EC-Council Certified Secure Computer User (CSCU) v3

Price
$1,095.00 USD

Duration
2 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

The CSCU program is designed to educate students on the safe operation of computers, devices, and networks by focusing on the more practical aspects of networking and security, allowing them to expand their skills. Students will develop a fundamental understanding of computer, device, and network security issues, including identity theft, credit card fraud, online banking phishing scams, malware, loss of sensitive information, and social engineering. This certification is an excellent complement to educational offerings for knowledge workers and end-users interested in becoming secure power users.

Course Objectives

  • Identify the risk associated with various cyber threats
  • Implement data security
  • Secure different operating systems
  • Install and Configure antiviruses
  • Implement basic security measures when online
  • Implement appropriate security measures associated with online social networking
  • Implement various email security measures
  • Safeguard mobile devices from various attacks
  • Secure their cloud accounts
  • Secure network connections
  • Back up data and perform disaster recovery
  • Secure IoT devices and gaming consoles
  • Secure remote working

Who Should Attend?

Any individual who uses computers and surfs the web, social media, email, chats, etc. but is not aware of computer security issues.
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

If you have questions about Learning Credits, please contact your Account Manager.

Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at https://www.newhorizons.com/eligible.

If you have questions about our Corporate Tech Pass, please contact your Account Manager.

Course Prerequisites

Basic knowledge of computers and computing devices.

Agenda

Module 01: Introduction to Data Security

  • Data Loss Statistics Over Time
  • What is Data?
  • What is Data Security?

Module 02: Securing Operating Systems

  • What does an Operating System Do?
  • Guidelines for Windows OS Security
  • Guidelines for Mac OS X Security
  • Resources on the Internet for Computer Security
  • Operating Systems Security Checklist
  • What are Guidelines for Public Computers?

Module 03: Malware and Antivirus

  • New Malware Found – Last 5 Years
  • What is Malware?
  • What is Antivirus?
  • Install Antivirus Software
  • How to Test if Antivirus is Working?
  • Antivirus Security Checklist

Module 04: Internet Security

  • What is Internet Security?
  • What is a Web Browser?
  • What are the Threats to Web Browsers?
  • How to Identify a Secure Website?
  • What is Instant Messaging?
  • Child Online Safety
  • How to Report an Internet Crime?
  • KidZui (Children Friendly Internet Software)

Module 05 Security on Social Networking Sites

  • What are Social Networking Sites?
  • What is Facebook?
  • Facebook Security Tips
  • What is Twitter?
  • Social Networking Security Checklist

Module 06 Securing Email Communications

  • What is Email?
  • What is Encryption?

Module 07 Securing Mobile Devices

  • What is Mobile Device Security?
  • How to Secure iPad?
  • How to Backup Data in iOS Devices?
  • How to Enable Screen Lock in Android Devices?
  • How to Enable Password in Windows Phone Devices?
  • What are Mobile Security Tools?
  • Bluetooth Security Checklist
  • Mobile Phone Security Checklist

Module 08: Securing Cloud

  • What is Cloud Computing?
  • What are the Different types of Cloud?
  • How Cloud Works?
  • What are the Threats to Cloud Security?
  • What Precautions to Take Against Cloud Security Threats?
  • What are the Privacy Issues Faced on Cloud?
  • What Precautions Can Be Taken For Data Privacy?
  • What are the Bases for Choosing a Cloud Service Provider?

Module 09: Securing Network Connections

  • What are Networks?
  • Wi-Fi Vs. Ethernet
  • What are the Duties of Network Administrators?
  • What is a Home Network?
  • What are Wireless Networks?
  • How to Setup a Wireless Network in Mac OS X?
  • How to Set up PC’s Name in Windows 10?
  • How to Set up Workgroup Name in Windows 10?
  • How to Share Files in Windows 10?
  • How to Hide a Folder in a Shared Windows 10 Computer?
  • How to Share a Printer in Windows 10?
  • How to Access Printers on Other PC’s?
  • How to Access Files on Other PC’s?
  • How to Set up PC’s Name in Mac OS X?
  • How to Set up Workgroup Name in Mac OS X?
  • How to Create User Accounts in Mac OS X?
  • How to Create Groups in Mac OS X?
  • How to Share Files and Folders in Mac OS X?
  • How to Share Printer in Mac OS X?
  • How to Access Other Macs on the Common Network?
  • What are the Threats to Wireless Networks?
  • How to Secure Wireless Networks?
  • What are Network Adapters?
  • Home Network Safety Checklist

Module 10: Data Backup and Disaster Recovery

  • What is Data Backup?
  • What are the Reasons for Data Loss?
  • What Files to Backup and How Often?
  • Deleting Vs. Permanent Destruction

Module 11: Securing IoT Devices and Gaming Consoles

  • IoT Devices
  • IoT Devices Risks and Countermeasures
  • Smart Home Systems
  • How to Secure Alexa Devices?
  • IoT children's toys
  • What are Gaming Consoles?
  • Gaming Console Security Risks
  • Securing Gaming Console

Module 12: Secure Remote Working

  • What is Remote Working?
  • Why Security is Important in Remote
  • Working
  • Security Risks in Remote Working
  • How to Mitigate the Security Risks in Remote Working?
  • Digital Security Tips in Remote Working
  • Physical Security Tips in Remote Working
  • Prevent Social Engineering while Remote Working
  • Password Protection Tips
  • Secure Remote Working Checklist
  • Secure Video Conferencing: Zoom Meeting Security Best Practices
  • Secure Video Conferencing: Microsoft Teams Security Best Practices
  • Do’s and Don’ts for Remote Working
 

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
 
Contact Us about Starting Your Business Training Strategy with New Horizons