SEC301: Introduction to Cyber Security
- 5 Days (Instructor-Led)
- 30 Hours (Self-Paced)
- GIAC Information Security Fundamentals (GISF)
- 30 CPEs
Apply your credits to renew your certifications
- In-Person, Virtual or Self-Paced
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
- Beginner Level
Course content applicable to people with limited or no cyber security experience
- 14 Hands-On Lab(s)
Apply what you learn with hands-on exercises and labs
SEC301 introduces cybersecurity fundamentals for non-technical professionals, empowering them to understand risks, terminology, and best practices to support security in any role.
Featured Quote
It's a very good course if you need the basic foundation. It's a very helpful class to take because it expands on some basic concepts.
Course Overview
This course is designed for cyber-adjacent professionals, managers, HR, legal, auditors, and other non-technical roles who need a strong foundation in cybersecurity fundamentals. Through engaging instruction and relatable examples, this course builds confidence in key areas like threats, risks, defenses, and cyber hygiene. Whether you're supporting a security team, shaping policy, or guiding business decisions, SEC301 helps you understand the language of cybersecurity and your role in protecting the organization. No technical experience required just curiosity and a desire to be cyber smart.
This course also prepares you to earn the GISF certification (GIAC Information Security Fundamentals), a globally respected credential that validates your understanding of essential cybersecurity concepts.
What You’ll Learn
- Learn key cybersecurity terms and concepts without technical jargon.
- Understand how cyber threats like phishing and malware work.
- Explore how networks, devices, and the cloud function securely.
- Discover modern authentication methods like passphrases and MFA.
- Get a simple breakdown of encryption, firewalls, and other defenses.
- See how your role supports security policies and risk reduction.
- Build confidence to collaborate with technical cybersecurity teams.
Business Takeaways
- Speak confidently about cybersecurity in meetings and strategy sessions.
- Better support security initiatives across departments and projects.
- Identify and communicate risks that impact business operations.
- Strengthen collaboration between technical and non-technical teams.
- Make informed decisions that align with security best practices.
- Help shape policies that reduce organizational cyber risk.
- Contribute to a stronger security culture within your organization.
Meet Your Author
Rich Greene
Certified InstructorRich Greene, SANS Senior Solutions Engineer and SEC301 author, brings 20+ years of cyber operations and teaching experience to the classroom. With 15+ GIAC certifications and a passion for mentorship, he equips defenders with real-world confidence and skill.
Read more about Rich GreeneCourse Syllabus
Explore the course syllabus below to view the full range of topics covered in SEC301: Introduction to Cyber Security.
Section 1Cybersecurity Foundation
Section 1 covers core security principles, including the Principle of Least Privilege and the CIA triad. You'll learn key concepts like risk management, OS functions, mobile security, and the impacts of IoT and AI. You'll also gain skills in file manipulation, value conversion, and system knowledge for both Windows and Linux.
Labs
- Using the Lab Environment
- Converting Number Systems
- Graphical User Interface
- Command Line Interface
Section 2Introduction to Cryptography
Section 2 dedicates a full day to cryptography, covering key concepts without delving into the math. You'll learn cryptographic terms, historical examples, and modern encryption methods. Topics include symmetric and asymmetric cryptography, Diffie-Hellman, email encryption, VPNs, and PKI, focusing on practical applications.
Labs
- Crypto by Hand
- Visual Crypto
- Using Crypto
Section 3Authentication, Authorization, and Networking
In Section 3, you’ll explore authentication systems, creating strong but memorable passphrases, using password managers, and understanding password cracking. You'll learn about token-based and biometric authentication. The day also covers Windows and Linux permission management, and networking basics with protocols like IP, TCP, and DNS.
Labs
- Building Better Passwords: The Haystack
- Bitwarden & 2FA
- Linux File Permissions
- Networking & Wireshark
Section 4Wireless Security, Network Attacks, and Malware
Section 4 explores wireless network security, focusing on Wi-Fi and Bluetooth standards, their vulnerabilities, and improvements. You'll dive into social engineering tactics like phishing and learn defense strategies. The section covers network attacks, malware types, and countermeasures like anti-malware and firewalls.
