SlideShare a Scribd company logo
SECURING INFORMATION. SECURING LIVES.
CCertified Secure Computer User
CUS
EC-Council
Secure
yourselftoday.
Take
controland
rem
ain
in
controlofyour
inform
ation
resources.
G
E
T
C
E
R
TIFIE
D
.D
IFFE
R
E
N
TIA
TE
YO
U
R
SE
LF.
B
E
C
O
M
E
A
C
E
R
TIFIE
D
SE
C
U
R
E
C
O
M
PU
TE
R
U
SE
R
COURSE DESCRIPTION
The CSCU training program aims at equipping the students with
the necessary knowledge and skills to protect their information
assets. The program is designed to interactively teach the students
about the whole gamut of information security threats they face
ranging from identity theft and credit card fraud to their physical
safety. The skills acquired during the course of this program will
not only help the students to identify these threats but also to
mitigate them effectively.
WHAT WILL YOU LEARN
Cloud Security
Password
Security
Social Engineering
Countermeasures
Mitigating
Identity Theft
Email Security Safe Browsing
Data Protection Physical Security
Mobile Device
Security
Data Backup
Social Network
Security
Antiviruses
Protection
Disaster
Recovery
Internet Security
Credit Card
Security
Monitoring Kids
Online
Wireless & Home
Network Security
OS Security
Mac
TARGET AUDIENCE
COURSE DURATION
16 Hours
CERTIFICATION
Educational institutions can provide greater value to
students by providing them not only with one of the
most updated courseware available today but with a
certification that empower their students in the
corporate world. The courseware comes complete
with demo videos and scenario-based discussion
questions to allow the student to gain actual skills.
Students will be prepared for EC-Council's CSCU exam
112-12
This certification is an excellent complement to
educational offerings in the domain of security and
networking.
This course is specifically designed for todays'
computer users who uses the internet and the www
extensively to work, study and play.
COURSE OUTLINE
Introduction to Security
Securing Operating Systems
Malware and Antivirus
Internet Security
Security on Social Networking Sites
Securing Email Communications
Securing Mobile Devices
Securing the Cloud
Securing Network Connections
Data Backup and Disaster Recovery
EXAM INFORMATION
EXAM NAME
CSCU (112-12) Exam
CREDIT TOWARDS CERTIFICATION
Certified Secure Computer User (CSCU)
EXAM DETAILS
Number of Questions: 50
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery: EC-Council Exam Portal
Certified Secure Computer User (CSCU)
EC-Council
www.eccouncil.org

More Related Content

What's hot

Secure software design
Secure software designSecure software design
Secure software design
Ashis Kumar Chanda
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Gareth Davies
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Edureka!
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
👀 Joe Gray
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
Scott Hurrey
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
Datto
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
Anne Oikarinen
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security TestingMarco Morana
 
Security Measure
Security MeasureSecurity Measure
Security Measuresyafiqa
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
Tiger Virani
 
File upload-vulnerability-in-fck editor
File upload-vulnerability-in-fck editorFile upload-vulnerability-in-fck editor
File upload-vulnerability-in-fck editor
Paolo Dolci
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
Kriti kohli
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
Modelado de amenazas
Modelado de amenazasModelado de amenazas
Modelado de amenazasBoris Murillo
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration Testing
Cheah Eng Soon
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 

What's hot (20)

Secure software design
Secure software designSecure software design
Secure software design
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
 
File upload-vulnerability-in-fck editor
File upload-vulnerability-in-fck editorFile upload-vulnerability-in-fck editor
File upload-vulnerability-in-fck editor
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Modelado de amenazas
Modelado de amenazasModelado de amenazas
Modelado de amenazas
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration Testing
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 

Similar to EC-Council Certified Secure Computer User C|SCU Program

Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
TrustwaveHoldings
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Assignment Help
 
cyber security course in kerala PROJECT.pdf
cyber security course in kerala PROJECT.pdfcyber security course in kerala PROJECT.pdf
cyber security course in kerala PROJECT.pdf
dotinamal19
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in kerala
achuamal415
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
Tyrone Grandison
 
CyberSecurity Study Jam
CyberSecurity Study JamCyberSecurity Study Jam
CyberSecurity Study Jam
SahilSingh368445
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
Booz Allen Hamilton
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdfwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
sarthak841219
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
Avanzo net
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
Md Shaifullar Rabbi
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptxwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
sarthak841219
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
MuhammadHossen
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Future Education Magazine
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
CCI Training Center
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Afour tech
 
Introduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptxIntroduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptx
AshutoshB5
 

Similar to EC-Council Certified Secure Computer User C|SCU Program (20)

Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
cyber security course in kerala PROJECT.pdf
cyber security course in kerala PROJECT.pdfcyber security course in kerala PROJECT.pdf
cyber security course in kerala PROJECT.pdf
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in kerala
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
CyberSecurity Study Jam
CyberSecurity Study JamCyberSecurity Study Jam
CyberSecurity Study Jam
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdfwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptxwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
 
Introduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptxIntroduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptx
 

More from ITpreneurs

CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things Foundation
ITpreneurs
 
TOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursTOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneurs
ITpreneurs
 
How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...
ITpreneurs
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)
ITpreneurs
 
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
ITpreneurs
 
Step by Step Guide
Step by Step Guide Step by Step Guide
Step by Step Guide
ITpreneurs
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
ITpreneurs
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
ITpreneurs
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
ITpreneurs
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneurs
ITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
ITpreneurs
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
ITpreneurs
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).
ITpreneurs
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
ITpreneurs
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
ITpreneurs
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
ITpreneurs
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate Brochure
ITpreneurs
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs
ITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較
ITpreneurs
 

More from ITpreneurs (20)

CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things Foundation
 
TOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursTOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneurs
 
How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)
 
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Step by Step Guide
Step by Step Guide Step by Step Guide
Step by Step Guide
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate Brochure
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較
 

Recently uploaded

DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

EC-Council Certified Secure Computer User C|SCU Program

  • 1. SECURING INFORMATION. SECURING LIVES. CCertified Secure Computer User CUS EC-Council
  • 2. Secure yourselftoday. Take controland rem ain in controlofyour inform ation resources. G E T C E R TIFIE D .D IFFE R E N TIA TE YO U R SE LF. B E C O M E A C E R TIFIE D SE C U R E C O M PU TE R U SE R COURSE DESCRIPTION The CSCU training program aims at equipping the students with the necessary knowledge and skills to protect their information assets. The program is designed to interactively teach the students about the whole gamut of information security threats they face ranging from identity theft and credit card fraud to their physical safety. The skills acquired during the course of this program will not only help the students to identify these threats but also to mitigate them effectively.
  • 3. WHAT WILL YOU LEARN Cloud Security Password Security Social Engineering Countermeasures Mitigating Identity Theft Email Security Safe Browsing Data Protection Physical Security Mobile Device Security Data Backup Social Network Security Antiviruses Protection Disaster Recovery Internet Security Credit Card Security Monitoring Kids Online Wireless & Home Network Security OS Security Mac
  • 4. TARGET AUDIENCE COURSE DURATION 16 Hours CERTIFICATION Educational institutions can provide greater value to students by providing them not only with one of the most updated courseware available today but with a certification that empower their students in the corporate world. The courseware comes complete with demo videos and scenario-based discussion questions to allow the student to gain actual skills. Students will be prepared for EC-Council's CSCU exam 112-12 This certification is an excellent complement to educational offerings in the domain of security and networking. This course is specifically designed for todays' computer users who uses the internet and the www extensively to work, study and play. COURSE OUTLINE Introduction to Security Securing Operating Systems Malware and Antivirus Internet Security Security on Social Networking Sites Securing Email Communications Securing Mobile Devices Securing the Cloud Securing Network Connections Data Backup and Disaster Recovery EXAM INFORMATION EXAM NAME CSCU (112-12) Exam CREDIT TOWARDS CERTIFICATION Certified Secure Computer User (CSCU) EXAM DETAILS Number of Questions: 50 Passing Score: 70% Test Duration: 2 Hours Test Format: Multiple Choice Test Delivery: EC-Council Exam Portal
  • 5. Certified Secure Computer User (CSCU) EC-Council www.eccouncil.org