EC-Council Certified Secure Computer User

The CSCU program enables computer users to build on their existing skills by educating them on practical aspects of security and networking.

Students will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, malwares, loss of confidential information, and social engineering.

Days : 2
Price :

This product is currently out of stock and unavailable.


Who should attend

The CSCU certification program is intended for individuals who use computers and Internet but are not aware of computer security issues. This program gives them a better understanding of the security issues that they may face regularly.


As this is a basic course aimed at certifying computer and internet users, there are no basic requirements to attend. Everyone who uses email, surfs the web, chats on instant messaging, updates their Facebook page, tweets, uses Microsoft application programs, etc., are encouraged to attend this program.

Course Objectives

CSCU security awareness programs mainly focus on Basic Computer Security. Upon completions of the course, a student will know how to:

  • Secure different operating systems
  • Back up data and perform disaster recovery
  • Safeguard their mobile devices from various attacks
  • Become familiar with social engineering and identity theft attacks
  • Install and Configure antiviruses
  • Understand various security incidents
  • Understand to secure their cloud accounts
  • Understand the various security issues on social networking sites

Outline: EC-Council Certified Secure Computer User (CSCU)

Module 1: Introduction to Data Security
  • Data–Digital Building Blocks
  • Importance of Data in the Information Age
  • Threats to Data
  • Data Security
  • Potential Losses Due to Security Attacks
  • Implementing Security
Module 2: Securing Operating Systems
  • Guidelines To Secure Windows
  • Guidelines To Secure Mac OS X
Module 3: Malware and Antiviruses
  • What is Malware
  • Types Of Malware
  • Symptoms Of Malware Infection
  • Antivirus
  • Configuring and Using Antivirus Software
  • How To Test If an Antivirus is Working
Module 4: Internet Security
  • Understanding Web Browser Concepts
  • Understanding IM Security
  • Understanding Child Online Safety
Module 5: Security on Social Networking Sites
  • Understanding Social Networking Concepts
  • Understanding Various Social Networking Security Threats
  • Understanding Facebook Security Settings
  • Understanding Twitter Security Settings
Module 6: Securing Email Communications
  • Understanding Email Security Concepts
  • Understanding Various Email Security Threats
  • Understanding Various Email Security Procedures
Module 7: Securing Mobile Devices
  • Understanding Mobile Device Security Concepts
  • Understanding Threats To a Mobile Device
  • Understanding Various Mobile Security Procedures
  • Understanding How to Secure iPhone and iPad Devices
  • Understanding How to Secure Android Devices
  • Understanding How to Secure Windows Device
  • Mobile Security Tools
Module 8: Securing the Cloud
  • The Concept of Cloud
  • How Cloud Works
  • Threats To Cloud Security
  • Safeguarding Against Cloud Security Threats
  • Cloud Privacy Issues
  • Addressing Cloud Privacy Issues
  • Choosing a Cloud Service Provider
Module 9: Securing the Network Connections
  • Understanding Various Networking Concepts
  • Understanding Setting Up a Wireless Network in Windows
  • Understanding Setting Up a Wireless Network in Mac
  • Understanding Threats to Wireless Network Security and Countermeasures
  • Measures to Secure Network Connections
Module 10: Data Backup and Disaster Recovery
  • Data Backup Concepts
  • Types of Data Backups
  • Windows Backup and Restore Procedures
  • MAC OS X Backup and Restore Procedures
  • Understanding Secure Data Destruction