Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

SEC275: Foundations: Computers, Technology, & Security

SEC275Cyber Defense
  • 38 Hours (Self-Paced)
Course created by:
James Lyne
James Lyne
SEC406: Linux Security for InfoSec Professionals
Course created by:
James Lyne
James Lyne
  • GIAC Foundational Cybersecurity Technologies (GFACT)
  • 38 CPEs

    Apply your credits to renew your certifications

  • Self-paced

    Train at your own pace from wherever you are

  • Beginner Level

    Course content applicable to people with limited or no cyber security experience

  • 80 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Build your cybersecurity confidence from the ground up. This SANS Foundations course gives you the essential skills, tools, and mindset to launch your journey into the world of cyber.

Course Overview

SANS Foundations is the perfect starting point for anyone new to cybersecurity or looking to build a solid technical base. Designed with beginners in mind, this cybersecurity foundations course covers essential concepts like operating systems, networking, security principles, and hands-on skills with tools used by professionals in the field. Whether you're exploring a new career, supporting security teams, or preparing for advanced training, SEC275 provides the critical knowledge needed to understand and engage with cybersecurity. With engaging content, practical labs, and expert instruction, you’ll gain the confidence and capability to take your next step in the cyber world. No prior experience required just curiosity and a drive to learn.

What You’ll Learn

  • Understand hardware, memory concepts, and virtualization (including containers and their pros/cons)
  • Know core networking concepts, server types, and protocols
  • Be familiar with Linux and Windows CLI commands, permissions, and access control
  • Recognize exploit methods, attack stages, and common attacker tools
  • Understand cryptography concepts and ethical/legal concerns in hacking
  • Know basic forensic tools, file systems, web tech, and cloud models
  • Grasp programming syntax, logical operations, and common code errors

Business Takeaways

  • Reduce the risk of cybersecurity knowledge gaps within your organization
  • Reduce costs of hiring externally by discovering latent talent within your current IT team
  • Improve new-starter success on advanced courses by covering the foundations first
  • Enable business growth through training all technical employees to the highest standard
  • Validate your training investment with your employees passing the GFACT certification
  • Design effective onboarding frameworks for your employees knowing the foundations of cybersecurity are covered

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC275: Foundations: Computers, Technology, & Security.

Section 1SEC275: SANS Foundations

Thirteen self-paced online modules comprise SEC275: Foundations: Computers, Technology and Security™, covering a range of cybersecurity topics such as Linux, networking fundamentals, programming, servers, SQL, Windows, and more.

Topics covered

  • Linux
  • The Web
  • Networking Fundamentals
  • Practical Programming
  • Security Concepts

Labs

  • 80+ Embedded Labs

Things You Need To Know

Relevant Job Roles

Technical Support Specialist (DCWF 411)

DoD 8140: Cyber IT

Delivers technical support to users, helping them resolve issues with client hardware/software according to organizational service processes.

Explore learning path

Systems Administration (OPM 451)

NICE: Implementation and Operation

Responsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation.

Explore learning path

Systems Developer (DCWF 632)

DoD 8140: Cyber IT

Oversees full lifecycle of information systems from design through evaluation, ensuring alignment with functional and operational goals.

Explore learning path

Network Operations (OPM 441)

NICE: Implementation and Operation

Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.

Explore learning path

Software Developer (DCWF 621)

DoD 8140: Software Engineering

Executes software engineering across lifecycles, managing risks, requirements, design, and testing using modern architectures and methodologies.

Explore learning path

IT Investment/Portfolio Manager (DCWF 804)

DoD 8140: Cyber Enablers

Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.

Explore learning path

Network Operations Specialist (DCWF 441)

DoD 8140: Cyber IT

Implements and maintains network services, including hardware and virtual systems, ensuring operational support for infrastructure platforms.

Explore learning path

Product Support Manager (DCWF 803)

DoD 8140: Cyber Enablers

Manages support resources and readiness for system components, ensuring operational capability through lifecycle logistics and maintenance.

Explore learning path

Systems Security Analysis (OPM 461)

NICE: Implementation and Operation

Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.

Explore learning path

IT Project Manager (DCWF 802)

DoD 8140: Cyber Enablers

Leads IT project management to deliver services or products, ensuring milestones, budgets, and mission alignment are successfully achieved.

Explore learning path

Defensive Cybersecurity (OPM 511)

NICE: Protection and Defense

Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.

Explore learning path

Cyber Defense Analyst (DCWF 511)

DoD 8140: Cybersecurity

Monitors cyber defense tools like IDS and logs to analyze network events, identifying and mitigating potential threats to security environments.

Explore learning path

Technical Support (OPM 411)

NICE: Implementation and Operation

Responsible for providing technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational policies and processes.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (Self-paced)

    Instructed by James Lyne
    Date & Time
    AnytimeSelf-Paced, 4 months access
    Course price
    $3,100 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 1 of 1

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources