Certified Secure Computer User | CSCU

Certified Secure Computer User | CSCU

Elevate your knowledge with this Introduction to Cybersecurity course!

The Certified Secure Computer User (CSCU) training equips students with essential skills to safeguard their information assets. Through an engaging, hands-on experience, students will gain a solid understanding of various cyber threats, including identity theft, credit card fraud, phishing, malware, hacking attacks, and social engineering. More importantly, this course teaches practical steps to reduce security risks and enhance digital protection.

     Start learning today and take control of your online safety!

Duration: 45 Days

Topics Covered in CSCU:

Course Outline

Module 1:

Introduction To Data Security

  • Data–Digital Building Blocks

  • Importance of Data in the Information Age

  • Threats to Data

  • Data Security

  • Potential Losses Due to Security Attacks

  • Implementing Security

Module 2:

Securing Operating Systems

  • Guidelines To Secure Windows

  • Guidelines To Secure Mac OS X

Module 3:

Malware and Antiviruses

  • What is Malware

  • Types Of Malware

  • Symptoms Of Malware Infection

  • Antivirus

  • Configuring and Using Antivirus Software

  • How To Test If an Antivirus is Working

Module 4: 

Internet Security

  • Understanding Web Browser Concepts

  • Understanding IM Security

  • Understanding Child Online Safety

Module 5:

Security on Socila Networking Sites

  • Understanding Social Networking Concepts

  • Understanding Various Social Networking Security Threats

  • Understanding Facebook Security Settings

  • Understanding Twitter Security Settings

Module 6:

Securing Email Communications

  • Understanding Email Security Concepts

  • Understanding Various Email Security Threats

  • Understanding Various Email Security Procedures

Module 7:

Securing Mobile Devices

  • Understanding Mobile Device Security Concepts

  • Understanding Threats To a Mobile Device

  • Understanding Various Mobile Security Procedures

  • Understanding How to Secure iPhone and iPad Devices

  • Understanding How to Secure Android Devices

  • Understanding How to Secure Windows Device

  • Mobile Security Tools

Module 8:

Securing the Cloud

  • The Concept of Cloud

  • How Cloud Works

  • Threats To Cloud Security

  • Safeguarding Against Cloud Security Threats

  • Cloud Privacy Issues

  • Addressing Cloud Privacy Issues

  • Choosing a Cloud Service Provider

Module 9:

Securing Network Connections

  • Understanding Various Networking Concepts

  • Understanding Setting Up a Wireless Network in Windows

  • Understanding Setting Up a Wireless Network in Mac

  • Understanding Threats to Wireless Network Security and

    Countermeasures.

  • Measures to Secure Network Connections

Module 10:

Data Backup and Disaster Recovery

  • Data Backup Concepts

  • Types of Data Backups

  • Windows Backup and Restore Procedures

  • MAC OS X Backup and Restore Procedures

  • Understanding Secure Data Destruction