Certified Secure Computer User

  • About CSCU Exam
  • IS Lab Access
  • Prerequisites
  • Topics
  • FEE AND DELIVERABLES

 

 

CSCU

Google Review

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. 

Computer users need to know how to protect information assets and securely connect systems over a network. 

Certified individuals have an assured means of demonstrating formal recognition of their expertise and skills on their resume to prospective employers.

This course improves the individuals advancement in employment ,salary and job satisfactions 

"Privacy matters. Privacy is what allows us to determine who we are and who we want to be.” — Snowden

Benefits of CSCU

This course will help you to understand about the security in a personal and working environment

Understand the elements of security

You will understand about the needs of mobile security

 

Can acquire a fundamental understanding of various computer and network security such as:

  • Identity theft
  • Credit card fraud
  • Online banking Phishing Scam
  • virus and backdoor
  • email hoaxes
  • Sex Offenders lurking online
  • Cyber stalking
  • Cyber bullying
  • Loss of confidential information
  • Hacking attacks
  • Social engineering

 

 

For Query & Registration

 

For Queries, Contact - 044-39 572 572

Participant Feedback

 

Upcoming events

CISA Certification Training
24-11-2018 9:00 am
EC-Council Certified Security Analyst (ECSA)
24-11-2018 9:30 am

About Trainer

All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL.

 

 

 

 

server1
Uninterrupted Dedicated Server
work from home
Work From Home
gaming mod threats
Learn With Fun

infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.

Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.

 

Prerequisites

  • Basic skills on computer and mobile devices 

Who Should Attend

  • Any one who is above age of 13
  • who is intersted in using the devices securely
  • who is intersted in using internet for study , play and work

The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.

certificate flow

FLOW OF CSCU COURSE

CSCU Topics:

 

S.No TOPICS
1 Introduction to Security
2 Securing Operating Systems
3 Malware and Antivirus
4 Internet Security
5 Security on Social Networking Sites
6 Securing Email Communications
7 Securing Mobile Devices
8 Securing the Cloud
9 Securing Network Connections
10 Data Backup and Disaster Recovery
Domains:

 

S.No Domains
1 Personal Computer Security
2 Passwords
3 Social Engineering
4 Identity Theft
5 Email Security
6 Safe Browsing
7 Data Protection
8 Encryption
9 Physical Security
10 Online Transaction Security
11 Digital Signature & Certificates
12 Data Backup
13 Social Networking
14 Antiviruses protection
15 Disaster Recovery
16 Internet Security
17 Credit Card Frauds
18 Monitoring Kids Online
19 Wireless & Home Network Security
20 Bluetooth Security
21 Smartphone Security
22 Mobile Device Security
23 Windows OS & Mac OS X Security
24 Compilance