EC-Council Certified Secure Computer User (CSCU)

Price
$1,095.00
Duration
 2 Days
Delivery Methods
 VILT    Private Group
Eligible UT Programs: Learning Credits, Coupons, Technical Training Pass, Training Passport

This course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life. It teaches basic techniques of being secure both online and offline.

 

Upcoming Class Dates and Times

This class is not currently scheduled.
Contact us and we will help you get the training you need!

Who Should Attend

This course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life. It teaches basic techniques of being secure both online and offline.

Course Objectives

    • Understand the need and importance of data security.
    • Implement Operating System security measures on their computers.
    • Understand Malware and its symptoms.
    • Make an informed decision about choosing the antivirus which is most relevant to their needs.
    • Understand the risks associated with different online activities.
    • Understand why and how to secure web browsers.
    • Identify safe websites.
    • Safeguard against the threats associated with online social networking.
    • Understand how to make their social networking accounts secure.
    • Understand the threats associated with email communications and how to safeguard against them.
    • Understand the threats to mobile devices and how to safeguard against them.
    • Understand the threats associated with cloud accounts and how to safeguard against them.
    • Make an informed decision about a cloud service provider which fulfills their requirements.
    • Understand the various types of networks and the threats associated with them.
    • Configure a home network.
    • Make their networks secure.
    • Understand the threats to data and the need for data backups.
    • Back up and restore data on their computers.
    • Destroy data permanently.

Agenda

1 - Introduction to Security
  • Data–Digital Building Blocks
  • Importance of Data in the Information Age
  • Threats to Data
  • Data Security
  • Potential Losses Due to Security Attacks
  • Implementing Security
2 - Securing Operating Systems
  • Guidelines To Secure Windows
  • Guidelines To Secure MacOS X
3 - Malware and Antiviruses
  • What is Malware
  • Types Of Malware
  • Symptoms Of Malware Infection
  • Antivirus
  • Configuring and Using Antivirus Software
  • How To Test If an Antivirus is Working
4 - Internet Security
  • Understanding Web Browser Concepts
  • Understanding IM Security
  • Understanding Child Online Safety
5 - Security On Social Networking Sites
  • Understanding Social Networking Concepts
  • Understanding Various Social Networking Security Threats
  • Understanding Facebook Security Settings
  • Understanding Twitter Security Settings
6 - Securing Email Communications
  • Understanding Email Security Concepts
  • Understanding Various Email Security Threats
  • Understanding Various Email Security Procedures
7 - Securing Mobile Devices
  • Understanding Mobile Device Security Concepts
  • Understanding Threats To a Mobile Device
  • Understanding Various Mobile Security Procedures
  • Understanding How to Secure iPhone and iPad Devices
  • Understanding How to Secure Android Devices
  • Understanding How to Secure Windows Device
  • Mobile Security Tools
8 - Securing the Cloud
  • The Concept of Cloud
  • How Cloud Works
  • Threats To Cloud Security
  • Safeguarding Against Cloud Security Threats
  • Cloud Privacy Issues
  • Addressing Cloud Privacy Issues
  • Choosing a Cloud Service Provider
9 - Securing Network Connections
  • Understanding Various Networking Concepts
  • Understanding Setting Up a Wireless Network in Windows
  • Understanding Setting Up a Wireless Network in Mac
  • Understanding Threats to Wireless Network Security and Countermeasures
  • Measures to Secure Network Connections
10 - Data Backup and Disaster Recovery
  • Data Backup Concepts
  • Types of Data Backups
  • Windows Backup and Restore Procedures
  • MAC OS X Backup and Restore Procedures
  • Understanding Secure Data Destruction
 

Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with United Training