Certified Secure Computer user

Certified Secure Computer User Certification (CSCU)

Descriptif du cours

Le but du programme de formation CSCU est de fournir aux étudiants les connaissances et les compétences nécessaires pour protéger leurs actifs informationnels. Cette classe sera immerger les élèves dans un environnement interactif où ils pourront acquérir la compréhension fondamentale de diverses menaces de sécurité informatique et de réseau, tels que le vol d'identité, la fraude par carte de crédit, les escroqueries bancaires de phishing en ligne, les virus et les backdoors, les courriels canulars, les délinquants sexuels qui se cache en ligne, la perte de informations confidentielles, attaques de pirates et de l'ingénierie sociale. Plus important encore, les compétences acquises à partir de la classe aide les élèves à prendre les mesures nécessaires pour atténuer leur exposition de sécurité.

Sur la Formation

Qu'allez vous apprendre

Programme journalier

  • JOUR I
    • Module 01: Foundations of Security
      • 01. Essential Terminologies
      • 02. Computer Security
      • 03. Why Security?
      • 04. Potential Losses Due to Security Attacks
      • 05. Elements of Security
      • 06. The Security, Functionality, and Ease of Use Triangle
      • 07. Fundamental Concepts of Security
      • 08. Layers of Security
      • 09. Security Risk to Home Users
      • 10. What to Secure?
      • 11. What Makes a Home Computer Vulnerable?
      • 12. What makes a System Secure?
      • 13. Benefits of Computer Security Awareness
      • 15. Basic Computer Security Checklist
    • Module 02: Securing Operating Systems
      • 01. System Security
      • 02. Threats to System Security
      • 03. Guidelines for Windows OS Security
      • 04. Windows Encrypting File System (EFS)
      • 05. Using Windows Defender
      • 06. Enable BitLocker in Windows
      • 07. Launching Event Viewer in Windows
      • 08. Disabling Unnecessary Services in Windows
      • 09. Killing Unwanted Processes
      • 10. Finding Open Ports Using Netstat Tool
      • 11. Configuring Audit Policy
      • 12. How to Hide Files and Folders?
      • 13. Disable Simple File Sharing in Windows
      • 14. Raise the UAC Slider Bar in Wind
      • 15. Windows Security Tools
      • 16. Guidelines for Securing Mac OS X
      • 17. Operating Systems Security Checklist
      • 18. Security Checklist for Win
      • 19. MAC OS Security Checklist
    • Module 3: Protecting System Using Antiviruses
      • 01. Introduction to Antivirus Software
      • 02. Need for Antivirus Program
      • 03. How Does Antivirus Software Work?
      • 04. Antivirus Software 2011
      • 05. Choosing the Best Antivirus Software
      • 06. Steps to Install Antivirus on Your Computer
      • 07. How to Test If Antivirus Is Working
      • 08. Configuring McAfee Antivirus
      • 09. Configuring Kaspersky PURE
      • 10. Antivirus Security Checklist
    • Module 4: Data Encryption
      • 01. Common Terminologies
      • 02. What is Encryption?
      • 03. Objectives of Encryption
      • 04. Usage of Encryption
      • 05. Types of Encryption
      • 06. Encryption Standards
      • 07. Digital Certificates
      • 08. How Digital Certificates Work?
      • 05. Digital Signature
      • 06. Cryptography Tools
    • Module 5: Data Backup and Disaster Recovery
      • 01. Data Backup
      • 02. Need for Backup
      • 03. Types of Data Loss
      • 04. What Files to Backup and How Often?
      • 05. Online Data Backup
      • 06. Online Backup Service Providers
      • 07. Types of Backup
      • 08. Back Up the Data Using Windows Backup
      • 05. Securing Backup on Storage Devices with Encryption
      • 06. Time Machine (Apple Software)
      • 07. Data Backup Tools for Windows
      • 08. Data Backup Tools for MAC OS X
      • 09. Data Recovery Tools for Windows
      • 10. MAC OS X Data Recovery Tool
      • 11. Physical Security
      • 12. Data Backup Checklist
      • 13. Physical Security Checklist
    • Module 6: Internet Security
      • 01. Internet Security
      • 02. Internet Explorer Security Settings
      • 03. Understanding Cookies
      • 04. Internet Explorer Privacy Settings
      • 05. Securing File Downloads
      • 06. Mozilla Firefox Security Settings
      • 07. Mozilla Firefox: Privacy Settings
      • 08. Securing File Downloads
      • 05. Installing Plugins
