0% found this document useful (0 votes)
94 views22 pages

CSCUv3 Version Change Document

The document summarizes changes between versions CSCUv2 and CSCUv3 of the Certified Secure Computer User certification. CSCUv3 includes two new modules on securing IoT devices/gaming consoles and secure remote working. All screenshots and tool listings in the materials have been updated. The core modules remain largely the same, with some updated content and removed content between the versions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views22 pages

CSCUv3 Version Change Document

The document summarizes changes between versions CSCUv2 and CSCUv3 of the Certified Secure Computer User certification. CSCUv3 includes two new modules on securing IoT devices/gaming consoles and secure remote working. All screenshots and tool listings in the materials have been updated. The core modules remain largely the same, with some updated content and removed content between the versions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

CSCUv3 Version Change Document

Certified Secure Computer User (CSCU) v3


Version Comparison

A. CSCUv3 Version Change Summary


1. Two newly developed modules are added in CSCUv3 version
➢ Module 11: Securing IoT Devices and Gaming Consoles
➢ Module 12: Secure Remote Working
2. All the tool screenshots are replaced with the latest version
3. All the tool listing slides are updated with the latest tools

B. CSCUv2 Vs CSCUv3 Core Modules Comparison

Module 01: Introduction to Data Security Module 01: Introduction to Data Security
Module 02: Securing Operating Systems Module 02: Securing Operating Systems
Module 03: Malware and Antivirus Module 03: Malware and Antivirus
Module 04: Internet Security Module 04: Internet Security
Module 05 Security on Social Networking Sites Module 05 Security on Social Networking Sites
Module 06 Securing Email Communications Module 06 Securing Email Communications
Module 07 Securing Mobile Devices Module 07 Securing Mobile Devices
Module 08: Securing Cloud Module 08: Securing Cloud
Module 09: Securing Network Connections Module 09: Securing Network Connections
Module 10: Data Backup and Disaster Recovery Module 10: Data Backup and Disaster Recovery
Module 11: Securing IoT Devices and Gaming Consoles
Module 12: Secure Remote Working

Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

C. Courseware Content Comparison

The notations used:


1. Green points are new content added in CSCUv3 core modules
2. Striked points are removed from CSCUv3 core modules

CSCUv2 CSCUv3
Module 01: Introduction to Data Security Module 01: Introduction to Data Security
▪ Data Loss Statistics Over Time ▪ Data Loss Statistics Over Time
▪ What is Data? ▪ What is Data?
• Data Vs. Information • Data Vs. Information
• Why is Personal Data Important? • Why is Personal Data Important?
• How is Organizational Data • How is Organizational Data
Important? Important?
• What are the Threats to Data? • What are the Threats to Data?
o Threats from Natural Disasters o Threats from Natural Disasters
o Threats to Your Data from You o Threats to Your Data from You
o Threats to Data from Others o Threats to Data from Others
▪ What is Data Security? ▪ What is Data Security?
o Why is Data Security o Why is Data Security
Necessary? Necessary?
• Elements of Security • Elements of Security
• Potential Losses Due to Security • Potential Losses Due to Security
Attacks? Attacks?
o Financial loss o Financial loss
o Unavailability of resources o Unavailability of resources
o Identity theft o Identity theft
o Loss of trust o Loss of trust
o Data loss/ theft o Data loss/ theft
o Misuse of computer resources o Misuse of computer resources
• How to Implement Security? • How to Implement Security?
o Precaution o Precaution
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

o Maintenance o Maintenance
o Reaction o Reaction
• Layers of Security • Layers of Security
▪ Module Summary ▪ Module Summary

