Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

SEC301: Introduction to Cyber Security

SEC301Cyber Defense
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course created by:
Rich Greene
Rich Greene
SEC673: Advanced Information Security Automation with Python
Course created by:
Rich Greene
Rich Greene
  • GIAC Information Security Fundamentals (GISF)
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Beginner Level

    Course content applicable to people with limited or no cyber security experience

  • 14 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

SEC301 introduces cybersecurity fundamentals for non-technical professionals, empowering them to understand risks, terminology, and best practices to support security in any role.

Course Overview

This course is designed for cyber-adjacent professionals, managers, HR, legal, auditors, and other non-technical roles who need a strong foundation in cybersecurity fundamentals. Through engaging instruction and relatable examples, this course builds confidence in key areas like threats, risks, defenses, and cyber hygiene. Whether you're supporting a security team, shaping policy, or guiding business decisions, SEC301 helps you understand the language of cybersecurity and your role in protecting the organization. No technical experience required just curiosity and a desire to be cyber smart.

This course also prepares you to earn the GISF certification (GIAC Information Security Fundamentals), a globally respected credential that validates your understanding of essential cybersecurity concepts.

What You’ll Learn

  • Learn key cybersecurity terms and concepts without technical jargon.
  • Understand how cyber threats like phishing and malware work.
  • Explore how networks, devices, and the cloud function securely.
  • Discover modern authentication methods like passphrases and MFA.
  • Get a simple breakdown of encryption, firewalls, and other defenses.
  • See how your role supports security policies and risk reduction.
  • Build confidence to collaborate with technical cybersecurity teams.

Business Takeaways

  • Speak confidently about cybersecurity in meetings and strategy sessions.
  • Better support security initiatives across departments and projects.
  • Identify and communicate risks that impact business operations.
  • Strengthen collaboration between technical and non-technical teams.
  • Make informed decisions that align with security best practices.
  • Help shape policies that reduce organizational cyber risk.
  • Contribute to a stronger security culture within your organization.

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC301: Introduction to Cyber Security.

Section 1Cyber Security Foundation

Section 1 covers core security principles, including the Principle of Least Privilege and the CIA triad. You'll learn key concepts like risk management, OS functions, mobile security, and the impacts of IoT and AI. You'll also gain skills in file manipulation, value conversion, and system knowledge for both Windows and Linux.

Labs

  • Using the Lab Environment
  • Converting Number Systems
  • Graphical User Interface
  • Command Line Interface

Section 2Introduction to Cryptography

Section 2 dedicates a full day to cryptography, covering key concepts without delving into the math. You'll learn cryptographic terms, historical examples, and modern encryption methods. Topics include symmetric and asymmetric cryptography, Diffie-Hellman, email encryption, VPNs, and PKI, focusing on practical applications.

Labs

  • Crypto by Hand
  • Visual Crypto
  • Using Crypto

Section 3Authentication, Authorization, & Networking

In Section 3, you’ll explore authentication systems, creating strong but memorable passphrases, using password managers, and understanding password cracking. You'll learn about token-based and biometric authentication. The day also covers Windows and Linux permission management, and networking basics with protocols like IP, TCP, and DNS.

Labs

  • Building Better Passwords: The Haystack
  • Bitwarden & 2FA
  • Linux File Permissions
  • Networking & Wireshark

Section 4Wireless Security, Network Attacks, & Malware

Section 4 explores wireless network security, focusing on Wi-Fi and Bluetooth standards, their vulnerabilities, and improvements. You'll dive into social engineering tactics like phishing and learn defense strategies. The section covers network attacks, malware types, and countermeasures like anti-malware and firewalls.

Labs

  • Wireless Access Point Configuration
  • Port Scanning with Zenmap
  • Malware Scanning with Malwarebytes

Section 5Cyber Security Technologies & Web Security

In Section 5, you'll learn about key security technologies like firewalls, IDS/IPS, sniffers, and ethical hacking. This section covers browser and web security challenges, and teaches common browser security features. It concludes with system security, including OS hardening, patching, cloud computing, and backups.

Labs

  • Firewall Builder

Things You Need To Know

Relevant Job Roles

Systems Security Analyst (DCWF 461)

DoD 8140: Software Engineering

Ensures systems and software security from development to maintenance by analyzing and improving security across all lifecycle phases.

Explore learning path

Systems Developer (DCWF 632)

DoD 8140: Cyber IT

Oversees full lifecycle of information systems from design through evaluation, ensuring alignment with functional and operational goals.

Explore learning path

IT Investment/Portfolio Manager (DCWF 804)

DoD 8140: Cyber Enablers

Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.

Explore learning path

Communications Security (COMSEC) Management (OPM 723)

NICE: Oversight and Governance

Responsible for managing the Communications Security (COMSEC) resources of an organization.

Explore learning path

Product Support Manager (DCWF 803)

DoD 8140: Cyber Enablers

Manages support resources and readiness for system components, ensuring operational capability through lifecycle logistics and maintenance.

Explore learning path

Data Architect (DCWF 653)

DoD 8140: Data/AI

Designs system data models and flow architectures to meet mission or business data requirements using scalable and efficient solutions.

Explore learning path

Security Architect (DCWF 652)

DoD 8140: Cybersecurity

Designs secure enterprise systems considering environmental constraints and translates them into enforceable security processes and protocols.

Explore learning path

Cybersecurity Instruction (OPM 712)

NICE: Oversight and Governance

Responsible for developing and conducting cybersecurity awareness, training, or education.

Explore learning path

Knowledge Management (OPM 631)

NICE: Implementation and Operation

Responsible for managing and administering processes and tools to identify, document, and access an organization’s intellectual capital.

Explore learning path

Authorizing Official/Designated Representative (DCWF 611)

DoD 8140: Cybersecurity

Responsible for accepting system risk on behalf of the organization, ensuring acceptable security levels for mission, reputation, and operations.

Explore learning path

Cyber Defense Incident Responder (DCWF 531)

DoD 8140: Cybersecurity

Responds to and investigates network cyber incidents, performing analysis to mitigate threats and maintain cybersecurity in enclave environments.

Explore learning path

IT Program Auditor (DCWF 805)

DoD 8140: Cyber Enablers

Evaluates IT programs for compliance, identifying gaps and ensuring conformance with published tech and security standards and policies.

Explore learning path

Product Manager (DCWF 806)

DoD 8140: Software Engineering

Manages product development, coordinates cross-functional teams, and guides strategy, resources, and releases across product lifecycle phases.

Explore learning path

Cyber Defense Analyst (DCWF 511)

DoD 8140: Cybersecurity

Monitors cyber defense tools like IDS and logs to analyze network events, identifying and mitigating potential threats to security environments.

Explore learning path

Privacy Compliance (OPM 732)

NICE: Oversight and Governance

Responsible for developing and overseeing an organization’s privacy compliance program and staff, including establishing and managing privacy-related governance, policy, and incident response needs.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Keith Palmgren
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Rich Greene
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    San Antonio, TX, US & Virtual (live)

    Instructed by Sean Thomas
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by Doc Blackburn
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by Doc Blackburn
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Las Vegas, NV, US & Virtual (live)

    Instructed by Rich Greene
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Brisbane, QLD, AU & Virtual (live)

    Instructed by Rich Greene
    Date & Time
    Fetching schedule..View event details
    Course price
    A$11,645 AUD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Orlando, FL, US & Virtual (live)

    Instructed by Sean Thomas
    Date & Time
    Fetching schedule..View event details
    Course price
    $7,650 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 18

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources