Foundations: Computers, Technology and Security: Gfact

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

SEC275: Foundations: Computers, Technology GFACT

Foundational Cybersecurity

and Security
Technologies
giac.org/gfact

Online 38 Laptop SANS Foundations is the most comprehensive, certified introductory cybersecurity
Course CPEs Required
course on the market. Developed by leading subject matter experts, SEC275 provides
fundamental cybersecurity knowledge and skills, giving students with no prior technical
What You Will Learn or industry experience a level of proficiency that allows them to speak the same
You’ll be taken through the 12 modules below, language as professionals. Learn foundational computer and security concepts and
covering the foundations of IT, technology and develop programming skills in an interactive learning environment, supported by world-
security, taking you to a level of proficiency
where you’ll be speaking the same language as
renowned instructors, video lectures, hands-on labs and exercises.
professionals. No prior technical experience
required.
SANS Foundations transforms learning into real-world, practical skills, going far beyond
what all other foundational cybersecurity courses offer.
• Computer Components and Concepts
• Linux
• The Web Who is the SANS Foundations course for?
• Networking Fundamentals
Whether you’re new to cybersecurity, a career changer, or an experienced IT professional
• Servers and Services
looking to revise the fundamentals, SANS Foundations is the perfect introduction for
• Practical Programming and Concepts
those exploring a technical career in cybersecurity.
• SQL
• Windows Foundations
• Advanced computer software Author Statement
• Security concepts
“The landscape of cybersecurity is changing rapidly and constantly evolving. There are
• Offensive Security Concepts new threats emerging daily, new attackers using novel techniques, and worryingly, a
• Network and Computer infiltration growing shortage of global talent.
To help build on your newfound knowledge, you
will practice using the Linux command line, writing Before running to the exciting worlds of application security, reverse malware
computer programs in C and Python, and running engineering or threat hunting, every cybersecurity professional needs to have an
common exploits in hands-on labs and exercises
included in the course.
excellent grounding in essential computing and technology skills. These will be used
every day in your career and serve as a baseline for your development and future career.
The labs draw on the latest technology,
techniques, and concepts in cybersecurity, SANS Foundations is the most comprehensive, certified introductory cybersecurity course
bringing your knowledge to life in a practical,
technical environment, giving you real-world skills on the market. We wanted to make this course as accessible as possible, to eradicate as
that prepare you for the first day of your new many potential hurdles stopping people getting into the field. We’ve specifically designed
cybersecurity career.
the course to require minimal equipment or technology proficiency - you do not need
any prior specific education, just a keen interest.

What is included with SANS Foundations? Whether you are still in full-time education, a career changer or on an immersive training
• 60+ embedded labs program, SANS Foundations will provide you with the core IT and computer knowledge
• 55+ quizzes to track your progress integral to a future, technical career in cybersecurity.”
• 145+ video lectures and walk through —James Lyne, SANS Chief Technology and Innovation Officer
demonstrations
• 200+ audio recordings guiding students through
course material
“The security labs were my personal “Despite having a senior level
• Proctored final exam delivered by GIAC
favourite as the skills attained security role SANS Foundations
through those helped me land a was a fantastic way to brush up on
role as a vulnerability analyst in the important concepts that help me
information security office!” better fulfill my job duties.”
— Kirti Nangia, SANS Foundations Student — Noah Pack, SANS Foundations Student

sans.org/sec275
• Watch a preview of this course
• Discover how to take this course online
Syllabus
Introduction: will help prepare students for more Offensive Who should take SANS
Learning the Foundations – introduction to the Security Concepts work later in the course. Foundations?
SANS Foundations course. 8. Windows Foundations: • Career changers
1. Computer Components and Concepts: The Windows Foundations module helps • Self-driven learners seeking new skills
students get familiar with key Windows CLI online
This module focuses on the different
components of a computer, what they commands, understanding permissions and • College and university students
do, and how they work together. It looks access control, and elements of Windows • Business professionals working in IT or
at Computer Hardware, Data Storage & as it relates to file systems, architecture, cybersecurity
Representation, Logic & Data Manipulation, and networking. This module also looks at • New hires in IT/cybersecurity
Storing Data & Files, Cloud Computing, Windows uses, installation, network setup,
• Participants in reskilling and retraining
Operating Systems and Virtualization. configuration, changing settings, log files, programs
the registry, file permissions, user accounts,
2. Linux: Windows command line, scripting, and
• Participants in federal or government
training programs
This module introduces students to Linux, Powershell.
the Linux Environment, Linux Navigation, • Participants in business or enterprise
9. Advanced Computer Hardware: apprenticeships
Commands, and Linux Architecture and
Components. These subjects help students The Advanced Computer Hardware module
develop a working knowledge and looks at how the CPU and RAM work in depth
understanding of installing Linux, navigation (e.g., Memory: Stack and Heap). It introduces,
and structure, permissions, and commands and looks at GDB in practice, along with how
such as grep, cp, and much more. This to track execution, with advanced storage
module is rich in labs to helps students
practice their skills.
mechanisms such as RAID and cloud storage
mechanisms. The module also covers an
GFACT
Foundational Cybersecurity
introduction into Assembly, and it explores Technologies
3. The Web: mnemonics. giac.org/gfact
This module provides a look into how search 10. Security Concepts:
engines work, and the most efficient ways to GIAC Foundational Cybersecurity
use them, as well as introducing web servers, This module introduces students to the
concepts and terminology associated with Technologies
HTML and cookies.
cryptography, whilst becoming familiar with “The GIAC Foundational Cybersecurity
4. Networking Fundamentals: the ethical and legal concerns associated Technologies (GFACT) certification
This module helps students understand core demonstrates an individual has developed
with hacking. They cover a variety of topics
networking concepts and protocols including hands-on skills through labs in areas such
and tools such as encryption, encoding, as Linux, encryption, and programming,
networking components and hardware, hashing, the law, ethics, red teams vs. blue as well as gained essential knowledge
packets, types of network addresses, TCP team, risk management, critical security in areas such as networking, computer
and UDP protocols, subnetting, and email. controls, Kali Linux, Slingshot and SIFT, hardware, virtualization, Windows, servers,
5. Servers and Services: reconnaissance tools and techniques, introductory security concepts, and
and the basics of digital forensics (e.g., more. Candidates achieving the GFACT
This module helps students understand are proficient in the core knowledge and
steganography, memory captures).
the different server types by introducing practical skills in computers, technology,
web, database, DNS (Domain Name System), 11. Offensive Security Concepts: and security fundamentals needed to
Log, and Email servers; looking at their This module introduces students to kickstart a career in cybersecurity. GFACT
basic setup and installation procedures. offensive security concepts and exploitation holders are truly ready to contribute
The module covers basic hardening and techniques, such as command injection, on Day 1 of their first job in IT or
configuration and concludes with a deep cybersecurity!”
SQL injection, session guessing, directory
dive into Cloud Computing. —James Lyne, SANS Chief Technology and
traversal, clickjacking, buffer overflows, Innovation Officer
6. Practical Programming and Concepts: phishing, Metasploit, social engineering,
The GFACT certification validates a
privilege escalation, kernel exploits,
The module is a student’s first look at practitioner’s knowledge of essential
bypassing UAC, stored credentials, and more!
programming in Python and C. The sections foundational cybersecurity concepts.
incrementally teach what a program is and 12. Network and Computer Infiltration: GFACT-certified professionals are familiar
how it works, before delving into writing This module covers topics and methods with practical skills in computers,
basic programming, and introducing various technology, and security fundamentals
for persistence, lateral movement, and
that are needed to kickstart a career in
strategies, tools, and conventions. These exfiltration. Students learn about indicators of cybersecurity.
sections are lab-heavy, including labs such compromise, ports, Yara, Rootkits, ARP Cache,
as variables in python, user input in python, • Core Computing Components: Hardware
extracting passwords from memory, spotting and Virtualization, Networking, Operating
reading and writing files, using TCP sockets, common exfiltration methods, and more. Systems, Web, Cloud, and Data Storage
printing in C, string handling, and more! Course Summary: • IT Fundamentals and Concepts: Logic and
7. SQL: The summary refreshes the memory as it reviews Programming, Windows, and Linux
This module teaches students about basic all the course material and prepares students for • Security Foundations and Threat
statements, joins, operators and database the final GFACT (GIAC Foundational Cybersecurity Landscape: Concepts, Exploitation and
admins. Learning the fundamentals of SQL Technologies) exam. Mitigation, Forensics and Post Exploitation

You might also like