Module 02: Securing Operating Systems Module 02: Securing Operating Systems
▪ What does an Operating System Do? ▪ What does an Operating System Do?
▪ Guidelines for Windows OS Security ▪ Guidelines for Windows OS Security
• How to Lock the System? • How to Lock the System?
• How to Create a User Account • How to Create a User Account
Password in Windows 10? Password in Windows 10?
• How to Change a User Account • How to Change a User Account
Password in Windows 10? Password in Windows 10?
• How to Disable the Guest Account • How to Disable the Guest Account
in Windows 10? in Windows 10?
• How to Lock Out Unwanted Guests • How to Lock Out Unwanted Guests
in Windows 10? in Windows 10?
• How to Rename the Administrator • How to Rename the Administrator
Account in Windows 10? Account in Windows 10?
• What are Software Updates? • How to Disable Jump Lists in
Windows 10?
• How to Enable Windows Updates • What are Software Updates?
in Windows 10?
o How to Add New Apps in o How to Enable Windows
Windows Firewall in Windows Updates in Windows 10?
10?
o How to Turn On Windows o How to Add New Apps in
Defender? Windows Firewall in Windows
10?
o How to Enable BitLocker in o How to Turn On Windows
Windows 10? Defender?
o What is Windows Encrypting o How to Enable BitLocker in
File System (EFS)? Windows 10?
• How to Decrypt a File Using EFS in • What is Windows Encrypting File
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Windows? System (EFS)?


• How to Disable Unnecessary • How to Decrypt a File Using EFS in
Services in Windows 10? Windows?
• How to Kill Unwanted Processes in • How to Disable Unnecessary
Windows 10? Services in Windows 10?
• How to Disable Simple File Sharing • How to Kill Unwanted Processes in
in Windows 10? Windows 10?
• How to Raise the UAC Slider Bar? • How to Disable Simple File Sharing
in Windows 10?
• Windows 10 Security Checklist • How to Raise the UAC Slider Bar?
▪ Guidelines for Mac OS X Security • Windows 10 Security Checklist
• How to Lock the System? ▪ Guidelines for Mac OS X Security
• How to Disable Automatic login? • How to Lock the System?
• How to Allow App Downloads from • How to Disable Automatic login?
Mac App Store?
• How to Enable Automatic Software • How to Allow App Downloads from
Updates? Mac App Store?
• How to Disable Guest Account? • How to Enable Automatic Software
Updates?
• How to Enable FileVault? • How to Disable Guest Account?
• How to Enable Firewall? • How to Enable FileVault?
• How to Change User Account • How to Enable Firewall?
Password?
• How to Enable Parental Controls? • How to Change User Account
Password?
o How to Change Parental • How to Enable Parental Controls?
Control Settings?
• MAC OS Security Checklist o How to Change Parental
Control Settings?
▪ Resources on the Internet for • MAC OS Security Checklist
Computer Security
▪ Operating Systems Security Checklist ▪ Resources on the Internet for
Computer Security
▪ What are Guidelines for Public ▪ Operating Systems Security Checklist
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Computers?
▪ Module Summary ▪ What are Guidelines for Public
Computers?
▪ Module Summary
Module 03: Malware and Antivirus
▪ New Malware Found – Last 5 Years Module 03: Malware and Antivirus
▪ What is Malware? ▪ New Malware Found – Last 5 Years
• What are the Different Types of ▪ What is Malware?
Malware?
o Virus • What are the Different Types of
Malware?
o Trojan o Virus
o Worm o Trojan
o Spyware o Worm
o Ransomware o Spyware
o Rootkit o Ransomware
o What are the Symptoms of o Rootkit
Malware?
o What is Antivirus? • What are the Symptoms of
Malware?
▪ How does Antivirus Take Action ▪ What is Antivirus?
Against Infected Files?
• How to Choose the Right Antivirus • How does Antivirus Take Action
Software? Against Infected Files?
• What are the Limitations of • How to Choose the Right Antivirus
Antivirus Software? Software?
• What is Kaspersky PURE 3.0? • What are the Limitations of
Antivirus Software?
▪ How to Install Kaspersky PURE 3.0? ▪ Install Antivirus Software
▪ How to Activate Kaspersky PURE 3.0? ▪ How to Test if Antivirus is Working?
▪ How to Start a Scan in Kaspersky PURE ▪ Antivirus Security Checklist
3.0?
▪ How to Configure Parental Control in ▪ Module Summary
Kaspersky PURE 3.0?
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

▪ What is Avast Antivirus?


▪ How to Install Avast Antivirus? Module 04: Internet Security
▪ How to Register Avast Antivirus? ▪ What is Internet Security?
▪ How to Run a Scan on Avast Antivirus? ▪ What is a Web Browser?
▪ How to Test if Antivirus is Working? • How to Secure Web Browsers?
▪ Antivirus Security Checklist • How to Secure Windows Edge?
▪ Module Summary • How to Secure Mozilla Firefox?
• How to Secure Safari?
Module 04: Internet Security • How to Secure Google Chrome?
▪ What is Internet Security? • How to Secure Internet Explorer?
▪ What is a Web Browser? ▪ What are the Threats to Web
Browsers?
• How to Secure Web Browsers? • Java Browser Plugin
• How to Secure Windows Edge? • ActiveX
• How to Secure Mozilla Firefox? • Cookies
• How to Secure Safari? • Extensions
• How to Secure Google Chrome? ▪ How to Identify a Secure Website?
• How to Secure Internet Explorer? ▪ What is Instant Messaging?
▪ What are the Threats to Web • What are the Security Issues
Browsers? Regarding Instant Messaging?
• Java Browser Plugin • How to Mitigate the Security Issues
in Instant Messaging?
• ActiveX ▪ Child Online Safety
• Cookies • What are the Risks Posed by the
Internet on Children?
• Extensions • What Symptoms Do Children, Who
Are Abused Online, Display?
▪ How to Identify a Secure Website? • Guidelines to Protect Children from
Online Threats
▪ What is Instant Messaging? ▪ How to Report an Internet Crime?
• What are the Security Issues • What Actions to Take When the
Regarding Instant Messaging? Child Becomes a Victim of Online
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Abuse?
• How to Mitigate the Security Issues ▪ KidZui (Children Friendly Internet
in Instant Messaging? Software)
▪ Child Online Safety ▪ Module Summary
• What are the Risks Posed by the
Internet on Children?
• What Symptoms Do Children, Who Module 05 Security on Social Networking
Are Abused Online, Display? Sites
• Guidelines to Protect Children from ▪ What are Social Networking Sites?
Online Threats
▪ How to Report an Internet Crime? • What is a Profile?
• What Actions to Take When the • What are the Risks Associated with
Child Becomes a Victim of Online Social Networking Sites?
Abuse?
▪ KidZui (Children Friendly Internet o Phishing
Software)
▪ Module Summary o Identity theft
o Malware
Module 05 Security on Social Networking o Site flaws
Sites
▪ What are Social Networking Sites? o URL Spoofing
• What is a Profile? o Clickjacking
• What are the Risks Associated with o Social Engineering
Social Networking Sites?
o Phishing • What are the Social Networking
Threats to Minors?
o Identity theft ▪ What is Facebook?
o Malware • How to View Profile Settings in
Facebook?
o Site flaws • How to Access General Settings in
Facebook?
o URL Spoofing • How to Change Name in Facebook?
o Clickjacking • How to Change Username in
Facebook?

Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

o Social Engineering • How to Hide Email ID in Facebook?


• What are the Social Networking • How to Change Password in
Threats to Minors? Facebook?
▪ What is Facebook? • How to Access Security Settings in
Facebook?
• How to View Profile Settings in • How to Activate Login Alerts in
Facebook? Facebook?
• How to Access General Settings in • How to Generate App Passwords in
Facebook? Facebook?
• How to Change Name in Facebook? • How to Create a Trusted Contacts
List in Facebook?
• How to Change Username in • How to View Previous Login
Facebook? Activities in Facebook?
• How to Hide Email ID in Facebook? • How to Deactivate Your Facebook
Account?
• How to Change Password in • How to View Privacy Settings in
Facebook? Facebook?
• How to Access Security Settings in o How to Restrict Unwanted
Facebook? Users from Viewing Your Posts
on Facebook?
• How to Activate Login Alerts in o How to Review Tagged Posts on
Facebook? Facebook?
• How to Create a Trusted Contacts o How to Limit the Audience for
List in Facebook? Posts Shared on Facebook?
• How to View Previous Login o How to Allow Only Certain
Activities in Facebook? People to Contact You on
Facebook?
• How to Deactivate Your Facebook o How to Activate Message
Account? Filtering in Facebook Inbox?
• How to View Privacy Settings in o Who can Look you up Using the
Facebook? Email Address you Provided in
Facebook?
o How to Restrict Unwanted o Who can Look you up Using the
Users from Viewing Your Posts Phone Number you Provided in
on Facebook? Facebook?
o How to Review Tagged Posts on o How to Link Other Search
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Facebook? Engines to your Timeline on


Facebook?
o How to Limit the Audience for • How to Edit Timeline and Tagging
Posts Shared on Facebook? Settings in Facebook?
o How to Allow Only Certain • How to Access Blocking Settings in
People to Contact You on Facebook?
Facebook?
o Who can Look you up Using the o How to Add Friends to the
Email Address you Provided in Restricted List in Facebook?
Facebook?
o Who can Look you up Using the o How to Block App and Event
Phone Number you Provided in Invites in Facebook?
Facebook?
o How to Link Other Search o How to Block Apps and Pages in
Engines to your Timeline on Facebook?
Facebook?
• How to Edit Timeline and Tagging • How to Edit Mobile Settings in
Settings in Facebook? Facebook?
• How to Access Blocking Settings in • How to Edit Notification Settings in
Facebook? Facebook?
o How to Add Friends to the • How to Edit Follower Settings in
Restricted List in Facebook? Facebook?
o How to Block App and Event • How to Edit App Settings in
Invites in Facebook? Facebook?
o How to Block Apps and Pages in • How to Play Games Anonymously
Facebook? on Facebook?
• How to Edit Mobile Settings in • How to Access Ads Settings in
Facebook? Facebook?
• How to Edit Notification Settings in • How to Edit Third-Party Site
Facebook? Settings in Facebook?
• How to Edit Follower Settings in • How to Edit Ads and Friends
Facebook? Settings in Facebook?
• How to Edit App Settings in ▪ Facebook Security Tips
Facebook?
• How to Access Ads Settings in ▪ What is Twitter?
Facebook?

Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

• How to Edit Third-Party Site • How to Change Account Settings in


Settings in Facebook? Twitter?
• How to Edit Ads and Friends • How to Change Security Settings in
Settings in Facebook? Twitter?
▪ Facebook Security Tips • How to Change Privacy Settings in
Twitter?
▪ What is Twitter? • How to Associate Your Mobile
Phone with Your Twitter Account?
• How to Change Account Settings in • How to Change Password in
Twitter? Twitter?
• How to Change Security Settings in • How to Disable Email Notifications
Twitter? in Twitter?
• How to Change Privacy Settings in • How to Connect Third-Party Apps
Twitter? with Your Twitter Account?
• How to Associate Your Mobile o How to Revoke Access of Third-
Phone with Your Twitter Account? Party Apps in Twitter?
• How to Change Password in • How to Block a Twitter User from a
Twitter? Tweet?
• How to Disable Email Notifications • How to Block a Twitter User from a
in Twitter? Profile?
• How to Connect Third-Party Apps ▪ Social Networking Security Checklist
with Your Twitter Account?
• How to Block a Twitter User from a ▪ Module Summary
Tweet?
• How to Block a Twitter User from a
Profile?
▪ Social Networking Security Checklist
▪ Module Summary Module 06 Securing Email Communications
▪ What is Email?
Module 06 Securing Email Communications • What are Email Clients?
▪ Percentage of Total Spam Volume for • What are the Key Considerations
the December 2014 and January 2015 While Choosing an Email Client?
▪ What is Email? • What is an Email Message?
• What are Email Clients? • Why Email Security?
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

