Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!
page preloader

Certified Secure Computer User

cscu_banner


cscu-center-text

Introduction

The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.

Who Should Attend

This course is specifically designed for todays' computer users who uses the internet and the www extensively to work, study and play.

Prerequisites

  • Basic knowledge of computer.
  • Basic knowledge of internet browsing.

Downloads

CSCU Brochure:

Download

Syllabus

  • Foundations of Security
  • Securing Operating Systems
  • Protecting System Using Antiviruses
  • Data Encryption
  • Data Backup and Disaster Recovery
  • Internet Security
  • Securing Network Connections
  • Securing Online Transactions
  • Securing Email Communications
  • Social Engineering and Identity Theft
  • Security on Social Networking Sites
  • Information Security and Legal Compliance
  • Securing Mobile Devices
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Cloud Computing
  • Cryptography

Related Courses

  • CEH (Certified Ethical Hacker)

    The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
    Read More
  • LSCSU (Linux Solution Certified Solaris User)

    This course provides instruction in the key features and capabilities of Sun’s flagship Solaris 10 OS. Topics include file and directory management, controlling the user work environment, archiving files, and using remote commands. In addition, you will learn fundamental command-line features of the Solaris OS, including file system navigation, the vi text editor, file permissions, access control lists (ACLs), command shells, file compression, basic network use, and reading shell scripts. This course prepares you to take the Sun Certified Solaris Associate (SCSAS) Exam.
    Read More

Enquire Now