Certified Secure Computer User
Course ID
Course Description
Prerequisites
Audience
Course Content
- Foundations of Security
- Security Incident Occurrences Over Time
- Security Incidents by Breach Type
- Essential Terminologies
- Computer Security
- Potential Losses Due to Security Attacks
- Elements of Security
- The Security, Functionality, and Ease of Use Triangle
- Fundamental Concepts of Security
- Layers of Security
- Security Risks to Home Users
- What to Secure?
- What Makes a Home Computer Vulnerable?
- What Makes a System Secure?
- Benefits of Computer Security Awareness
- Basic Computer Security Checklist
- Securing Operating Systems
- System Security
- Threats to System Security
- How Does Malware Propagate?
- Guidelines for Windows OS Security
- Windows Encrypting File System (EFS)
- Windows Security Tools
- Resources on the Internet for Computer Security
- Operating Systems Security Checklist
- Windows 7 Security Checklist
- MAC OS Security Checklist
- Protecting Systems Using Antiviruses
- Introduction to Antivirus Software
- How Does Antivirus Software Work?
- Choosing the Best Antivirus Software
- Steps to Install Antivirus
- Configuring McAfee Antivirus
- Configuring Kaspersky PURE
- Antivirus Security Checklist
- Data Encryption
- Encryption
- Types of Encryption
- Encryption Standards
- Digital Certificates
- Digital Signature
- How Digital Signature Works
- Cryptography Tools
- TrueCrypt
- Cryptography Tools
- Data Backup and Disaster Recovery
- Data Backup Introduction
- Windows 7 Backup and Restore
- Data Encryption
- MAC OS X Backup and Restore
- Data Backup Tools
- Data Recovery Tools
- Data Backup Checklist
- Physical Security Checklist
- Internet Security
- Browser Security
- Internet Explorer Security Settings
- Understanding Cookies
- Internet Explorer Privacy Settings
- Deleting Browsing History
- Do Not Allow the Browser to Remember any Password
- Securing File Downloads
- Mozilla Firefox: Privacy Settings
- Securing File Downloads
- Installing Plugins
- Google Chrome
- Search Engine and IM Security
- Online Games
- Message from a Gamer About a Password Stolen by a Malicious Program
- Protection Schemes, Cyber Prostitution, and Virtual Mugging
- Recognize Administrator Mode Risks
- Recognize Risks due to ActiveX and JavaScript
- Play the Game, Only at the Game Site
- Pay Attention to Firewall Management
- Child Online Safety
- Misdirected Searches
- Stealth Sites and Misleading URLs
- Child Pornography, Grooming, and Cyberbullying
- KidZui
- Internet Laws
- Internet Security Checklists
- Checklist for Parents to Protect Their Child from Online Threats
- Securing Network Connections
- Home and Wireless Networks
- Network Devices
- Steps for Home Networking
- Setting Up a Wireless Network
- Wireless Network Security
- Using the Network with Windows 7
- Using the Network with MAC OS X
- Securing Network Connections
- Network Adapters
- Troubleshooting with Network Adapters
- Securing Online Transactions
- Online Shopping
- Online Banking
- Credit Card Payments
- Securing Online Transactions
- SSL and the Padlock Symbol
- Identifying a Trustworthy Website
- Identifying an Untrustworthy Website
- McAfee
For More Information
For training inquiries, call 850-308-1376
or email us at eramos@gbsi.com
Course Details
Duration - 2 days
Price - $1295.00 USD
(Discounts may apply. Call for more information.)
Acceletrain Collaborative Learning Environment (formerly know as VILT) places industry certified and expert instructors, peers, learners and multi-media components into a "borderless classroom", and interactive learning environment that can span multiple physical locations. VILT combines the benefits of the traditional brick-and-mortar classroom with innovative learning techniques and the cost savings of internet-based training.