SlideShare a Scribd company logo
1 of 7
Download to read offline
Page 1 Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified
Secure Computer User
Exam Info
Exam Name
CSCU (112-12) Exam
Credit Towards Certification
 Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
CSCU certification.
Exam Details
 Number of Questions: 50
 Passing Score: 70%
 Test Duration: 2 Hours
 Test Format: Multiple Choice
 Test Delivery: EC-Council Exam Portal
Skills Measured
The exam 112-12 tests CSCU candidates on the following 13 domains.
1. Foundations of Security
2. Securing Operating Systems
3. Protecting Systems Using Antiviruses
4. Data Encryption
5. Data Backup and Disaster Recovery
6. Internet Security
7. Securing Network Connections
Page 2 Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
8. Securing Online Transactions
9. Securing Email Communications
10. Social Engineering and Identity Theft
11. Security on Social Networking Sites
12. Information Security and Legal Compliance
13. Securing Mobile Devices
Test Objectives
CSCU Module 01: Foundations of Security
 Discuss computer security scenario
 Highlight various factors that affect information security
 Discuss key elements of information security
 Explain fundamental concepts of computer Security
 Discuss Security, Functionality, and Ease of Use Triangle
 Describe various layers of information and computer security
 Discuss different security risks to home users
 Highlight the information system assets that need to be protected from cybercriminals and other security
incidents
 Discuss various factors that make a home computer vulnerable to security breaches
 Provide a basic understanding of measures to make a system secure
 Explain the benefits of computer security awareness
 Provide a basic computer security checklist
CSCU Module 02: Securing Operating Systems
 Explain various threats to computer system security including malware attacks and password cracking
 Discuss different ways of malware propagation
 Provide guidelines for Windows Operating System (OS) security
 Illustrate different measures to secure Windows OS such as locking the system, creating strong
passwords, disabling unwanted accounts, updating and patching OS and applications, configuring
Windows firewall, etc.
 Discuss the Windows Encrypting File System (EFS) and explain how to encrypt and decrypt files in Window
 Explain the usage of Windows security utilities such as Windows Defender and BitLocker
 Discuss the use of Event Viewer
 Illustrate how to disable/kill unnecessary services and processes in Windows 7
 Discuss the threats of open ports and explain how to detect open ports
 Discuss the role of audit policies in Windows security
Page 3 Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
 Explain how to hide files and folders, and disable simple file sharing in Windows
 Discuss the benefits of the UAC slider bar in Windows 7
 Provide security tools that can be used to enhance Windows security such as Microsoft Security
Essentials, KeePass Password Safe Portable, Registry Mechanic and Windows Defender
 Provide guidelines for securing Mac OS X
 Illustrate the different measures to secure Mac OS X such as enabling and locking down the login window,
configuring account preferences, creating accounts, securing the guest accounts, controlling local
accounts with parental controls, using keychain settings, and using apple software update.
 Illustrate how to secure date & time preferences, configure network preferences, enable screen saver
password, and set up FileVault to keep home folder secure
 Explain firewall security in Mac OS X
 Provide security checklists for Windows 7 and Mac OS X OSs
CSCU Module 03: Protecting Systems Using Antiviruses
 Discuss different types of antivirus software
 Explain the need for an antivirus program
 Provide a brief understating of how antivirus software work
 Discuss various factors that help in choosing the best antivirus software
 Provide general steps to install antivirus applications
 Provide a simple test to check if the antivirus is working
 Explain the steps to install and configure popular antivirus programs such as McAfee and Kaspersky PURE
antivirus programs
 Provide a checklist to enhance system security using antivirus programs
CSCU Module 04: Data Encryption
 Explain the basic encryption concepts
 Describe the usage of encryption
 Discuss the different types of encryption
 Explain the concept of digital certificates and how they work
 Discuss the use of digital signatures to secure communication
 Explain how digital signature works
 Discuss the usage of various data encryption tools such as TrueCrypt
CSCU Module 05: Data Backup and Disaster Recovery
 Explain the need of data backup
 Discuss various factors that determine a data backup plan such as what files and how often to backup
 Explain the importance of online data backup
Page 4 Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
 Provide a list of online backup service providers
 Discuss the different types of backups
 Explain Windows 7 backup and restore procedures
 Discuss the use of encryption for protecting backup data
 Explain MAC OS X backup and restore procedures using TimeMachine
 Describe how to use data backup tools on Windows and Mac OS X OSs
 Provide a list of data recovery tools for Windows and Mac OS X OSs
 Explain the need of physical security
 Discuss various physical security measures such as locks, biometrics, and fire prevention
 Provide guidelines to secure laptops from theft
 Provide a checklist for an effective data backup
 Provide a checklist to ensure physical security of computer systems
CSCU Module 06: Internet Security
 Discuss various Internet security threats
 Explain various techniques to secure Internet Explorer such as configuring Internet, Intranet, Trusted and
Restricted zone, cookie settings, privacy settings, securing ActiveX Controls, deleting Browsing History and
securing file downloads
 Illustrate various Mozilla Firefox security settings including privacy settings, secure downloads, and how to
install Plugins
 Explain various Google Chrome privacy and security settings
 Explain various Apple Safari security settings
 Describe how to test browsers for privacy
 Explain various search engine and Instant Messaging (IM) security issues
 Discuss the different security measures for search engine and IM security
 Describe the different threats of online games and Discuss security practices to stay safe while gaming
 Discuss various child online safety issues
 Explain the role of the Internet in child related crimes
