portfolio Manager (DCWF 804)

DoD 8140: Cyber Enablers

Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.

Explore learning path

Systems Authorization (OPM 611)

NICE: Oversight and Governance

Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.

Explore learning path

Communications Security (COMSEC) Management (OPM 723)

NICE: Oversight and Governance

Responsible for managing the Communications Security (COMSEC) resources of an organization.

Explore learning path

Product Support Manager (DCWF 803)

DoD 8140: Cyber Enablers

Manages support resources and readiness for system components, ensuring operational capability through lifecycle logistics and maintenance.

Explore learning path

Security Architect (DCWF 652)

DoD 8140: Cybersecurity

Designs secure enterprise systems considering environmental constraints and translates them into enforceable security processes and protocols.

Explore learning path

Cybersecurity Instruction (OPM 712)

NICE: Oversight and Governance

Responsible for developing and conducting cybersecurity awareness, training, or education.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
  • Location & instructor

    Virtual (OnDemand)

    Instructed by
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Las Vegas, NV, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Brisbane, QLD, AU & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    A$11,645 AUD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Orlando, FL, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,190 EUR*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    £6,255 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Registration Options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Nashville, TN, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Arlington, VA, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,190 EUR*Prices exclude applicable local taxes
    Registration Options
Showing 10 of 15

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources