CSCUv3 Version Change Document
CSCUv3 Version Change Document
Module 01: Introduction to Data Security Module 01: Introduction to Data Security
Module 02: Securing Operating Systems Module 02: Securing Operating Systems
Module 03: Malware and Antivirus Module 03: Malware and Antivirus
Module 04: Internet Security Module 04: Internet Security
Module 05 Security on Social Networking Sites Module 05 Security on Social Networking Sites
Module 06 Securing Email Communications Module 06 Securing Email Communications
Module 07 Securing Mobile Devices Module 07 Securing Mobile Devices
Module 08: Securing Cloud Module 08: Securing Cloud
Module 09: Securing Network Connections Module 09: Securing Network Connections
Module 10: Data Backup and Disaster Recovery Module 10: Data Backup and Disaster Recovery
Module 11: Securing IoT Devices and Gaming Consoles
Module 12: Secure Remote Working
CSCUv2 CSCUv3
Module 01: Introduction to Data Security Module 01: Introduction to Data Security
▪ Data Loss Statistics Over Time ▪ Data Loss Statistics Over Time
▪ What is Data? ▪ What is Data?
• Data Vs. Information • Data Vs. Information
• Why is Personal Data Important? • Why is Personal Data Important?
• How is Organizational Data • How is Organizational Data
Important? Important?
• What are the Threats to Data? • What are the Threats to Data?
o Threats from Natural Disasters o Threats from Natural Disasters
o Threats to Your Data from You o Threats to Your Data from You
o Threats to Data from Others o Threats to Data from Others
▪ What is Data Security? ▪ What is Data Security?
o Why is Data Security o Why is Data Security
Necessary? Necessary?
• Elements of Security • Elements of Security
• Potential Losses Due to Security • Potential Losses Due to Security
Attacks? Attacks?
o Financial loss o Financial loss
o Unavailability of resources o Unavailability of resources
o Identity theft o Identity theft
o Loss of trust o Loss of trust
o Data loss/ theft o Data loss/ theft
o Misuse of computer resources o Misuse of computer resources
• How to Implement Security? • How to Implement Security?
o Precaution o Precaution
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document
o Maintenance o Maintenance
o Reaction o Reaction
• Layers of Security • Layers of Security
▪ Module Summary ▪ Module Summary
Module 02: Securing Operating Systems Module 02: Securing Operating Systems
▪ What does an Operating System Do? ▪ What does an Operating System Do?
▪ Guidelines for Windows OS Security ▪ Guidelines for Windows OS Security
• How to Lock the System? • How to Lock the System?
• How to Create a User Account • How to Create a User Account
Password in Windows 10? Password in Windows 10?
• How to Change a User Account • How to Change a User Account
Password in Windows 10? Password in Windows 10?
• How to Disable the Guest Account • How to Disable the Guest Account
in Windows 10? in Windows 10?
• How to Lock Out Unwanted Guests • How to Lock Out Unwanted Guests
in Windows 10? in Windows 10?
• How to Rename the Administrator • How to Rename the Administrator
Account in Windows 10? Account in Windows 10?
• What are Software Updates? • How to Disable Jump Lists in
Windows 10?
• How to Enable Windows Updates • What are Software Updates?
in Windows 10?
o How to Add New Apps in o How to Enable Windows
Windows Firewall in Windows Updates in Windows 10?
10?
o How to Turn On Windows o How to Add New Apps in
Defender? Windows Firewall in Windows
10?
o How to Enable BitLocker in o How to Turn On Windows
Windows 10? Defender?
o What is Windows Encrypting o How to Enable BitLocker in
File System (EFS)? Windows 10?
• How to Decrypt a File Using EFS in • What is Windows Encrypting File
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document
Computers?
▪ Module Summary ▪ What are Guidelines for Public
Computers?
▪ Module Summary
Module 03: Malware and Antivirus
▪ New Malware Found – Last 5 Years Module 03: Malware and Antivirus
▪ What is Malware? ▪ New Malware Found – Last 5 Years
• What are the Different Types of ▪ What is Malware?
Malware?
o Virus • What are the Different Types of
Malware?
o Trojan o Virus
o Worm o Trojan
o Spyware o Worm
o Ransomware o Spyware
o Rootkit o Ransomware
o What are the Symptoms of o Rootkit
Malware?
o What is Antivirus? • What are the Symptoms of
Malware?
▪ How does Antivirus Take Action ▪ What is Antivirus?
Against Infected Files?
• How to Choose the Right Antivirus • How does Antivirus Take Action
Software? Against Infected Files?
• What are the Limitations of • How to Choose the Right Antivirus
Antivirus Software? Software?
• What is Kaspersky PURE 3.0? • What are the Limitations of
Antivirus Software?
▪ How to Install Kaspersky PURE 3.0? ▪ Install Antivirus Software
▪ How to Activate Kaspersky PURE 3.0? ▪ How to Test if Antivirus is Working?
▪ How to Start a Scan in Kaspersky PURE ▪ Antivirus Security Checklist
3.0?
▪ How to Configure Parental Control in ▪ Module Summary
Kaspersky PURE 3.0?
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document
Abuse?
• How to Mitigate the Security Issues ▪ KidZui (Children Friendly Internet
in Instant Messaging? Software)
▪ Child Online Safety ▪ Module Summary
• What are the Risks Posed by the
Internet on Children?
• What Symptoms Do Children, Who Module 05 Security on Social Networking
Are Abused Online, Display? Sites
• Guidelines to Protect Children from ▪ What are Social Networking Sites?
Online Threats
▪ How to Report an Internet Crime? • What is a Profile?
• What Actions to Take When the • What are the Risks Associated with
Child Becomes a Victim of Online Social Networking Sites?
Abuse?
▪ KidZui (Children Friendly Internet o Phishing
Software)
▪ Module Summary o Identity theft
o Malware
Module 05 Security on Social Networking o Site flaws
Sites
▪ What are Social Networking Sites? o URL Spoofing
• What is a Profile? o Clickjacking
• What are the Risks Associated with o Social Engineering
Social Networking Sites?
o Phishing • What are the Social Networking
Threats to Minors?
o Identity theft ▪ What is Facebook?
o Malware • How to View Profile Settings in
Facebook?
o Site flaws • How to Access General Settings in
Facebook?
o URL Spoofing • How to Change Name in Facebook?
o Clickjacking • How to Change Username in
Facebook?
• What are the Key Considerations • What are Email Security Threats?
While Choosing an Email Client?
• What is an Email Message? o Email Security Threats:
Malicious Email Attachments
• Why Email Security? o Email Security Threats:
Malicious User Redirection
• What are Email Security Threats? o How to Recognize Emails
Containing Malicious
Attachments/ Links?
o Email Security Threats: o Case Study
Malicious Email Attachments
o Email Security Threats: o Email Security Threats: Phishing
Malicious User Redirection
o How to Recognize Emails o Email Security Threats: Hoax
Containing Malicious Mail
Attachments/ Links?
o Case Study o Email Security Threats:
Spamming
o Email Security Threats: Phishing o Anti-Spamming Tool:
SPAMfighter
o Email Security Threats: Hoax o Email Security Threats:
Mail Nigerian Scam
o Email Security Threats: • Case Study
Spamming
o Anti-Spamming Tool: • Email Security Procedures
SPAMfighter
o Email Security Threats: o How to Create Strong
Nigerian Scam Passwords?
• Case Study o How to Disable Keep Me Signed
In/Stay Signed In Functions?
• Email Security Procedures o How to Provide Recovery Email
Address for Mail Recovery?
o How to Create Strong o Use HTTPS Enabled Email
Passwords? Service Provider
o How to Disable Keep Me Signed o How to Turn Off the Preview
In/Stay Signed In Functions? Feature?
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document
Devices?
▪ How to Secure iPad? ▪ How to Enable Screen Lock in Android
Devices?
▪ How to Backup Data in iOS Devices? • How to Enable SIM Lock in Android
Devices?
• Find my iPhone Feature in iOS • How to Backup Data in Android
Devices?
▪ How to Enable Screen Lock in Android • How to Encrypt Android Devices?
Devices?
o How to Enable SIM Lock in • Android Device Manager Feature in
Android Devices? Android
▪ How to Backup Data in Android ▪ How to Enable Password in Windows
Devices? Phone Devices?
• How to Encrypt Android Devices? • How to Enable SIM PIN in Windows
Phone Devices?
• Android Device Manager Feature in • How to Backup Data in Windows
Android Phone Devices?