      • 06. Google Chrome Privacy and Security Settings
      • 07. Apple Safari Security Settings
      • 08. Testing the Browser for Privacy
      • 09. Instant Messaging (IMing)
      • 10. Searching the Web
      • 11. Online Gaming and MMORPG
      • 12. Protection Schemes, Cyber Prostitution, and Virtual Mugging
      • 13. How the Malicious Users Make Money?
      • 14. Security Practices Specific to Gaming
      • 15. Child Online Safety
      • 16. Role of Internet in Child Pornography
      • 17. Unsolicited Emails
      • 18. Chat Rooms
      • 19. Finding if Children are at Risk Online
      • 20. Protecting Children from Online Threats
      • 21. Encourage Children to Report
      • 22. Role of Internet in Child Pornography
      • 23. How to Report a Crime?
      • 24. Security Software Checklist
      • 25. Actions to Take When the Child Becomes an Online Victim
      • 26. Internet laws
      • 27. Laws Internet users should know
      • 28. Internet Security Checklist
      • 29. Role of Internet in Child Pornography
      • 30. Guidelines for Parents to Protect Children from Online Threats
    • Module 7: Securing Network Connections
      • 01. Home Network
      • 02. Wireless Networks
      • 03. Common Threats to Wireless Network
      • 04. Securing Wireless Network
      • 05. Using the Network with Windows 7
      • 06. Using the Network with MAC OS X
      • 07. Network Security Threats
      • 08. Securing Network Connections
      • 05. General Security Practices in Home Networking
      • 06. Network Adapters
      • 07. Troubleshooting with Network Adapters
      • 08. Network Security Checklist
    • JOUR II
      • Module 08: Securing Online Transactions
        • 01. Online Shopping
        • 02. Online Banking
        • 03. Credit Cards Payments
        • 04. Types of Credit Card Frauds
        • 05. Guidelines for Ensuring Credit Card Safety
        • 06. Securing Online Transactions
        • 07. Online Payment Services
        • 08. SSL and the Padlock Symbol
        • 09. Identifying a Trustworthy Website
        • 10. Identifying an Untrustworthy Website
        • 11. McAfee’s Site Advisor
        • 02. Online Transactions Security Checklist
      • Module 9: Securing Email Communications
        • 01. Email Security
        • 02. Email Security Threats
        • 03. Email Security Procedures
        • 04. Online Email Encryption Service
        • 05. Email Security Tools
        • 06. Email Communication Checklist
        • 07. Email Security Checklist
        • 08. Security Checklist for Checking Emails on Mobile
      • Module 10: Social Engineering and Identity Theft
        • 01. What Is Identity Theft?
        • 02. Social Engineering
        • 03. How to Learn if You Are a Victim of Identity Theft
        • 04. What to Do if Identity Is Stolen
        • 05. Reporting Identity Theft
        • 06. Prosecuting Identity Theft
        • 07. Protecting from Identity Theft
        • 08. Identity Theft Protection Checklist
        • 09. Computer Based Identity Theft Protection Checklist
      • Module 11: Security on Social Networking Sites
        • 01. Social Networking Sites
        • 02. What Is a Profile?
        • 03. Top Social Networking Sites
        • 04. Security Risks Involved in Social Networking Sites
        • 05. Social Networking Threats to Minors
        • 06. Facebook Privacy Settings
        • 07. Staying Safe on MySpace
        • 08. Social Networking Security Checklist
        • 09. Social Networking Security Checklist for Parents and Teachers
      • Module 12: Information Security and Legal Compliance
        • 01. HIPPA
        • 02. FERPA
        • 03. PCI DSS
      • Module 13: Securing Mobile Devices
        • 01. Mobile Device Security
        • 02. Mobile Phone Services
        • 03. IMEI Number
        • 04. Mobile Device Security Risks
        • 05. Threats to Bluetooth Devices
        • 06. Mobile Security Procedures
        • 07. Securing iPhone and iPad
        • 08. Securing Blackberry and Windows Phone 7 Mobiles
        • 09. Mobile Security Tools
        • 10. Bluetooth Security Checklist
        • 11. Mobile Phone Security Checklist

Voir la brochure et le descriptif complet de la formation

Pas de prérequis nécessaire pour ce programme.

Ils nous font Confiance

"Making the simple complicated is commonplace; making the complicated simple, awesomely simple, that's creativity"
- Charles Mingus