 Provide guideline to find if children are at risk online
 Discuss various measures to protect children from online threats
 Explain how to report an online crime against a child
 Provide a list of actions to take when the child becomes an online victim
 List laws that a user needs to be aware of for online security
 Provide a checklist for Internet security
 Provide a checklist for parents to protect their child from online threats
Page 5 Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 07: Securing Network Connections
 Discuss home and wireless networking basics
 Describe general steps to set up a home network
 Explain the process of setting up a wireless network in Windows 7 and Mac environment
 Discuss various wireless network security threats
 Provide guidelines to secure wireless network
 Explain various techniques for securely using the network in Windows 7 environment including setting up
a PC’s name and workgroup name in Windows 7, sharing, transferring files, simple file sharing , hiding a
shared disk or folder, sharing printers, accessing files on other PCs and Windows Easy Transfer
 Discuss various measures for securely using the network in MAC OS X environment including setting up
the PC’s name, setting up the workgroup name, creating user accounts and groups, sharing files and
folders, sharing printers, and accessing other Macs on the network
 Describe various network security threats
 Illustrate the different measures to secure network connections such as use of firewall, antivirus
programs, strong passwords, making regular backups, and encryption
 Explain how to identify a secure website
 Provide general security practices for home networking
 Discuss basic networking problems and how to troubleshoot these problems
 Provide a checklist for network security
CSCU Module 08: Securing Online Transactions
 Explain the basic working of an online shopping system
 Discuss security issues in online banking
 Discuss credit card payments and describes the different types of credit card frauds
 Provide guidelines for ensuring credit card safety
 Explain various measures for securing online transactions
 Discuss the different techniques to identify secure online shopping sites such as taking care of SSL and the
padlock symbol
 Describe how to identify an untrustworthy website
 Provide a checklist for online transactions security
CSCU Module 09: Securing Email Communications
 Introduce various email security issues
 Explain how various email systems work
 Discuss various email security threats such as malicious email attachments, spamming, hoax/chain and
scam emails, and Nigerian scam
Page 6 Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
 Explain various email security procedures such as creating strong passwords, providing alternate email
address, unchecking Keep Me Signed In/Remember Me, using https, checking for last account activity,
scanning email attachments, turning off preview feature, and email filtering
 Explain how to obtain digital certificates and digitally sign your emails
 Describe how to configure Microsoft Outlook download settings
 List various email security tools such as Lockbin
 Provide an email communication checklist
 Provide a checklist for ensuring email security
 Provide a security checklist for checking emails on mobile
CSCU Module 10: Social Engineering and Identity Theft
 Discuss Identity Theft
 Explain various methods attackers may use to steal identity
 Discuss the different misuses of a stolen identity
 Provide identity theft examples
 Explain social engineering with several examples
 Discuss the different types of social engineering techniques
 Describe the different human-based social engineering techniques
 Explain the different computer-based social engineering techniques
 Discuss the risk of social engineering through social networking websites
 Explain how to know if you are a victim of identity theft
 Discuss what a person can do if his/her identity is stolen
 Explain how to report identity theft
 Provide an identity theft protection checklist
 Provide a checklist for computer based identity theft protection
CSCU Module 11: Security on Social Networking Sites
 Provide an introduction of social networking sites
 Discuss the different social networking security threats such as cyber bullying, identity theft, phishing
scams, malware attacks, site flaws
 Describe various social networking threats to minors
 Explain how to stay safe on Facebook by configuring privacy settings, profile settings, privacy settings for
applications, settings to block users and search settings
 Discuss the different measures to stay safe on MySpace by changing settings for account, comments and
mail, friends request, IM and streaming
 Provide a social networking security checklist
Page 7 Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
 Provide a social networking security checklist for parents and teachers to protect their child from social
networking threats
CSCU Module 12: Information Security and Legal Compliance
 Introduce Health Insurance Portability and Accountability Act (HIPPA)
 Provide a checklist for HIPAA compliance
 Discuss different provisions of FERPA (Family Educational Rights and Privacy Act)
 Provide a checklist for FERPA compliance
 Discuss PCI DSS (Payment Card Industry Data Security Standard )
 Provide a checklist for PCI DSS compliance
CSCU Module 13: Securing Mobile Devices
 Discuss various mobile security issues
 List various mobile phone services
 Discuss IMEI number and its importance
 Explain the different mobile security threats such as device loss, malware infection, application
vulnerabilities
 Discuss various threats to Bluetooth devices
 Explain general mobile security procedure such as patching of mobile platforms and applications, avoiding
mobile device theft, using power-on authentication, regularly backing up important data, using encryption
to secure data in mobile device, enabling auto-lock feature, installing only signed applications and
installing mobile phone antivirus
 Provide guidelines to Secure Bluetooth Connectivity
 Explain various security measures for iPhone and iPad such as enabling passcode protection, enabling SIM
PIN Protection, enabling auto-lock and re-mapping buttons
 Explain basic security procedures for BlackBerry and Windows Phone 7 mobile devices such as setting
device password, changing the device password, locking device, encrypting data , using PIN and SIM lock
 List various mobile security tools
 Provide a Bluetooth security checklist
 Provide a checklist for mobile phone security

More Related Content

What's hot

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityEryk Budi Pratama
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationPECB
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabricANSItunCERT
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregationMagnus Jansson
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2ShivamSharma909
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 

What's hot (20)

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
cyber security
cyber security cyber security
cyber security
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregation
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 

Similar to Cscu exam-info-and-test-objective

OWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsOWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsIRJET Journal
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacythinkict
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Security & Privacy - Lecture C
Security & Privacy - Lecture CSecurity & Privacy - Lecture C
Security & Privacy - Lecture CCMDLearning
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 

Similar to Cscu exam-info-and-test-objective (20)

OWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsOWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention Methods
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Security & Privacy - Lecture C
Security & Privacy - Lecture CSecurity & Privacy - Lecture C
Security & Privacy - Lecture C
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 

Recently uploaded

VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiSuhani Kapoor
 
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfExperience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfSoham Mondal
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...Suhani Kapoor
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理cowagem
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Niya Khan
 

Recently uploaded (20)

VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
 
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfExperience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
 

Cscu exam-info-and-test-objective

  • 1. Page 1 Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification  Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the CSCU certification. Exam Details  Number of Questions: 50  Passing Score: 70%  Test Duration: 2 Hours  Test Format: Multiple Choice  Test Delivery: EC-Council Exam Portal Skills Measured The exam 112-12 tests CSCU candidates on the following 13 domains. 1. Foundations of Security 2. Securing Operating Systems 3. Protecting Systems Using Antiviruses 4. Data Encryption 5. Data Backup and Disaster Recovery 6. Internet Security 7. Securing Network Connections
  • 2. Page 2 Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 8. Securing Online Transactions 9. Securing Email Communications 10. Social Engineering and Identity Theft 11. Security on Social Networking Sites 12. Information Security and Legal Compliance 13. Securing Mobile Devices Test Objectives CSCU Module 01: Foundations of Security  Discuss computer security scenario  Highlight various factors that affect information security  Discuss key elements of information security  Explain fundamental concepts of computer Security  Discuss Security, Functionality, and Ease of Use Triangle  Describe various layers of information and computer security  Discuss different security risks to home users  Highlight the information system assets that need to be protected from cybercriminals and other security incidents  Discuss various factors that make a home computer vulnerable to security breaches  Provide a basic understanding of measures to make a system secure  Explain the benefits of computer security awareness  Provide a basic computer security checklist CSCU Module 02: Securing Operating Systems  Explain various threats to computer system security including malware attacks and password cracking  Discuss different ways of malware propagation  Provide guidelines for Windows Operating System (OS) security  Illustrate different measures to secure Windows OS such as locking the system, creating strong passwords, disabling unwanted accounts, updating and patching OS and applications, configuring Windows firewall, etc.  Discuss the Windows Encrypting File System (EFS) and explain how to encrypt and decrypt files in Window  Explain the usage of Windows security utilities such as Windows Defender and BitLocker  Discuss the use of Event Viewer  Illustrate how to disable/kill unnecessary services and processes in Windows 7  Discuss the threats of open ports and explain how to detect open ports  Discuss the role of audit policies in Windows security
  • 3. Page 3 Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.  Explain how to hide files and folders, and disable simple file sharing in Windows  Discuss the benefits of the UAC slider bar in Windows 7  Provide security tools that can be used to enhance Windows security such as Microsoft Security Essentials, KeePass Password Safe Portable, Registry Mechanic and Windows Defender  Provide guidelines for securing Mac OS X  Illustrate the different measures to secure Mac OS X such as enabling and locking down the login window, configuring account preferences, creating accounts, securing the guest accounts, controlling local accounts with parental controls, using keychain settings, and using apple software update.  Illustrate how to secure date & time preferences, configure network preferences, enable screen saver password, and set up FileVault to keep home folder secure  Explain firewall security in Mac OS X  Provide security checklists for Windows 7 and Mac OS X OSs CSCU Module 03: Protecting Systems Using Antiviruses  Discuss different types of antivirus software  Explain the need for an antivirus program  Provide a brief understating of how antivirus software work  Discuss various factors that help in choosing the best antivirus software  Provide general steps to install antivirus applications  Provide a simple test to check if the antivirus is working  Explain the steps to install and configure popular antivirus programs such as McAfee and Kaspersky PURE antivirus programs  Provide a checklist to enhance system security using antivirus programs CSCU Module 04: Data Encryption  Explain the basic encryption concepts  Describe the usage of encryption  Discuss the different types of encryption  Explain the concept of digital certificates and how they work  Discuss the use of digital signatures to secure communication  Explain how digital signature works  Discuss the usage of various data encryption tools such as TrueCrypt CSCU Module 05: Data Backup and Disaster Recovery  Explain the need of data backup  Discuss various factors that determine a data backup plan such as what files and how often to backup  Explain the importance of online data backup
  • 4. Page 4 Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.  Provide a list of online backup service providers  Discuss the different types of backups  Explain Windows 7 backup and restore procedures  Discuss the use of encryption for protecting backup data  Explain MAC OS X backup and restore procedures using TimeMachine  Describe how to use data backup tools on Windows and Mac OS X OSs  Provide a list of data recovery tools for Windows and Mac OS X OSs  Explain the need of physical security  Discuss various physical security measures such as locks, biometrics, and fire prevention  Provide guidelines to secure laptops from theft  Provide a checklist for an effective data backup  Provide a checklist to ensure physical security of computer systems CSCU Module 06: Internet Security  Discuss various Internet security threats  Explain various techniques to secure Internet Explorer such as configuring Internet, Intranet, Trusted and Restricted zone, cookie settings, privacy settings, securing ActiveX Controls, deleting Browsing History and securing file downloads  Illustrate various Mozilla Firefox security settings including privacy settings, secure downloads, and how to install Plugins  Explain various Google Chrome privacy and security settings  Explain various Apple Safari security settings  Describe how to test browsers for privacy  Explain various search engine and Instant Messaging (IM) security issues  Discuss the different security measures for search engine and IM security  Describe the different threats of online games and Discuss security practices to stay safe while gaming  Discuss various child online safety issues  Explain the role of the Internet in child related crimes  Provide guideline to find if children are at risk online  Discuss various measures to protect children from online threats  Explain how to report an online crime against a child  Provide a list of actions to take when the child becomes an online victim  List laws that a user needs to be aware of for online security  Provide a checklist for Internet security  Provide a checklist for parents to protect their child from online threats
  • 5. Page 5 Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. CSCU Module 07: Securing Network Connections  Discuss home and wireless networking basics  Describe general steps to set up a home network  Explain the process of setting up a wireless network in Windows 7 and Mac environment  Discuss various wireless network security threats  Provide guidelines to secure wireless network  Explain various techniques for securely using the network in Windows 7 environment including setting up a PC’s name and workgroup name in Windows 7, sharing, transferring files, simple file sharing , hiding a shared disk or folder, sharing printers, accessing files on other PCs and Windows Easy Transfer  Discuss various measures for securely using the network in MAC OS X environment including setting up the PC’s name, setting up the workgroup name, creating user accounts and groups, sharing files and folders, sharing printers, and accessing other Macs on the network  Describe various network security threats  Illustrate the different measures to secure network connections such