▪ How to Enable Password in Windows • Find My Phone Feature in Windows
Phone Devices? Phone
• How to Enable SIM PIN in Windows ▪ What are Mobile Security Tools?
Phone Devices?
• How to Backup Data in Windows • Lookout Mobile Security
Phone Devices?
• Find My Phone Feature in Windows • Snap Secure Mobile Security
Phone
▪ What are Mobile Security Tools? ▪ Bluetooth Security Checklist
• Lookout Mobile Security ▪ Mobile Phone Security Checklist
• Snap Secure Mobile Security ▪ Module Summary
▪ Bluetooth Security Checklist
▪ Mobile Phone Security Checklist Module 08: Securing Cloud
▪ Module Summary ▪ What is Cloud Computing?
▪ What are the Different types of Cloud?
Module 08: Securing Cloud • Private cloud
▪ What is Cloud Computing? • Public cloud
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document
Data Privacy?
• Encrypt • Avoid storing sensitive data on
cloud
• Read terms and conditions ▪ What are the Bases for Choosing a
carefully Cloud Service Provider?
• Avoid the share feature on cloud ▪ Module Summary
• Avoid storing sensitive data on
cloud
▪ What are the Bases for Choosing a Module 09: Securing Network Connections
Cloud Service Provider?
▪ Module Summary ▪ What are Networks?
• Local Area Network (LAN)
Module 09: Securing Network Connections • Wide Area Network (WAN)
▪ What are Networks? • Virtual Private Network (VPN)
• Local Area Network (LAN) ▪ Wi-Fi Vs. Ethernet
• Wide Area Network (WAN) ▪ What are the Duties of Network
Administrators?
• Virtual Private Network (VPN) ▪ What is a Home Network?
▪ Wi-Fi Vs. Ethernet • How To Set Up a Home Network?
▪ What are the Duties of Network ▪ What are Wireless Networks?
Administrators?
▪ What is a Home Network? • How to Set up a Wireless Network
in Windows 10?
• How To Set Up a Home Network? • How to Change Wireless
Networking Configuration in
Windows 10?
▪ What are Wireless Networks? ▪ How to Setup a Wireless Network in
Mac OS X?
• How to Set up a Wireless Network ▪ How to Set up PC’s Name in Windows
in Windows 10? 10?
• How to Change Wireless ▪ How to Set up Workgroup Name in
Networking Configuration in Windows 10?
Windows 10?
▪ How to Setup a Wireless Network in ▪ How to Share Files in Windows 10?
Mac OS X?
▪ How to Set up PC’s Name in Windows ▪ How to Hide a Folder in a Shared
10? Windows 10 Computer?
▪ How to Set up Workgroup Name in ▪ How to Share a Printer in Windows 10?
Windows 10?
▪ How to Share Files in Windows 10? ▪ How to Access Printers on Other PC’s?
▪ How to Hide a Folder in a Shared ▪ How to Access Files on Other PC’s?
Windows 10 Computer?
▪ How to Share a Printer in Windows 10? ▪ How to Set up PC’s Name in Mac OS X?
▪ How to Access Printers on Other PC’s? ▪ How to Set up Workgroup Name in
Mac OS X?
▪ How to Access Files on Other PC’s? ▪ How to Create User Accounts in Mac
OS X?
▪ How to Set up PC’s Name in Mac OS X? ▪ How to Create Groups in Mac OS X?
▪ How to Set up Workgroup Name in ▪ How to Share Files and Folders in Mac
Mac OS X? OS X?
▪ How to Create User Accounts in Mac ▪ How to Share Printer in Mac OS X?
OS X?
▪ How to Create Groups in Mac OS X? ▪ How to Access Other Macs on the
Common Network?
▪ How to Share Files and Folders in Mac ▪ What are the Threats to Wireless
OS X? Networks?
▪ How to Share Printer in Mac OS X? • Configuration problems
▪ How to Access Other Macs on the • Evil twin
Common Network?
▪ What are the Threats to Wireless • War driver
Networks?
• Configuration problems ▪ How to Secure Wireless Networks?
• Evil twin • What are the Measures for
Securing Network Connections?
• War driver o Firewall
▪ How to Secure Wireless Networks? o Antivirus
• What are the Measures for o Encryption
Securing Network Connections?