Skill Up Card - Course Bundles

Save up to €4,145 per delegate.

skill up card logo - Nexus Human

EC-Council Certified Secure Computer User (CSCU) v3

4.6 out of 5 rating Last updated 25/07/2024   English

Jump to outline

Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.

Duration

2 Days

12 CPD hours

Overview

Identify the risk associated with various cyber threats Implement data security Secure different operating systems Install and Configure antiviruses Implement basic security measures when online Implement appropriate security measures associated with online social networking Implement various email security measures Safeguard mobile devices from various attacks Secure their cloud accounts Secure network connections Back up data and perform disaster recovery Secure IoT devices and gaming consoles Secure remote working

Description

The CSCU program is designed to educate students on the safe operation of computers, devices, and networks by focusing on the more practical aspects of networking and security, allowing them to expand their skills. Students will develop a fundamental understanding of computer, device, and network security issues, including identity theft, credit card fraud, online banking phishing scams, malware, loss of sensitive information, and social engineering. This certification is an excellent complement to educational offerings for knowledge workers and end-users interested in becoming secure power users.

Prerequisites

Basic knowledge of computers and computing devices.

Module 01: Introduction to Data Security
  • Data Loss Statistics Over Time
  • What is Data
  • What is Data Security
Module 02: Securing Operating Systems
  • What does an Operating System Do
  • Guidelines for Windows OS Security
  • Guidelines for Mac OS X Security
  • Resources on the Internet for Computer Security
  • Operating Systems Security Checklist
  • What are Guidelines for Public Computers
Module 03: Malware and Antivirus
  • New Malware Found – Last 5 Years
  • What is Malware
  • What is Antivirus
  • Install Antivirus Software
  • How to Test if Antivirus is Working
  • Antivirus Security Checklist
Module 04: Internet Security
  • What is Internet Security
  • What is a Web Browser
  • What are the Threats to Web Browsers
  • How to Identify a Secure Website
  • What is Instant Messaging
  • Child Online Safety
  • How to Report an Internet Crime
  • KidZui (Children Friendly Internet Software)
Module 05 Security on Social Networking Sites
  • What are Social Networking Sites
  • What is Facebook
  • Facebook Security Tips
  • What is Twitter
  • Social Networking Security Checklist
Module 06 Securing Email Communications
  • What is Email
  • What is Encryption
Module 07 Securing Mobile Devices
  • What is Mobile Device Security
  • How to Secure iPad
  • How to Backup Data in iOS Devices
  • How to Enable Screen Lock in Android Devices
  • How to Enable Password in Windows Phone Devices
  • What are Mobile Security Tools
  • Bluetooth Security Checklist
  • Mobile Phone Security Checklist
Module 08: Securing Cloud
  • What is Cloud Computing
  • What are the Different types of Cloud
  • How Cloud Works
  • What are the Threats to Cloud Security
  • What Precautions to Take Against Cloud Security Threats
  • What are the Privacy Issues Faced on Cloud
  • What Precautions Can Be Taken For Data Privacy
  • What are the Bases for Choosing a Cloud Service Provider
Module 09: Securing Network Connections
  • What are Networks
  • Wi-Fi Vs. Ethernet
  • What are the Duties of Network Administrators
  • What is a Home Network
  • What are Wireless Networks
  • How to Setup a Wireless Network in Mac OS X
  • How to Set up PC’s Name in Windows 10
  • How to Set up Workgroup Name in Windows 10
  • How to Share Files in Windows 10
  • How to Hide a Folder in a Shared Windows 10 Computer
  • How to Share a Printer in Windows 10
  • How to Access Printers on Other PC’s
  • How to Access Files on Other PC’s
  • How to Set up PC’s Name in Mac OS X
  • How to Set up Workgroup Name in Mac OS X
  • How to Create User Accounts in Mac OS X
  • How to Create Groups in Mac OS X
  • How to Share Files and Folders in Mac OS X
  • How to Share Printer in Mac OS X
  • How to Access Other Macs on the Common Network
  • What are the Threats to Wireless Networks
  • How to Secure Wireless Networks
  • What are Network Adapters
  • Home Network Safety Checklist
Module 10: Data Backup and Disaster Recovery
  • What is Data Backup
  • What are the Reasons for Data Loss
  • What Files to Backup and How Often
  • Deleting Vs. Permanent Destruction
Module 11: Securing IoT Devices and Gaming Consoles
  • IoT Devices
  • IoT Devices Risks and Countermeasures
  • Smart Home Systems
  • How to Secure Alexa Devices
  • IoT children's toys
  • What are Gaming Consoles
  • Gaming Console Security Risks
  • Securing Gaming Console
Module 12: Secure Remote Working
  • What is Remote Working
  • Why Security is Important in Remote
  • Working
  • Security Risks in Remote Working
  • How to Mitigate the Security Risks in Remote Working
  • Digital Security Tips in Remote Working
  • Physical Security Tips in Remote Working
  • Prevent Social Engineering while Remote Working
  • Password Protection Tips
  • Secure Remote Working Checklist
  • Secure Video Conferencing: Zoom Meeting Security Best Practices
  • Secure Video Conferencing: Microsoft Teams Security Best Practices
  • Do’s and Don’ts for Remote Working
Additional course details:

