Certified Secure Computer User

Course ID


Course Description

The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.


There are no prerequisites for this course


This course is specifically designed for todays computer users who uses the internet and the www extensively to work, study and play.

Course Content

    Foundations of Security
  • Security Incident Occurrences Over Time
  • Security Incidents by Breach Type
  • Essential Terminologies
  • Computer Security
  • Potential Losses Due to Security Attacks
  • Elements of Security
  • The Security, Functionality, and Ease of Use Triangle
  • Fundamental Concepts of Security
  • Layers of Security
  • Security Risks to Home Users
  • What to Secure?
  • What Makes a Home Computer Vulnerable?
  • What Makes a System Secure?
  • Benefits of Computer Security Awareness
  • Basic Computer Security Checklist

    Securing Operating Systems
  • System Security
  • Threats to System Security
  • How Does Malware Propagate?
  • Guidelines for Windows OS Security
  • Windows Encrypting File System (EFS)
  • Windows Security Tools
  • Resources on the Internet for Computer Security
  • Operating Systems Security Checklist
  • Windows 7 Security Checklist
  • MAC OS Security Checklist

    Protecting Systems Using Antiviruses
  • Introduction to Antivirus Software
  • How Does Antivirus Software Work?
  • Choosing the Best Antivirus Software
  • Steps to Install Antivirus
  • Configuring McAfee Antivirus
  • Configuring Kaspersky PURE
  • Antivirus Security Checklist

    Data Encryption
  • Encryption
  • Types of Encryption
  • Encryption Standards
  • Digital Certificates
  • Digital Signature
  • How Digital Signature Works
  • Cryptography Tools
  • TrueCrypt
  • Cryptography Tools

    Data Backup and Disaster Recovery
  • Data Backup Introduction
  • Windows 7 Backup and Restore
  • Data Encryption
  • MAC OS X Backup and Restore
  • Data Backup Tools
  • Data Recovery Tools
  • Data Backup Checklist
  • Physical Security Checklist

    Internet Security
  • Browser Security
  • Internet Explorer Security Settings
  • Understanding Cookies
  • Internet Explorer Privacy Settings
  • Deleting Browsing History
  • Do Not Allow the Browser to Remember any Password
  • Securing File Downloads
  • Mozilla Firefox: Privacy Settings
  • Securing File Downloads
  • Installing Plugins
  • Google Chrome
  • Search Engine and IM Security
  • Online Games
  • Message from a Gamer About a Password Stolen by a Malicious Program
  • Protection Schemes, Cyber Prostitution, and Virtual Mugging
  • Recognize Administrator Mode Risks
  • Recognize Risks due to ActiveX and JavaScript
  • Play the Game, Only at the Game Site
  • Pay Attention to Firewall Management
  • Child Online Safety
  • Misdirected Searches
  • Stealth Sites and Misleading URLs
  • Child Pornography, Grooming, and Cyberbullying
  • KidZui
  • Internet Laws
  • Internet Security Checklists
  • Checklist for Parents to Protect Their Child from Online Threats

    Securing Network Connections
  • Home and Wireless Networks
  • Network Devices
  • Steps for Home Networking
  • Setting Up a Wireless Network
  • Wireless Network Security
  • Using the Network with Windows 7
  • Using the Network with MAC OS X
  • Securing Network Connections
  • Network Adapters
  • Troubleshooting with Network Adapters

    Securing Online Transactions
  • Online Shopping
  • Online Banking
  • Credit Card Payments
  • Securing Online Transactions
  • SSL and the Padlock Symbol
  • Identifying a Trustworthy Website
  • Identifying an Untrustworthy Website
  • McAfee

For More Information

For training inquiries, call 850-308-1376

or email us at eramos@gbsi.com

Course Details

Duration - 2 days
Price - $1295.00 USD

(Discounts may apply. Call for more information.)

Course Actions

Acceletrain Collaborative Learning Environment (formerly know as VILT) places industry certified and expert instructors, peers, learners and multi-media components into a "borderless classroom", and interactive learning environment that can span multiple physical locations. VILT combines the benefits of the traditional brick-and-mortar classroom with innovative learning techniques and the cost savings of internet-based training.