CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Similar documents
Course Outline (version 2)

ECDL / ICDL IT Security. Syllabus Version 2.0

SECURE USE OF IT Syllabus Version 2.0

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Personal Cybersecurity

CompTIA A+ Certification ( ) Study Guide Table of Contents

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Best Practices Guide to Electronic Banking

BEST PRACTICES FOR PERSONAL Security

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

PRACTICING SAFE COMPUTING AT HOME

716 West Ave Austin, TX USA

Quick Heal Total Security

How To Remove Personal Antivirus Security Pro Virus Manually

Security Awareness. Presented by OSU Institute of Technology

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

How To Remove Personal Antivirus Security Pro Virus

Free antivirus software download

Chapter 4 Network and Internet Security

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

CHAPTER 8 SECURING INFORMATION SYSTEMS

Securing the SMB Cloud Generation

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Securing Today s Mobile Workforce

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Web Cash Fraud Prevention Best Practices

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

3.5 SECURITY. How can you reduce the risk of getting a virus?

Security Policy (EN) v1.3

The best for everyday PC users

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Online Security and Safety Protect Your Computer - and Yourself!

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Ethical Hacking and Prevention

Chapter 9 Security and Privacy

Built without compromise for users who want it all

Cyber Security Basics. Presented by Darrel Karbginsky

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Copyright

Chapter 12. Information Security Management

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

CEH: CERTIFIED ETHICAL HACKER v9

Fix Three Common Accounting Firm Data Vulnerabilities

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

INTERNET SAFETY IS IMPORTANT

Safety and Security. April 2015

Get Max Internet Security where to buy software for students ]

Introduction. Assessment Test. Part I

INDEX. browser-hijacking adware programs, 29 brute-force spam, business, impact of spam, business issues, C

Introduction to Information Security Dr. Rick Jerz

Seqrite Antivirus for Server

Seqrite Endpoint Security

Securing Information Systems

Kaspersky Open Space Security

Chapter 16: Advanced Security

System requirements. Display requirements. PDF reader requirements. Fingerprint Login/Touch Authentication requirements

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Checklist: Credit Union Information Security and Privacy Policies

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Course 831 Certified Ethical Hacker v9

How To Remove Personal Antivirus Security Pro Virus Windows 8

Security+ SY0-501 Study Guide Table of Contents

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Discovering Computers Living in a Digital World

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

10 Quick Tips to Mobile Security

CompTIA A Lab. Course Outline. CompTIA A Lab. 30 Nov

Client Resources. participant guide

2017 Annual Meeting of Members and Board of Directors Meeting

Download antivirus free

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

Getting over Ransomware - Plan your Strategy for more Advanced Threats

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

How to Build a Culture of Security

Emerging Technologies

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

for businesses with more than 25 seats

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

A Review Paper on Network Security Attacks and Defences

FAQ: Privacy, Security, and Data Protection at Libraries

Transcription:

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1

TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE AND ANTIVIRUS... 8 5 MODULE-4: INTERNET SECURITY... 10 6 MODULE-5: SECURITY ON SOCIAL NETWORK SITES... 11 7 MODULE-6: SECURING EMAIL COMMUNICATIONS... 13 8 MODULE-7: SECURING MOILE DEVICES... 15 9 MODULE-8: SECURING THE CLOUD... 17 10 MODULE-9: SECURING NETWORK CONNECTIONS... 19 11 MODULE-10: DATA BACKUP AND DISASTER RECOVERY... 20 Page 2

1 COURSE DESCRIPTION The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This course will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure. Page 3

2 MODULE-1: INTRODUCTION TO DATA SECURITY Data Digital Building Blocks What is Data How Often Do We Generate Data Data Vs. Information Importance of Data in the Information Age Importance of Personal Data Importance of Organizational Data Threats to Data Natural Threats Threats to Your Data From You Threats to Your Data From Others Data Security What is Data Security Why Do We need Data Security Elements of Security Potential Losses Due to Security Attacks Financial Loss Unavailability of Resources Identity Theft Loss of Trust Data Loss/Theft Misuse of Computer Resources Page 4

Implementing Security Precaution Maintenance Reaction Page 5

3 MODULE-2: SECURING OPERATING SYSTEMS Guidelines To Secure Windows Lock the System When Not In Use Create a User Account Password Change a User Account Password Disable the Guest Account Lock Out Unwanted Guests Rename the Administrator Account Disable Jump Lists Enable Software Updates Enable Firewall Adding New Apps In Firewall Removing/Disabling App Rules From Firewall Creating a New Firewall Rule Turn on Windows Defender Enable bitlocker Windows Encrypting File System How to Decrypt a File Using EFS Disabling Unnecessary Services Killing Unwanted Processes How To Hide Files and Folder Disable Simple File Sharing Raise The UAC Slide Bar Page 6

Guidelines To Secure Mac OS X Lock the System, When Not in Use Disable Automatic Login Allow App Downloads from Mac App Store Enable Automatic Software Updates Disable Guest Account Enable FileVault Enable Firewall Regularly Change User Account Password Enable and Set Parental Controls Page 7

4 MODULE-3: MALWARE AND ANTIVIRUS What is malware? Types Of Malware Virus Trojan Worm Spyware Ransomware Rootkit Symptoms Of Malware Infection Slow System Pop Ups System Crashes Suspicious Hard Drive Activity Antivirus Disabling New Browser Home Page Peculiar Program Activity Antivirus What is Antivirus? How Does Antivirus Work How Does an Antivirus Deal With an Infected File How to Choose The Right Antivirus Software Limitations of Antivirus Software Page 8

Configuring and Using Antivirus Software Kaspersky PURE 3.0 Avast Antivirus How To Test If an Antivirus is Working EICAR Test Page 9

