Certified Secure Computer User



Similar documents
Certified Secure Computer User

Why you need. McAfee. Multi Acess PARTNER SERVICES

How To Protect Yourself Online

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Chapter 15: Computer and Network Security

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Security Awareness. ITS Security Training. Fall 2015

Signal Customized Helpdesk Course

Keeping Data Safe. Patients, Research Subjects, and You

Securing Communications

National Cyber Security Month 2015: Daily Security Awareness Tips

Internet threats: steps to security for your small business

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Protection of Personal Computer Best Practices for General User

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Protection from Fraud and Identity Theft

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

New Online Banking Guide for FIRST time Login

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Computer Security at Columbia College. Barak Zahavy April 2010

plantemoran.com What School Personnel Administrators Need to know

10 Quick Tips to Mobile Security

Feature List for Kaspersky Security for Mobile

Office of Information Technology Desktop Security and Best Practices

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Client Security Risk Assessment Questionnaire

Interact Intranet Version 7. Technical Requirements. August Interact

High Speed Internet - User Guide. Welcome to. your world.

Malware & Botnets. Botnets

How to Practice Safely in an era of Cybercrime and Privacy Fears

PC Security and Maintenance

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

How to stay safe online

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

INFORMATION SECURITY FOR YOUR AGENCY

How-To Guide: Cyber Security. Content Provided by

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Security. TestOut Modules

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Multi State Information Sharing and Analysis Center. Briefing Paper. Keeping Your Broadband Internet Connection Secure

Cyber Essentials Scheme

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Windows Operating Systems. Basic Security

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

BSHSI Security Awareness Training

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

BlackBerry Business Cloud Services. Administration Guide

FileCloud Security FAQ

ONE Mail Direct for Mobile Devices

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Kaspersky Security for Mobile Administrator's Guide

Parla, Secure Cloud

Win the Internet Security War. Keep Internet Criminals Out of Your Network and Protect Your Business

Basic Security Considerations for and Web Browsing

What are the common online dangers?

Secure Your Mobile Workplace

Introduction to Cyber Security / Information Security

Section 12 MUST BE COMPLETED BY: 4/22

PC Security & Housekeeping March 2015

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Paul Nguyen CSG Interna0onal

Windows 7, Enterprise Desktop Support Technician

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security for Mobile

VPN Web Portal Usage Guide

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

STRONGER ONLINE SECURITY

Section 1.0 Getting Started with the Vālant EMR. Contents

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Secure Client Guide

Are You A Sitting Duck?

Kaspersky Internet Security 2014: Reviewer s Guide

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Protecting personally identifiable information: What data is at risk and what you can do about it

Windows 7, Enterprise Desktop Support Technician

17 DAYS TO ROCK SOLID CYBER SECURITY

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Did you know your security solution can help with PCI compliance too?

Feature List for Kaspersky Password Manager

Perception and knowledge of IT threats: the consumer s point of view

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College

Kaspersky Internet Security User Guide

Kaspersky Lab Mobile Device Management Deployment Guide

Cloud Services MDM. ios User Guide

Get Started Guide - PC Tools Internet Security

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Amazon WorkMail. User Guide Version 1.0

Transcription:

Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the CSCU certification. Exam Details Number of Questions: 50 Passing Score: 70% Test Duration: 2 Hours Test Format: Multiple Choice Test Delivery: EC-Council Exam Portal Skills Measured The exam 112-12 tests CSCU candidates on the following 13 domains. 1. Foundations of Security 2. Securing Operating Systems 3. Protecting Systems Using Antiviruses 4. Data Encryption 5. Data Backup and Disaster Recovery 6. Internet Security 7. Securing Network Connections Page 1

8. Securing Online Transactions 9. Securing Email Communications 10. Social Engineering and Identity Theft 11. Security on Social Networking Sites 12. Information Security and Legal Compliance 13. Securing Mobile Devices Test Objectives CSCU Module 01: Foundations of Security Discuss computer security scenario Highlight various factors that affect information security Discuss key elements of information security Explain fundamental concepts of computer Security Discuss Security, Functionality, and Ease of Use Triangle Describe various layers of information and computer security Discuss different security risks to home users Highlight the information system assets that need to be protected from cybercriminals and other security incidents Discuss various factors that make a home computer vulnerable to security breaches Provide a basic understanding of measures to make a system secure Explain the benefits of computer security awareness Provide a basic computer security checklist CSCU Module 02: Securing Operating Systems Explain various threats to computer system security including malware attacks and password cracking Discuss different ways of malware propagation Provide guidelines for Windows Operating System (OS) security Illustrate different measures to secure Windows OS such as locking the system, creating strong passwords, disabling unwanted accounts, updating and patching OS and applications, configuring Windows firewall, etc. Discuss the Windows Encrypting File System (EFS) and explain how to encrypt and decrypt files in Window Explain the usage of Windows security utilities such as Windows Defender and BitLocker Discuss the use of Event Viewer Illustrate how to disable/kill unnecessary services and processes in Windows 7 Discuss the threats of open ports and explain how to detect open ports Discuss the role of audit policies in Windows security Page 2

Explain how to hide files and folders, and disable simple file sharing in Windows Discuss the benefits of the UAC slider bar in Windows 7 Provide security tools that can be used to enhance Windows security such as Microsoft Security Essentials, KeePass Password Safe Portable, Registry Mechanic and Windows Defender Provide guidelines for securing Mac OS X Illustrate the different measures to secure Mac OS X such as enabling and locking down the login window, configuring account preferences, creating accounts, securing the guest accounts, controlling local accounts with parental controls, using keychain settings, and using apple software update. Illustrate how to secure date & time preferences, configure network preferences, enable screen saver password, and set up FileVault to keep home folder secure Explain firewall security in Mac OS X Provide security checklists for Windows 7 and Mac OS X OSs CSCU Module 03: Protecting Systems Using Antiviruses Discuss different types of antivirus software Explain the need for an antivirus program Provide a brief understating of how antivirus software work Discuss various factors that help in choosing the best antivirus software Provide general steps to install antivirus applications Provide a simple test to check if the antivirus is working Explain the steps to install and configure popular antivirus programs such as McAfee and Kaspersky PURE antivirus programs Provide a checklist to enhance system security using antivirus programs CSCU Module 04: Data Encryption Explain the basic encryption concepts Describe the usage of encryption Discuss the different types of encryption Explain the concept of digital certificates and how they work Discuss the use of digital signatures to secure communication Explain how digital signature works Discuss the usage of various data encryption tools such as TrueCrypt CSCU Module 05: Data Backup and Disaster Recovery Explain the need of data backup Discuss various factors that determine a data backup plan such as what files and how often to backup Explain the importance of online data backup Page 3

Provide a list of online backup service providers Discuss the different types of backups Explain Windows 7 backup and restore procedures Discuss the use of encryption for protecting backup data Explain MAC OS X backup and restore procedures using TimeMachine Describe how to use data backup tools on Windows and Mac OS X OSs Provide a list of data recovery tools for Windows and Mac OS X OSs Explain the need of physical security Discuss various physical security measures such as locks, biometrics, and fire prevention Provide guidelines to secure laptops from theft Provide a checklist for an effective data backup Provide a checklist to ensure physical security of computer systems CSCU Module 06: Internet Security Discuss various Internet security threats Explain various techniques to secure Internet Explorer such as configuring Internet, Intranet, Trusted and Restricted zone, cookie settings, privacy settings, securing ActiveX Controls, deleting Browsing History and securing file downloads Illustrate various Mozilla Firefox security settings including privacy settings, secure downloads, and how to install Plugins Explain various Google Chrome privacy and security settings Explain various Apple Safari security settings Describe how to test browsers for privacy Explain various search engine and Instant Messaging (IM) security issues Discuss the different security measures for search engine and IM security Describe the different threats of online games and Discuss security practices to stay safe while gaming Discuss various child online safety issues Explain the role of the Internet in child related crimes Provide guideline to find if children are at risk online Discuss various measures to protect children from online threats Explain how to report an online crime against a child Provide a list of actions to take when the child becomes an online victim List laws that a user needs to be aware of for online security Provide a checklist for Internet security Provide a checklist for parents to protect their child from online threats Page 4

