Join our scheduled public courses to expand your knowledge, connect with industry peers, and grow your professional network. • Scheduled regularly at convenient locations. • Open to professionals from various organizations. • Comprehensive curriculum covering key industry topics. • Networking opportunities with peers from different sectors.
Benefit from tailored training programs delivered at your location, addressing your specific organizational needs and goals. • Customized training programs tailored to your organization’s needs. • Conducted at your location for convenience and relevance. • Focused on specific challenges and objectives of your team. • Hands-on, practical sessions to enhance learning and application.
Experience interactive online training sessions that offer flexibility and real-time engagement, accessible from anywhere in the world. • Interactive online sessions with expert instructors. • Flexible scheduling to accommodate different time zones. • Real-time engagement and Q&A for immediate feedback. • Access to digital resources and recorded sessions for future reference.
Course Overview
The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets.
This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, seks offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.
This course prepares an individual to sit for CSCU exam 112-12 This certification is an excellent complement to educational offerings in the domain of security and networking.
Course Duration
2 Days (16 Hours)
Target Audience
This course is specifically designed for todays’ computer users who use
the internet extensively to work, study and play.
Learning Objectives
1. Understand the importance of data backup and disaster
recovery, and implement strategies to protect data integrity.
2. Identify various data security threats, including malware, and apply measures to prevent and respond to them.
3. Secure operating systems by learning specific guidelines for Windows and Mac OS X, including the use of antivirus software.
4. Navigate internet and social networking sites securely, understanding browser security, instant messaging, child online safety, and the privacy settings on platforms like Facebook and Twitter.
5. Enhance email security through an in-depth understanding of email threats and secure communication practices.
6. Apply security measures to mobile devices, including iPhones, iPads, Androids, and Windows devices, and utilize mobile security tools.
7. Recognize the potential security threats in cloud computing and implement safeguards to protect cloud-based data.
8. Comprehend networking concepts, set up secure wireless networks for Windows and Mac, and deploy countermeasures against wireless security threats.
9. Implement data backup procedures for both Windows and Mac OS X, ensuring the ability to restore data when necessary.
10. Execute secure data destruction techniques to permanently erase sensitive information and prevent unauthorized recovery.
5. Course Content
Domain 1: Introduction to Data Security
Lesson 1: Understanding Data – Digital Building Blocks
Lesson 2: Understanding and Implementing Data Security
Domain 2: Data Security Threats
Lesson 1: Overview of Data Security Threats
Lesson 2: Overview of Malware
Lesson 3: Understanding Internet and Social Networking Security Threats
Lesson 4: Understanding Email Security Threats
Lesson 5: Understanding Mobile Device Security Threats
Lesson 6: Understanding Wireless and Cloud Security Threats
Domain 3: Operating Systems Security
Lesson 1: Guidelines to Secure Windows Operating Systems
Lesson 2: Guidelines to Secure Mac OS X
Lesson 3: Overview of Antivirus
Domain 4: Internet and Social Networking Sites Security
Lesson 1: Understanding Web Browser Concepts
Lesson 2: Understanding IM Security
Lesson 3: Understanding Child Online Safety
Lesson 4: Understanding Social Networking Concepts
Lesson 5: Understanding Facebook and Twitter Security Settings
Domain 5: Email Communication and Mobile Device Security
Lesson 1: Understanding Email Security Concepts
Lesson 2: Understanding Various Email Security Procedures
Lesson 3: Understanding Mobile Device Security Concepts
Lesson 4: Understanding Various Mobile Security Procedures
Lesson 5: Understanding How to Secure iPhone, iPad, Android, and Windows Devices
Lesson 6: Overview of Mobile Security Tools
Domain 6: Cloud and Network Connection Security
Lesson 1: Understanding Cloud Concepts
Lesson 2: Safeguarding Against Cloud Security Threats
Lesson 3: Understanding Cloud Privacy Issues
Lesson 4: Understanding Various Networking Concepts
Lesson 5: Understanding Setting Up a Wireless Network in
Windows and Mac
Lesson 6: Understanding Wireless Network Security Countermeasures
Domain 7: Data Backup and Disaster Recovery
Lesson 1: Overview of Data Backup Concepts
Lesson 2: Understanding Windows/MAC OS X Backup andRestore Procedures
Lesson 3: Understanding Secure Data Destruction
Prerequisites
Attendees should meet the following prerequisites:
To successfully undertake training in the Certified Secure Computer User (CSCU) course, the following minimum prerequisites are recommended:
Basic understanding of computer and internet usage
Familiarity with operating systems, such as Windows or Mac OS
Awareness of common internet applications, such as web browsers, email, and social networking sites
An interest in learning about cybersecurity and data protection practices
These prerequisites are designed to ensure that participants can fully engage with the course content and benefit from the training.
No advanced technical skills are required, making the CSCU course suitable for individuals looking to enhance their cybersecurity knowledge for personal or professional use.
8. Technical Requirement
1. Laptop with minimum 8GB Ram
2. Connected Monitor for iLabs.
3. Hi speed Internet Connection as All the labs it will be accessed through EC-Council Cloud
9. Exam Voucher Validity
It will be valid for 12month starting from the last day of the course.
10. Certification Expiry
It will be valid for 3 years.