as use of firewall, antivirus programs, strong passwords, making regular backups, and encryption  Explain how to identify a secure website  Provide general security practices for home networking  Discuss basic networking problems and how to troubleshoot these problems  Provide a checklist for network security CSCU Module 08: Securing Online Transactions  Explain the basic working of an online shopping system  Discuss security issues in online banking  Discuss credit card payments and describes the different types of credit card frauds  Provide guidelines for ensuring credit card safety  Explain various measures for securing online transactions  Discuss the different techniques to identify secure online shopping sites such as taking care of SSL and the padlock symbol  Describe how to identify an untrustworthy website  Provide a checklist for online transactions security CSCU Module 09: Securing Email Communications  Introduce various email security issues  Explain how various email systems work  Discuss various email security threats such as malicious email attachments, spamming, hoax/chain and scam emails, and Nigerian scam
  • 6. Page 6 Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.  Explain various email security procedures such as creating strong passwords, providing alternate email address, unchecking Keep Me Signed In/Remember Me, using https, checking for last account activity, scanning email attachments, turning off preview feature, and email filtering  Explain how to obtain digital certificates and digitally sign your emails  Describe how to configure Microsoft Outlook download settings  List various email security tools such as Lockbin  Provide an email communication checklist  Provide a checklist for ensuring email security  Provide a security checklist for checking emails on mobile CSCU Module 10: Social Engineering and Identity Theft  Discuss Identity Theft  Explain various methods attackers may use to steal identity  Discuss the different misuses of a stolen identity  Provide identity theft examples  Explain social engineering with several examples  Discuss the different types of social engineering techniques  Describe the different human-based social engineering techniques  Explain the different computer-based social engineering techniques  Discuss the risk of social engineering through social networking websites  Explain how to know if you are a victim of identity theft  Discuss what a person can do if his/her identity is stolen  Explain how to report identity theft  Provide an identity theft protection checklist  Provide a checklist for computer based identity theft protection CSCU Module 11: Security on Social Networking Sites  Provide an introduction of social networking sites  Discuss the different social networking security threats such as cyber bullying, identity theft, phishing scams, malware attacks, site flaws  Describe various social networking threats to minors  Explain how to stay safe on Facebook by configuring privacy settings, profile settings, privacy settings for applications, settings to block users and search settings  Discuss the different measures to stay safe on MySpace by changing settings for account, comments and mail, friends request, IM and streaming  Provide a social networking security checklist
  • 7. Page 7 Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.  Provide a social networking security checklist for parents and teachers to protect their child from social networking threats CSCU Module 12: Information Security and Legal Compliance  Introduce Health Insurance Portability and Accountability Act (HIPPA)  Provide a checklist for HIPAA compliance  Discuss different provisions of FERPA (Family Educational Rights and Privacy Act)  Provide a checklist for FERPA compliance  Discuss PCI DSS (Payment Card Industry Data Security Standard )  Provide a checklist for PCI DSS compliance CSCU Module 13: Securing Mobile Devices  Discuss various mobile security issues  List various mobile phone services  Discuss IMEI number and its importance  Explain the different mobile security threats such as device loss, malware infection, application vulnerabilities  Discuss various threats to Bluetooth devices  Explain general mobile security procedure such as patching of mobile platforms and applications, avoiding mobile device theft, using power-on authentication, regularly backing up important data, using encryption to secure data in mobile device, enabling auto-lock feature, installing only signed applications and installing mobile phone antivirus  Provide guidelines to Secure Bluetooth Connectivity  Explain various security measures for iPhone and iPad such as enabling passcode protection, enabling SIM PIN Protection, enabling auto-lock and re-mapping buttons  Explain basic security procedures for BlackBerry and Windows Phone 7 mobile devices such as setting device password, changing the device password, locking device, encrypting data , using PIN and SIM lock  List various mobile security tools  Provide a Bluetooth security checklist  Provide a checklist for mobile phone security