EC-Council Certified Secure Computer User (CSCU)
Request a Class
9:00am - 4:30pm
The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.
AUDIENCE AND PREREQUISITES
This course is specifically designed for todays' computer users who uses the internet and the www extensively to work, study and play
vendor course description
*Course Cost listed does not include the cost of courseware or lunch, required in your registration. Please refer to your Enrollment Sales Order or Invoice for the additional cost. If you have any questions, please contact us (email@example.com or 207-775-0244). Course subject to minimum enrollment.
Lesson 1: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The Security, Functionality, and Ease of Use Triangle Fundamental Concepts of Security Security Risk to Home Users What to Secure? What Makes a Home Computer Vulnerable? What makes a System Secure? Benfits od Security AwarenessLesson 2: Securing Operating Systems System Security Threats to System Security Guidelines for Windows OS Security Windows Encrypting File System (EFS) Using Windows Defender Enable BitLocker in Windows 7 Launching Event Viewer in Windows 7 Disabling Unnecessary Services in Windows 7 Killing Unwanted Processes Finding Open Ports Using Netstat Tool Configuring Audit Policy How to Hide Files and Folders?. Disable Simple File Sharing in Windows Raise the UAC Slider Bar in Windows 7 Windows Security Tools Guidelines for Securing Mac OS X Operating Systems Security Checklist Security checklist for Windows 7Lesson 3: Protecting System Using Antiviruses Introduction to Antivirus Software Need for Antivirus Program How does Antivirus Software work? Antivirus Software 2011 Choosing the Best Antivirus Software Steps to Install Antivirus on your Computer How to Test if Antivirus is working Configuring McAfee Antivirus Configuring Kaspersky PURE Antivirus Security ChecklistLesson 4: Data Encryption Common Terminologies What is Encryption? Objectives of Encrytion Usage of Encryption Types of Encryption Encryption Standards Digital Certificates How do Digital Certificates work? Digital Signature Cryptography ToolsLesson 5: Data Backup And Disaster Recovery Data Backup Need for Backup Types of Data Loss What Files to Backup and How Ofter? Online Data Backup Online Backup Service Providers Types of Backup Back Up the Data Using Windows Backup Securing Backup on Storage Devices with Encryption Time Machine Data Backup Tools for Windows Data Backup Tools for MAC OS X. Data Recovery Tools for Windows MAC OS X Data Recovery Tool Physical Security Data Backup Checklist Physical Security ChecklistLesson 6: Internet Security Internet Security Internet Explorer Security Settings Understanding Cookies Internet Explorer Privacy Settings Securing File Downloads Mozilla Firefox Security Settings Mozilla Firefox Privacy Settings Securing File Downloads Installing Plugins Google Chrome Privacy Settings Apple Safari Security Settings Testing the Browser for PrivacyLesson 7: Securing Network Connections Home Network Wireless Networks Common Threats to Wireless Network Securing a Wireless Network Using the Network with Windows 7 Using the Network with MAC OS X Network Security Threats Security Network Connections General Security Practices in Home Networking Network Adapters Troubleshooting with Network Adapters Network Security ChecklistLesson 8: Securing Online Transactions Online Shopping Online Banking Credit Card Payments Types of Credit Card Fraud Guidelines for Ensuring Credit Card Safety Securing Online Transactions Online Payment Services SSL and the Padlock Symbol Identifying a Trustworthy Website Identifying an Untrustworthy Website McAfee's Site Advisor Online Transaction Security ChecklistLesson 9: Security Email Communications Email Security Email Security Threats Email Security Procedures Online Email Encryption Services Email Security Tools Email Communication Checklist Email Security ChecklistLesson 10: Social Engineering and Identity Thrft What is Identity Theft? Social Engineering How to Learn if You are a Vistime of Identity Theft? Reporting Identity Theft Prosecuting Identity Theft Protecting From Identity Theft Identity Theft Protection Checklist Computer Based Identity Theft Protection ChecklistLesson 11: Security on Social Networking Sites Social Networking Sites What is a Profile? Top Networking Sites Security Risks Involved with Social Networking Sites Social Networking Threats to Minors Facebook Provacy SettingsLesson 12: Information Security and Legal Compliance HIPPA FERPA PCI DSSLesson 13: Securing Mobile Devices Mobile Device Security Mobile Phone Services IMEI Number Mobile Device Security Risks Threats to Bluetooth Devices Mobile Security Security