• What are the Key Considerations • What are Email Security Threats?
While Choosing an Email Client?
• What is an Email Message? o Email Security Threats:
Malicious Email Attachments
• Why Email Security? o Email Security Threats:
Malicious User Redirection
• What are Email Security Threats? o How to Recognize Emails
Containing Malicious
Attachments/ Links?
o Email Security Threats: o Case Study
Malicious Email Attachments
o Email Security Threats: o Email Security Threats: Phishing
Malicious User Redirection
o How to Recognize Emails o Email Security Threats: Hoax
Containing Malicious Mail
Attachments/ Links?
o Case Study o Email Security Threats:
Spamming
o Email Security Threats: Phishing o Anti-Spamming Tool:
SPAMfighter
o Email Security Threats: Hoax o Email Security Threats:
Mail Nigerian Scam
o Email Security Threats: • Case Study
Spamming
o Anti-Spamming Tool: • Email Security Procedures
SPAMfighter
o Email Security Threats: o How to Create Strong
Nigerian Scam Passwords?
• Case Study o How to Disable Keep Me Signed
In/Stay Signed In Functions?
• Email Security Procedures o How to Provide Recovery Email
Address for Mail Recovery?
o How to Create Strong o Use HTTPS Enabled Email
Passwords? Service Provider
o How to Disable Keep Me Signed o How to Turn Off the Preview
In/Stay Signed In Functions? Feature?
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

o How to Provide Recovery Email • What is Email Filtering?


Address for Mail Recovery?
o Use HTTPS Enabled Email o Scan Email Attachments for
Service Provider Malware
o How to Turn Off the Preview o How to Check for Last Account
Feature? Activity?
• What is Email Filtering? o How to Digitally Sign Your
Emails?
o Scan Email Attachments for ▪ What is Encryption?
Malware
o How to Check for Last Account • Some Commonly Used Terms in
Activity? Encryption
o How to Digitally Sign Your • What are the Types of Encryption?
Emails?
▪ What is Encryption? o Symmetric encryption
• Some Commonly Used Terms in o Asymmetric encryption
Encryption
• What are the Types of Encryption? • What is a Hash Function?
o Symmetric encryption • What are the Limitations of
Encryption?
o Asymmetric encryption • Email Security Tools
• What is a Hash Function? o Comodo AntiSpam
• What are the Limitations of o Netcraft Toolbar
Encryption?
• Email Security Tools o PhishTank SiteChecker
o Comodo AntiSpam o Spamihilator
o Netcraft Toolbar o GFI MailEssentials
o PhishTank SiteChecker o McAfee Total Protection
o Spamihilator o PhishTank
o GFI MailEssentials o HP SecureMail
o McAfee Total Protection o MessageLock Email Encryption
for Outlook
o PhishTank o Sophos Email Appliance

Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

o HP SecureMail • Email Communication Checklist


o MessageLock Email Encryption • Email Security Checklist
for Outlook
o Sophos Email Appliance o Security Checklist for Checking
Emails on Mobile
• Email Communication Checklist ▪ Module Summary
• Email Security Checklist
o Security Checklist for Checking Module 07 Securing Mobile Devices
Emails on Mobile
▪ Module Summary ▪ What is Mobile Device Security?
• What is Mobile Operating System?
Module 07 Securing Mobile Devices • What is IMEI Number?
▪ What is Mobile Device Security? • What are Mobile Device Security
Threats?
• What is Mobile Operating System? o Eavesdropping
• What is IMEI Number? o Unauthorized access
• What are Mobile Device Security o Theft and loss
Threats?
o Eavesdropping o Unmanaged applications
o Unauthorized access • What is Mobile Malware?
o Theft and loss • What are the Security
Vulnerabilities in Mobile Phones?
o Unmanaged applications o Insecure data storage
• What is Mobile Malware? o Insufficient transport layer
protection
• What are the Security o Poor authorization and
Vulnerabilities in Mobile Phones? protection
o Insecure data storage o Broken cryptography
o Insufficient transport layer • What are the Threats to Bluetooth
protection Devices?
o Poor authorization and o Bluesnarfing
protection
o Broken cryptography o Man in the middle attack
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