Labs
- Wireless Access Point Configuration
- Port Scanning with Zenmap
- Malware Scanning with Malwarebytes
Section 5Cybersecurity Technologies and Web Security
In Section 5, you'll learn about key security technologies like firewalls, IDS/IPS, sniffers, and ethical hacking. This section covers browser and web security challenges, and teaches common browser security features. It concludes with system security, including OS hardening, patching, cloud computing, and backups.
Labs
- Firewall Builder
Things You Need To Know
Relevant Job Roles
Systems Security Analyst (DCWF 461)
DoD 8140: Software EngineeringEnsures systems and software security from development to maintenance by analyzing and improving security across all lifecycle phases.
Explore learning pathSystems Developer (DCWF 632)
DoD 8140: Cyber ITOversees full lifecycle of information systems from design through evaluation, ensuring alignment with functional and operational goals.
Explore learning pathIT Investment/Portfolio Manager (DCWF 804)
DoD 8140: Cyber EnablersOversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.
Explore learning pathSystems Authorization (OPM 611)
NICE: Oversight and GovernanceResponsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.
Explore learning pathCommunications Security (COMSEC) Management (OPM 723)
NICE: Oversight and GovernanceResponsible for managing the Communications Security (COMSEC) resources of an organization.
Explore learning pathProduct Support Manager (DCWF 803)
DoD 8140: Cyber EnablersManages support resources and readiness for system components, ensuring operational capability through lifecycle logistics and maintenance.
Explore learning pathSecurity Architect (DCWF 652)
DoD 8140: CybersecurityDesigns secure enterprise systems considering environmental constraints and translates them into enforceable security processes and protocols.
Explore learning pathCybersecurity Instruction (OPM 712)
NICE: Oversight and GovernanceResponsible for developing and conducting cybersecurity awareness, training, or education.
Explore learning pathCourse Schedule & Pricing
GIAC Certification Attempt
Add a GIAC certification attempt and receive free two practice tests. View pricing in the info icons below.
OnDemand Course Access
When purchasing a live instructor-led class, add an additional 4 months of online access after your course. View pricing in the info icons below.
- Date & TimeOnDemand (Anytime)Self-Paced, 4 months accessCourse price3,000ドル USD*Prices exclude applicable local taxesRegistration Options
- Date & TimeFetching schedule..Course price2,450ドル GBP*Prices exclude applicable taxes | EUR price available during checkoutRegistration Options
- Location & instructor
SANS Cyber Defense Initiative 2025
Washington, DC, US & Virtual (live)
Instructed byDate & TimeFetching schedule..Course price3,000ドル USD*Prices exclude applicable local taxes - Date & TimeFetching schedule..Course price3,000ドル USD*Prices exclude applicable local taxes
- Date & TimeFetching schedule..Course price2,820ドル EUR*Prices exclude applicable local taxesRegistration Options
- Date & TimeFetching schedule..Course priceS3,900ドル SGD*Prices exclude applicable local taxes
- Date & TimeFetching schedule..Course price3,000ドル USD*Prices exclude applicable local taxes
- Date & TimeFetching schedule..Course price3,000ドル USD*Prices exclude applicable local taxes
- Date & TimeFetching schedule..Course price2,820ドル EUR*Prices exclude applicable local taxesRegistration Options
- Date & TimeFetching schedule..Course price3,000ドル USD*Prices exclude applicable local taxes
Learn Alongside Leading Cybersecurity Professionals From Around The World
- Slide 1 of 4SEC301 was my first SANS course, and I was not disappointed! Keith was exceptional in presenting this information in a clear and concise manner. He took the time to really explain concepts and challenged us to think things through. I learned a great deal and look forward to future SANS events.
- Slide 2 of 4SEC301 is the only course of its kind. Every IT professional knows that your knowledge from networking to security is contiguous, and this is the only course I've seen that actually teaches both equally.
- Slide 3 of 4I never knew anything about cryptography and its complexities. This course is opening my eyes to how important it is!
- Slide 4 of 4As usual, SANS courses give incredible insight into the reality of the threats that are present in the cyber world. With SEC301, I have a better understanding of each threat, and the means to mitigate those threats.
Benefits of Learning with SANS
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources