EC-Council Certified Secure Computer User (CSCU)
CLASS DATE(s):
Request a Class

COURSE LENGTH: 2 Days

COURSE COST: $625.00

COURSE TIMES: 9:00am - 4:30pm

Printable version of this course
print

COURSE OVERVIEW

The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.

AUDIENCE AND PREREQUISITES

This course is specifically designed for todays' computer users who uses the internet and the www extensively to work, study and play

 

vendor course description

*Course Cost listed does not include the cost of courseware or lunch, required in your registration. Please refer to your Enrollment Sales Order or Invoice for the additional cost. If you have any questions, please contact us (learn@vtec.org or 207-775-0244). Course subject to minimum enrollment.

COURSE TOPICS:


Lesson 1: Foundations of Security
Essential Terminologies
Computer Security
Why Security?
Potential Losses Due to Security Attacks
Elements of Security
The Security, Functionality, and Ease of Use Triangle
Fundamental Concepts of Security
Security Risk to Home Users
What to Secure?
What Makes a Home Computer Vulnerable?
What makes a System Secure?
Benfits od Security Awareness

Lesson 2: Securing Operating Systems
System Security
Threats to System Security
Guidelines for Windows OS Security
Windows Encrypting File System (EFS)
Using Windows Defender
Enable BitLocker in Windows 7
Launching Event Viewer in Windows 7
Disabling Unnecessary Services in Windows 7
Killing Unwanted Processes
Finding Open Ports Using Netstat Tool
Configuring Audit Policy
How to Hide Files and Folders?

.
Disable Simple File Sharing in Windows
Raise the UAC Slider Bar in Windows 7
Windows Security Tools
Guidelines for Securing Mac OS X
Operating Systems Security Checklist
Security checklist for Windows 7

Lesson 3: Protecting System Using Antiviruses
Introduction to Antivirus Software
Need for Antivirus Program
How does Antivirus Software work?
Antivirus Software 2011
Choosing the Best Antivirus Software
Steps to Install Antivirus on your Computer
How to Test if Antivirus is working
Configuring McAfee Antivirus
Configuring Kaspersky PURE
Antivirus Security Checklist

Lesson 4: Data Encryption
Common Terminologies
What is Encryption?
Objectives of Encrytion
Usage of Encryption
Types of Encryption
Encryption Standards
Digital Certificates
How do Digital Certificates work?
Digital Signature
Cryptography Tools

Lesson 5: Data Backup And Disaster Recovery
Data Backup
Need for Backup
Types of Data Loss
What Files to Backup and How Ofter?
Online Data Backup
Online Backup Service Providers
Types of Backup
Back Up the Data Using Windows Backup
Securing Backup on Storage Devices with Encryption
Time Machine
Data Backup Tools for Windows
Data Backup Tools for MAC OS X

.
Data Recovery Tools for Windows
MAC OS X Data Recovery Tool
Physical Security
Data Backup Checklist
Physical Security Checklist

Lesson 6: Internet Security
Internet Security
Internet Explorer Security Settings
Understanding Cookies
Internet Explorer Privacy Settings
Securing File Downloads
Mozilla Firefox Security Settings
Mozilla Firefox Privacy Settings
Securing File Downloads
Installing Plugins
Google Chrome Privacy Settings
Apple Safari Security Settings
Testing the Browser for Privacy

Lesson 7: Securing Network Connections
Home Network
Wireless Networks
Common Threats to Wireless Network
Securing a Wireless Network
Using the Network with Windows 7
Using the Network with MAC OS X
Network Security Threats
Security Network Connections
General Security Practices in Home Networking
Network Adapters
Troubleshooting with Network Adapters
Network Security Checklist

Lesson 8: Securing Online Transactions
Online Shopping
Online Banking
Credit Card Payments
Types of Credit Card Fraud
Guidelines for Ensuring Credit Card Safety
Securing Online Transactions
Online Payment Services
SSL and the Padlock Symbol
Identifying a Trustworthy Website
Identifying an Untrustworthy Website
McAfee's Site Advisor
Online Transaction Security Checklist

Lesson 9: Security Email Communications
Email Security
Email Security Threats
Email Security Procedures
Online Email Encryption Services
Email Security Tools
Email Communication Checklist
Email Security Checklist

Lesson 10: Social Engineering and Identity Thrft
What is Identity Theft?
Social Engineering
How to Learn if You are a Vistime of Identity Theft?
Reporting Identity Theft
Prosecuting Identity Theft
Protecting From Identity Theft
Identity Theft Protection Checklist
Computer Based Identity Theft Protection Checklist

Lesson 11: Security on Social Networking Sites
Social Networking Sites
What is a Profile?
Top Networking Sites
Security Risks Involved with Social Networking Sites
Social Networking Threats to Minors
Facebook Provacy Settings

Lesson 12: Information Security and Legal Compliance
HIPPA
FERPA
PCI DSS

Lesson 13: Securing Mobile Devices
Mobile Device Security
Mobile Phone Services
IMEI Number
Mobile Device Security Risks
Threats to Bluetooth Devices
Mobile Security
Security