Nexus Humans EC-Council Certified Secure Computer User (CSCU) v3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.

This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.

Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.

While we feel this is the best course for the EC-Council Certified Secure Computer User (CSCU) v3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.

Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

FAQ for the EC-Council Certified Secure Computer User (CSCU) v3 Course

Available Delivery Options for the EC-Council Certified Secure Computer User (CSCU) v3 training.
  • Live Instructor Led Classroom Online (Live Online)
  • Traditional Instructor Led Classroom (TILT/ILT)
  • Delivery at your offices in London or anywhere in the UK
  • Private dedicated course as works for your staff.
How many CPD hours does the EC-Council Certified Secure Computer User (CSCU) v3 training provide?

The 2 day. EC-Council Certified Secure Computer User (CSCU) v3 training course give you up to 12 CPD hours/structured learning hours. If you need a letter or certificate in a particular format for your association, organisation or professional body please just ask.

Is the EC-Council Certified Secure Computer User (CSCU) v3 training appropriate for someone learning to use CSCU in a professional environment?

Yes the EC-Council Certified Secure Computer User (CSCU) v3 is appropriate for someone looking to use CSCU in a professional workspace or environment. But do make sure to note any prerequisites, read the course outline to ensure it is the right fit for you or your teams requirements and preferences.

What is the correct audience for the EC-Council Certified Secure Computer User (CSCU) v3 training?

Any individual who uses computers and surfs the web, social media, email, chats, etc. but is not aware of computer security issues.

Do you provide training for the EC-Council Certified Secure Computer User (CSCU) v3.

Yes we provide corporate training, dedicated training and closed classes for the EC-Council Certified Secure Computer User (CSCU) v3. This can take place anywhere in Ireland including, Dublin, Cork, Galway, Northern Ireland or live online allowing you to have your teams from across Ireland or further afield to attend a single training event saving travel and delivery expenses.

What is the duration of the EC-Council Certified Secure Computer User (CSCU) v3 program.

The EC-Council Certified Secure Computer User (CSCU) v3 training takes place over 2 day(s), with each day lasting approximately 8 hours including small and lunch breaks to ensure that the delegates get the most out of the day.

Why are Nexus Human the best provider for the EC-Council Certified Secure Computer User (CSCU) v3?
Nexus Human are recognised as one of the best training companies as they and their trainers have won and hold many awards and titles including having previously won the Small Firms Best Trainer award, national training partner of the year for Ireland on multiple occasions, having trainers in the global top 30 instructor awards in 2012, 2019 and 2021. Nexus Human has also been nominated for the Tech Excellence awards multiple times. Learning Performance institute (LPI) external training provider sponsor 2024.
Is there a discount code for the EC-Council Certified Secure Computer User (CSCU) v3 training.

Yes, the discount code PENPAL5 is currently available for the EC-Council Certified Secure Computer User (CSCU) v3 training. Other discount codes may also be available but only one discount code or special offer can be used for each booking. This discount code is available for companies and individuals.

Jump to dates

Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Top