• What are the Threats to Bluetooth o Backdoor hacking


Devices?
o Bluesnarfing • Why to Update Mobile Operating
Systems?
o Man in the middle attack o How to Update Operating
System in Android Devices?
o Backdoor hacking o How to Update Operating
System in iOS Devices?
• Why to Update Mobile Operating o How to Update Applications in
Systems? Android Devices?
o How to Update Operating o How to Update Applications in
System in Android Devices? iOS Devices?
o How to Update Operating • What is Mobile Phone Antivirus?
System in iOS Devices?
o How to Update Applications in • How to Secure Bluetooth
Android Devices? Connectivity?
o How to Update Applications in • How to Secure Wi-Fi Connectivity?
iOS Devices?
• What is Mobile Phone Antivirus? • Why should Users Encrypt their
Smartphones?
• How to Secure Bluetooth • How to Prevent Mobile Device
Connectivity? Theft?
• How to Secure Wi-Fi Connectivity? • How to Enable SIM PIN Protection
in iOS Devices?
• Why should Users Encrypt their • How to Enable Passcode Protection
Smartphones? in iOS Devices?
• How to Prevent Mobile Device • How to Enable Touch ID in iOS
Theft? Devices?
• How to Enable SIM PIN Protection • How to Enable Auto-Lock in iOS
in iOS Devices? Devices?
• How to Enable Passcode Protection ▪ How to Secure iPad?
in iOS Devices?
• How to Enable Touch ID in iOS ▪ How to Backup Data in iOS Devices?
Devices?
• How to Enable Auto-Lock in iOS • Find my iPhone Feature in iOS
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Devices?
▪ How to Secure iPad? ▪ How to Enable Screen Lock in Android
Devices?
▪ How to Backup Data in iOS Devices? • How to Enable SIM Lock in Android
Devices?
• Find my iPhone Feature in iOS • How to Backup Data in Android
Devices?
▪ How to Enable Screen Lock in Android • How to Encrypt Android Devices?
Devices?
o How to Enable SIM Lock in • Android Device Manager Feature in
Android Devices? Android
▪ How to Backup Data in Android ▪ How to Enable Password in Windows
Devices? Phone Devices?
• How to Encrypt Android Devices? • How to Enable SIM PIN in Windows
Phone Devices?
• Android Device Manager Feature in • How to Backup Data in Windows
Android Phone Devices?
▪ How to Enable Password in Windows • Find My Phone Feature in Windows
Phone Devices? Phone
• How to Enable SIM PIN in Windows ▪ What are Mobile Security Tools?
Phone Devices?
• How to Backup Data in Windows • Lookout Mobile Security
Phone Devices?
• Find My Phone Feature in Windows • Snap Secure Mobile Security
Phone
▪ What are Mobile Security Tools? ▪ Bluetooth Security Checklist
• Lookout Mobile Security ▪ Mobile Phone Security Checklist
• Snap Secure Mobile Security ▪ Module Summary
▪ Bluetooth Security Checklist
▪ Mobile Phone Security Checklist Module 08: Securing Cloud
▪ Module Summary ▪ What is Cloud Computing?
▪ What are the Different types of Cloud?
Module 08: Securing Cloud • Private cloud
▪ What is Cloud Computing? • Public cloud
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