5 MODULE-4: INTERNET SECURITY Understanding Web Browser Concepts Internet Security Introduction to Web Browser Securing the Web Browser Browser Features and Their Risks Identify a Secure Website Understanding IM Security Instant Messaging (IMing) Instant Messaging Security Issues Understanding Child Online Safety Risks Involved Online Determining if Children are at Risk Online Protecting Children from Online Threats Encourage Children to Report How to Report a Crime Actions To Take When a Child Becomes a Victim of Online Abuse KidZui Page 10

6 MODULE-5: SECURITY ON SOCIAL NETWORK SITES Understanding Social Networking Concepts Introduction to Virtual Social Networking Top Social Networking Sites What is a Profile? Information Available on Social Networking Sites Understanding Various Social Networking Security Threats Security Risks Associated with Social Networking Sites Geotagging Social Networking Threats to Minors Understanding Facebook Security Settings Facebook Privacy and Security Settings Profile Settings Privacy Settings for Applications Settings to Block Users Recommended Actions for Facebook Search Settings Facebook: Security Tips Understanding Twitter Security Settings Account Settings Security Settings Privacy Settings Password Settings Email Notifications Page 11

App Settings Blocking User Account Page 12

7 MODULE-6: SECURING EMAIL COMMUNICATIONS Understanding Email Security Concepts Introduction to Email Email Clients Key Considerations While Choosing an Email Client Email Service Providers Email Message Email Security Understanding Various Email Security Threats Email Security Threats Malicious Email Attachments Malicious User Misdirection Email Attachments: Caution Email Security Threats: Phishing Email Security Threats: Hoax Mail Nigerian Scam Email Security Threats: Spamming Anti-Spamming Tool: SPAMfighter Understanding Various Email Security Procedures Create and Use Strong Passwords Disable Keep Me Signed In/Stay Signed In Functions Provide Recovery Email Address for Mail Recovery Use HTTPS Enabled Email Service Provider Turn Off the Preview Feature Avoid Unwanted Emails Using Filters Page 13

Scan Email Attachments for Malware Check for Last Account Activity Digitally Sign Your Emails Encrypt Your Mails Email Security Tools Page 14

8 MODULE-7: SECURING MOILE DEVICES Understanding Mobile Device Security Concepts Securing Mobile Devices Mobile Device Security Why Mobile Device Security Mobile Operating Systems IMEI Number Importance of IMEI Number Understanding Threats To a Mobile Device Mobile Device Security Risks Mobile Malware Mobile Application Vulnerabilities Threats to Bluetooth Devices Understanding Various Mobile Security Procedures Updating Mobile Operating Systems Updating Applications in Android Devices Updating Applications in ios Devices Install Mobile Phone Antivirus Securing Bluetooth Connectivity Securing Wi-Fi Connectivity Mobile Device Encryption Avoiding Mobile Device Theft Understanding How to Secure iphone and ipad devices Securing iphone and ipad: Enable SIM PIN Protection Securing iphone and ipad: Enable Passcode Protection Page 15

Securing iphone and ipad: Enable Touch Id Securing iphone and ipad Enable Auto-Lock Securing iphone and ipad: ipad Security Securing iphone and ipad: Data Backup Securing iphone and ipad: Find my iphone Understanding How to Secure Android Devices Android: Setting Screen Lock Android: Setting SIM Lock Android: Data Backup Android: Encrypting the Phone Android: Android Device Manager Android Data on Your BlackBerry Device Understanding How to Secure Windows Device Windows: Enabling Password Windows: Setting up SIM PIN Windows: Data Backup Windows: Find My Phone Mobile Security Tools Lookout Mobile Security Snap Secure Mobile Security Page 16

9 MODULE-8: SECURING THE CLOUD The Concept of Cloud Types Of Clouds Cloud Services How Cloud Works Benefits of Cloud Threats to Cloud Security Data Breach Data Loss Account Hacking Disgruntled Insider Technology Loopholes Shared Space Safeguarding Against Cloud Security Threats Back Up Data Update Backups Regularly Create Strong Passwords Choose Two Step Authentication Encrypt Have a Disciplined Online Behavior Avoid Storing Sensitive Data on Cloud Page 17

Cloud Privacy Issues Data Ownership Data Location Data Migration Data Permanency Addressing Cloud Privacy Issues Encrypt Read Terms and Conditions Carefully Avoid the Share Feature on Cloud Avoid Storing Sensitive Data on Cloud Choosing a Cloud Service Provider Questions to Ask Before Choosing a Service Provider Page 18

10 MODULE-9: SECURING NETWORK CONNECTIONS Understanding Various Networking Concepts Types of networks Recognize the options for connecting to a network like: cable, wireless. Home Network Steps for Home Networking Wireless Networks Understanding Setting Up a Wireless Network in Windows Setting Up a Wireless Network in Windows Understanding Setting Up a Wireless Network in Mac Setting Up a Wireless Network in Mac Understanding Threats to Wireless Network Security and Countermeasures Common Threats to Wireless Network Securing Wireless Network Measures to Secure Network Connections Use Firewall Use Antivirus Use Encryption Page 19

11 MODULE-10: DATA BACKUP AND DISASTER RECOVERY Data Backup Concepts Data Backup Need for a Data Backup Reasons for Data Loss What Files to Backup and How Often Types of Data Backups Full Backup Incremental Backup Differential Backup Online Data Backup Windows Backup and Restore Procedures Full Backup in Windows Incremental Backup in Windows Restoring Backed Up Data MAC OS X Backup and Restore Procedures Time Machine (Apple Software) Setting Up Time Machine Restoring Files from Time Machine Backups Understanding Secure Data Destruction Why Do We Need to Destroy Data Permanently? Page 20

Deletion Vs. Permanent Destruction Ways to Permanently Destroying Data Page 21