CSCU Module 07: Securing Network Connections Discuss home and wireless networking basics Describe general steps to set up a home network Explain the process of setting up a wireless network in Windows 7 and Mac environment Discuss various wireless network security threats Provide guidelines to secure wireless network Explain various techniques for securely using the network in Windows 7 environment including setting up a PC s name and workgroup name in Windows 7, sharing, transferring files, simple file sharing, hiding a shared disk or folder, sharing printers, accessing files on other PCs and Windows Easy Transfer Discuss various measures for securely using the network in MAC OS X environment including setting up the PC s name, setting up the workgroup name, creating user accounts and groups, sharing files and folders, sharing printers, and accessing other Macs on the network Describe various network security threats Illustrate the different measures to secure network connections such as use of firewall, antivirus programs, strong passwords, making regular backups, and encryption Explain how to identify a secure website Provide general security practices for home networking Discuss basic networking problems and how to troubleshoot these problems Provide a checklist for network security CSCU Module 08: Securing Online Transactions Explain the basic working of an online shopping system Discuss security issues in online banking Discuss credit card payments and describes the different types of credit card frauds Provide guidelines for ensuring credit card safety Explain various measures for securing online transactions Discuss the different techniques to identify secure online shopping sites such as taking care of SSL and the padlock symbol Describe how to identify an untrustworthy website Provide a checklist for online transactions security CSCU Module 09: Securing Email Communications Introduce various email security issues Explain how various email systems work Discuss various email security threats such as malicious email attachments, spamming, hoax/chain and scam emails, and Nigerian scam Page 5

Explain various email security procedures such as creating strong passwords, providing alternate email address, unchecking Keep Me Signed In/Remember Me, using https, checking for last account activity, scanning email attachments, turning off preview feature, and email filtering Explain how to obtain digital certificates and digitally sign your emails Describe how to configure Microsoft Outlook download settings List various email security tools such as Lockbin Provide an email communication checklist Provide a checklist for ensuring email security Provide a security checklist for checking emails on mobile CSCU Module 10: Social Engineering and Identity Theft Discuss Identity Theft Explain various methods attackers may use to steal identity Discuss the different misuses of a stolen identity Provide identity theft examples Explain social engineering with several examples Discuss the different types of social engineering techniques Describe the different human-based social engineering techniques Explain the different computer-based social engineering techniques Discuss the risk of social engineering through social networking websites Explain how to know if you are a victim of identity theft Discuss what a person can do if his/her identity is stolen Explain how to report identity theft Provide an identity theft protection checklist Provide a checklist for computer based identity theft protection CSCU Module 11: Security on Social Networking Sites Provide an introduction of social networking sites Discuss the different social networking security threats such as cyber bullying, identity theft, phishing scams, malware attacks, site flaws Describe various social networking threats to minors Explain how to stay safe on Facebook by configuring privacy settings, profile settings, privacy settings for applications, settings to block users and search settings Discuss the different measures to stay safe on MySpace by changing settings for account, comments and mail, friends request, IM and streaming Provide a social networking security checklist Page 6

Provide a social networking security checklist for parents and teachers to protect their child from social networking threats CSCU Module 12: Information Security and Legal Compliance Introduce Health Insurance Portability and Accountability Act (HIPPA) Provide a checklist for HIPAA compliance Discuss different provisions of FERPA (Family Educational Rights and Privacy Act) Provide a checklist for FERPA compliance Discuss PCI DSS (Payment Card Industry Data Security Standard ) Provide a checklist for PCI DSS compliance CSCU Module 13: Securing Mobile Devices Discuss various mobile security issues List various mobile phone services Discuss IMEI number and its importance Explain the different mobile security threats such as device loss, malware infection, application vulnerabilities Discuss various threats to Bluetooth devices Explain general mobile security procedure such as patching of mobile platforms and applications, avoiding mobile device theft, using power-on authentication, regularly backing up important data, using encryption to secure data in mobile device, enabling auto-lock feature, installing only signed applications and installing mobile phone antivirus Provide guidelines to Secure Bluetooth Connectivity Explain various security measures for iphone and ipad such as enabling passcode protection, enabling SIM PIN Protection, enabling auto-lock and re-mapping buttons Explain basic security procedures for BlackBerry and Windows Phone 7 mobile devices such as setting device password, changing the device password, locking device, encrypting data, using PIN and SIM lock List various mobile security tools Provide a Bluetooth security checklist Provide a checklist for mobile phone security Page 7