Certified Secure Computer User (CSCU) Version 2 [2nd Edition, 2 ed.] 1635671817, 9781635671810

Certified Secure Computer User (CSCU) Version 2 The purpose of the CSCU training program is to provide individuals with

276 36 60MB

English Pages 318 Year 216

Report DMCA / Copyright

DOWNLOAD FILE

Certified Secure Computer User (CSCU) Version 2 [2nd Edition, 2 ed.]
 1635671817, 9781635671810

Table of contents :
About EC-Council
Table of Contents
Module 1: Introduction to Data Security
Security News
Module Objectives
Data—Digital Building Blocks
Importance of Data in the Information Age
Threats to Data
Data Security
Elements of Security
Implementing Security
Module Summary
Discussion Questions
Module 2: Securing Operating Systems
Security News
Module Objectives
Securing Operating Systems
Guidelines to Secure Windows 10
Guidelines for MAC OS X Security
Module Summary
Discussion Questions
Module 3: Malware and Antivirus
Security News
Module Objectives
What is Malware?
Antivirus
Kaspersky PURE 3.0
Avast Antivirus
Module Summary
Discussion Questions
Module 4: Internet Security
Security News
Module Objectives
Understanding Web Browser Concepts
Instant Messaging
Child Online Safety
Module Summary
Discussion Questions
Module 5: Security On Social Networking Sites
Security News
Module Objectives
Introduction to Social Networking Sites
Geotagging
Social Networking Threats to Minors
Social Networking Site: Facebook
Social Networking Site: Twitter
Module Summary
Discussion Questions
Module 6: Securing Email Communications
Security News
Module Objectives
Introduction to Email
Email Security
Email Security Procedures
Encryption
Email Security Tools
Module Summary
Discussion Questions
Module 7: Securing Mobile Devices
Security News
Module Objectives
Securing Mobile Devices
Understanding Mobile Device Threats
Understanding Various Mobile Security Procedures
Understanding How to Secure iPhone and iPad Devices
Understanding How to Secure Android Devices
Understanding How to Secure Windows Phone Devices
Mobile Security Tools
Mobile Phone and Bluetooth Security Checklists
Module Summary
Discussion Questions
Module 8: Securing the Cloud
Security News
Module Objectives
The Concept of Cloud
Threats to Cloud Security
Cloud Privacy Issues
Choosing a Cloud Service Provider
Module Summary
Discussion Questions
Module 9: Securing Network Connections
Security News
Module Objectives
Understanding Various Networking Concepts
Understanding Setting Up a Wireless Network
Understanding Threats to Wireless Network Security and Countermeasures
Home Network Safety Checklist
Module Summary
Discussion Questions
Module 10: Data Backup and Disaster Recovery
Security News
Module Objectives
Data Backup Concepts
Types of Data Backup
Windows 10 Backup and Restore Procedures
Mac OS X Backup and Restore Procedures
Understanding Safe Data Destruction
Module Summary
Discussion Questions
References

Polecaj historie