Certified Secure Computer User

Schedule

Start End Duration Location Details

Course Details

Certified Secure Computer User

Course code: CSCU

Duration: 2 Days

Course Description:

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

Course Objectives:
•    Perform incident response and forensics
•    Perform electronic evidence collections
•    Perform digital forensic acquisitions
•    Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.
•    Examine and analyze text, graphics, multimedia, and digital images
•    Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
•    Recover information and electronic data from computer hard drives and other data storage devices
•    Follow strict data and evidence handling procedures
•    Maintain audit trail (i.e., chain of custody) and evidence integrity
•    Work on technical examination, analysis and reporting of computer-based evidence
•    Prepare and maintain case files
•    Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files 
•    Gather volatile and non-volatile information from Windows, MAC and Linux
•    Recover deleted files and partitions in Windows, Mac OS X, and Linux

Intended Audience:
This course is specifically designed for todays’ computer users who use the internet extensively to work, study and play.

Course Outlines:

•    Introduction to Security
•    Securing Operating Systems
•    Malware and Antivirus
•    Internet Security
•    Security on Social Networking Sites
•    Securing Email Communications
•    Securing Mobile Devices
•    Securing the Cloud
•    Securing Network Connections
•    Data Backup and Disaster Recovery