Certified secure computer user

The CSCU training program aims at equipping the students with the necessary knowledge and skills to protect their information assets. The program is designed to interactively teach the students about the whole gamut of information security threats they face ranging from identity theft and credit card fraud to their physical safety. The skills acquired during the course of this program will not only help the students to identify these threats but also to mitigate them effectively.

Age Requirements and Policies Concerning Minors

The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 13 years old. If the candidate is under the age of 13, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/EC-Council a written consent of their parent/legal guardian and a supporting letter from their institution of higher learning.

After successfully completing this course, students will be able to:

  • Understand the need and importance of data security

  • Implement Operating System security measures on their computers.

  • Understand Malware and its symptoms.

  • Make an informed decision about choosing the antivirus which is most relevant to their needs.

  • Understand the risks associated with different online activities.

  • Understand why and how to secure web browsers.

  • Identify safe websites.

  • How to investigate logs, network traffic, wireless attacks, and web attacksSafeguard against the threats associated with online social networking

  • Understand how to make their social networking accounts secure.

  • Understand the threats associated with email communications and how to safeguard against them.

  • Understand the threats to mobile devices and how to safeguard against them.

  • Understand the threats associated with cloud accounts and how to safeguard against them.

  • Make an informed decision about a cloud service provider which fulfills their requirements.

  • Understand the various types of networks and the threats associated with them.

  • Configure a home network.

  • Make their networks secure.

  • Understand the threats to data and the need for data backups.

  • Back up and restore data on their computers.

  • Destroy data permanently.