• E-learning

CSCU – Certified Secure Computer User

Com certificação

Certified Associated in Project Management (CAPM®)


Soar to new Heights with this introduction to cyber security!

The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

 

Exame:

  • Exam Name: CSCU (112-12) Exam
  • Credit Towards Certification: Secure Computer User Specialist (CSCU)
  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 Hours
  • Test Format: Multiple Choice
  • Test Delivery: EC-Council Exam Portal

 

Este curso e-learning inclui

  • Acesso durante 1 ano
  • Acesso iLabs – Virtual lab platform – Acesso durante 6 meses
  • Certificado de participação
  • Voucher de exame de certificação

 

Este curso também está disponível no formato Presencial / Live Training. Para mais informações aceda ao link: Certified Secure Computer User (CSCU) 

Destinatários

This course is specifically designed for today’s computer user! As the internet is quickly moving into a necessity, so is the need to learn how to safely browse, watch videos, send an email, and even work online!

Programa

  • Introduction to Data Security
  • Securing Operating Systems
  • Malware and Antiviruses
  • Internet Security
  • Security on Social Networking Sites
  • Securing Email Communications
  • Securing Mobile Devices
  • Securing The Cloud
  • Securing Network Connections
  • Data Backup and Disaster Recovery

Introduction to Data Security

  • Data–Digital Building Blocks
  • Importance of Data in the Information Age
  • Threats to Data
  • Data Security
  • Potential Losses Due to Security Attacks
  • Implementing Security

Securing Operating Systems

  • Guidelines To Secure Windows
  • Guidelines To Secure Mac OS X

Malware and Antiviruses

  • What is Malware
  • Types Of Malware
  • Symptoms Of Malware Infection
  • Antivirus
  • Configuring and Using Antivirus Software
  • How To Test If an Antivirus is Working

Internet Security

  • Understanding Web Browser Concepts
  • Understanding IM Security
  • Understanding Child Online Safety

Security on Social Networking Sites

  • Understanding Social Networking Concepts
  • Understanding Various Social Networking Security Threats
  • Understanding Facebook Security Settings
  • Understanding Twitter Security Settings

Securing Email Communications

  • Understanding Email Security Concepts
  • Understanding Various Email Security Threats
  • Understanding Various Email Security Procedures

Securing Mobile Devices

  • Understanding Mobile Device Security Concepts
  • Understanding Threats To a Mobile Device
  • Understanding Various Mobile Security Procedures
  • Understanding How to Secure iPhone and iPad Devices
  • Understanding How to Secure Android Devices
  • Understanding How to Secure Windows Device
  • Mobile Security Tools

Securing The Cloud

  • The Concept of Cloud
  • How Cloud Works
  • Threats To Cloud Security
  • Safeguarding Against Cloud Security Threats
  • Cloud Privacy Issues
  • Addressing Cloud Privacy Issues
  • Choosing a Cloud Service Provider

Securing Network Connections

  • Understanding Various Networking Concepts
  • Understanding Setting Up a Wireless Network in Windows
  • Understanding Setting Up a Wireless Network in Mac
  • Understanding Threats to Wireless Network Security and Countermeasures
  • Measures to Secure Network Connections

Data Backup and Disaster Recovery

  • Data Backup Concepts
  • Types of Data Backups
  • Windows Backup and Restore Procedures
  • MAC OS X Backup and Restore Procedures
  • Understanding Secure Data Destruction

CSCU – Certified Secure Computer User

Área

Dados

Como chegou até nós

Os seus dados pessoais são recolhidos em conformidade com o Regulamento Geral de Proteção de Dados (RGPD).

Consente que os seus dados sejam utilizados, nos termos da nossa Politica de Privacidade, para o contacto/envio de:

Ações de informação, de marketing de produtos e serviços, como campanhas e eventos?

Para mais informações, consulte a Política de Privacidade do Grupo Rumos.
pode retirar o seu consentimento a qualquer momento através do botão Cancelar subscrição ou Unsubscribe que estão presentes em cada comunicação enviada, bem como exercer os direitos descritos na politica de privacidade