▪ What are the Different types of Cloud? • Community cloud


• Private cloud • Hybrid cloud
• Public cloud ▪ What are the Different types of Cloud
Computing Services?
• Community cloud • Infrastructure as a Service (IaaS)
• Hybrid cloud • Platform as a Service (PaaS)
▪ What are the Different types of Cloud • Software as a Service (Saas)
Computing Services?
• Infrastructure as a Service (IaaS) ▪ How Cloud Works?
• Platform as a Service (PaaS) ▪ What are the Threats to Cloud
Security?
• Software as a Service (Saas) • Data breach
▪ How Cloud Works? • Account hacking
▪ What are the Threats to Cloud • Disgruntled employee
Security?
• Data breach • Technology loopholes
• Account hacking • Shared space
• Disgruntled employee ▪ What Precautions to Take Against
Cloud Security Threats?
• Technology loopholes ▪ What are the Privacy Issues Faced on
Cloud?
• Shared space • Data ownership
▪ What Precautions to Take Against • Data location
Cloud Security Threats?
▪ What are the Privacy Issues Faced on • Data migration
Cloud?
• Data ownership • Data permanency
• Data location ▪ What Precautions Can Be Taken For
Data Privacy?
• Data migration • Encrypt
• Data permanency • Read terms and conditions
carefully
▪ What Precautions Can Be Taken For • Avoid the share feature on cloud
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Data Privacy?
• Encrypt • Avoid storing sensitive data on
cloud
• Read terms and conditions ▪ What are the Bases for Choosing a
carefully Cloud Service Provider?
• Avoid the share feature on cloud ▪ Module Summary
• Avoid storing sensitive data on
cloud
▪ What are the Bases for Choosing a Module 09: Securing Network Connections
Cloud Service Provider?
▪ Module Summary ▪ What are Networks?
• Local Area Network (LAN)
Module 09: Securing Network Connections • Wide Area Network (WAN)
▪ What are Networks? • Virtual Private Network (VPN)
• Local Area Network (LAN) ▪ Wi-Fi Vs. Ethernet
• Wide Area Network (WAN) ▪ What are the Duties of Network
Administrators?
• Virtual Private Network (VPN) ▪ What is a Home Network?
▪ Wi-Fi Vs. Ethernet • How To Set Up a Home Network?
▪ What are the Duties of Network ▪ What are Wireless Networks?
Administrators?
▪ What is a Home Network? • How to Set up a Wireless Network
in Windows 10?
• How To Set Up a Home Network? • How to Change Wireless
Networking Configuration in
Windows 10?
▪ What are Wireless Networks? ▪ How to Setup a Wireless Network in
Mac OS X?
• How to Set up a Wireless Network ▪ How to Set up PC’s Name in Windows
in Windows 10? 10?
• How to Change Wireless ▪ How to Set up Workgroup Name in
Networking Configuration in Windows 10?
Windows 10?
▪ How to Setup a Wireless Network in ▪ How to Share Files in Windows 10?

Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Mac OS X?
▪ How to Set up PC’s Name in Windows ▪ How to Hide a Folder in a Shared
10? Windows 10 Computer?
▪ How to Set up Workgroup Name in ▪ How to Share a Printer in Windows 10?
Windows 10?
▪ How to Share Files in Windows 10? ▪ How to Access Printers on Other PC’s?
▪ How to Hide a Folder in a Shared ▪ How to Access Files on Other PC’s?
Windows 10 Computer?
▪ How to Share a Printer in Windows 10? ▪ How to Set up PC’s Name in Mac OS X?
▪ How to Access Printers on Other PC’s? ▪ How to Set up Workgroup Name in
Mac OS X?
▪ How to Access Files on Other PC’s? ▪ How to Create User Accounts in Mac
OS X?
▪ How to Set up PC’s Name in Mac OS X? ▪ How to Create Groups in Mac OS X?
▪ How to Set up Workgroup Name in ▪ How to Share Files and Folders in Mac
Mac OS X? OS X?
▪ How to Create User Accounts in Mac ▪ How to Share Printer in Mac OS X?
OS X?
▪ How to Create Groups in Mac OS X? ▪ How to Access Other Macs on the
Common Network?
▪ How to Share Files and Folders in Mac ▪ What are the Threats to Wireless
OS X? Networks?
▪ How to Share Printer in Mac OS X? • Configuration problems
▪ How to Access Other Macs on the • Evil twin
Common Network?
▪ What are the Threats to Wireless • War driver
Networks?
• Configuration problems ▪ How to Secure Wireless Networks?
• Evil twin • What are the Measures for
Securing Network Connections?
• War driver o Firewall
▪ How to Secure Wireless Networks? o Antivirus
• What are the Measures for o Encryption
Securing Network Connections?

Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

o Firewall o Browsing only secure websites


o Antivirus ▪ What are Network Adapters?
o Encryption • How to Install Network Adapters?
o Browsing only secure websites • How to Acess Network Setup
Wizard?
▪ What are Network Adapters? • How to Check Network Adapter
Status?
• How to Install Network Adapters? • Network Adapter Has Limited or No
Connectivity
• How to Acess Network Setup • Network Adapter is Connected, but
Wizard? User Cannot Reach the Internet
• How to Check Network Adapter ▪ Home Network Safety Checklist
Status?
• Network Adapter Has Limited or No ▪ Module Summary
Connectivity
• Network Adapter is Connected, but
User Cannot Reach the Internet
▪ Home Network Safety Checklist Module 10: Data Backup and Disaster
Recovery
▪ Module Summary ▪ What is Data Backup?
• Why is Data Backup Necessary?
Module 10: Data Backup and Disaster ▪ What are the Reasons for Data Loss?
Recovery
▪ What is Data Backup? • Human error
• Why is Data Backup Necessary? • Software failure
▪ What are the Reasons for Data Loss? • Computer virus
• Human error • Hardware malfunction
• Software failure • Hardware theft
• Computer virus • Natural disaster
• Hardware malfunction ▪ What Files to Backup and How Often?
• Hardware theft • What are the Types of Data
Backup?
• Natural disaster o Full system backup
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

▪ What Files to Backup and How Often? o Incremental backup


• What are the Types of Data o Differential backup
Backup?
o Full system backup o Online data backup
o Incremental backup • What are the Advantages of Online
Data Backup?
o Differential backup o What are Online Backup Service
Providers?
o Online data backup • Types of Backups Offered by
Various Operating Systems
• What are the Advantages of Online • How to Create System Image
Data Backup? Backup in Windows?
o What are Online Backup Service o How to Create File History
Providers? Backup in Windows?
• Types of Backups Offered by o How to Restore Backed Up Data
Various Operating Systems Using File History?
• How to Create System Image • How to Create Mac Backup through
Backup in Windows? Time Machine?
o How to Create File History ▪ Deleting Vs. Permanent Destruction
Backup in Windows?
o How to Restore Backed Up Data • How to Destroy Data Permanently?
Using File History?
• How to Create Mac Backup through o Data Encryption
Time Machine?
▪ Deleting Vs. Permanent Destruction o Wiping Hard Drives
• How to Destroy Data Permanently? o Destroying Hard Drives
o Data Encryption ▪ Module Summary
o Wiping Hard Drives
o Destroying Hard Drives Module 11: Securing IoT Devices and Gaming
Consoles
▪ Module Summary ▪ IoT Devices
▪ IoT Devices Risks and Countermeasures
▪ Smart Home Systems
▪ How to Secure Alexa Devices?
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

▪ IoT children's toys


▪ What are Gaming Consoles?
o Some Popular Gaming Consoles
▪ Gaming Console Security Risks
▪ Securing Gaming Console
o Secure Gaming Console using Strong
Passwords
o Secure Gaming Console using Two Factor
Authentication
o Secure Gaming Console with Phishing and
Malware Protection
▪ Module Summary

Module 12: Secure Remote Working


▪ What is Remote Working?
o Remote Working: Advantages and
Disadvantages
▪ Why Security is Important in Remote
Working
▪ Security Risks in Remote Working
▪ How to Mitigate the Security Risks in
Remote Working?
▪ Digital Security Tips in Remote Working
▪ Physical Security Tips in Remote Working
▪ Prevent Social Engineering while Remote
Working
▪ Password Protection Tips
▪ Secure Remote Working Checklist
▪ Secure Video Conferencing: Zoom Meeting
Security Best Practices
▪ Secure Video Conferencing: Microsoft
Teams Security Best Practices
▪ Do’s and Don’ts for Remote Working
▪ Module Summary
Certified Secure Computer User Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCUv3 Version Change Document

Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy