SEC301: Introduction to Cyber Security

Course Overview

This five-day comprehensive course covers everything from core terminology to the how computers and networks function, security policies, risk management, a new way of looking at passwords, cryptographic principles, network attacks & malware, wireless security, firewalls and many other security technologies, web & browser security, backups, virtual machines & cloud computing. All topics are covered at an easy to understand introductory level. This course is for those who have very little knowledge of computers & technology with no prior knowledge of cyber security. The hands-on, step-bystep teaching approach enables you to grasp all the information presented, even if some of the topics are new to you. You'll learn real-world cyber security fundamentals to serve as the foundation of your career skills and knowledge for years to come.


  • SEC301.1: Security's Foundation
  • SEC301.2: Computer Function and Networking
  • SEC301.3: An Introduction to Cryptography
  • SEC301.4: Cyber Security Technologies - Part 1
  • SEC301.5: Cyber Security Technologies - Part 2


In Person (5 days) / Online - Access Period: 4 months

Course Authors

  • Keith Palmgren, Senior Instructor

What You Will Learn

  • Communicate with confidence regarding information security topics, terms, and concepts
  • Understand and apply the Principles of Least Privilege
  • Understand and apply the Confidentiality, Integrity, and Availability (CIA) for prioritization of critical security resources
  • Build better passwords that are more secure while also being easier to remember and type
  • Grasp basic cryptographic principles, processes, procedures, and applications
  • Understand how a computer works
  • Understand computer network basics
  • Have a fundamental grasp of any number of technical acronyms: TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS, and the list goes on.
  • Utilize built-in Windows tools to see your network settings
  • Recognize and be able to discuss various security technologies, including antimalware, firewalls, intrusion detection systems, sniffers, ethical hacking, active defense, and threat hunting.