Sunteți pe pagina 1din 13

Certified Secure Computer User Exam 112-12

Course Outline

Certified Secure Computer User


Course Outline

CSCU Module 01: Foundations of Security


 Security Incident Occurrences Over Time
 Security Incidents by Breach Type - 2011
 Essential Terminologies
 Computer Security
 Why Security?
 Potential Losses Due to Security Attacks
 Elements of Security
 The Security, Functionality, and Ease of Use Triangle
 Fundamental Concepts of Security
 Layers of Security
 Security Risks to Home Users
 What to Secure?
 What Makes a Home Computer Vulnerable?
 What Makes a System Secure?
 Benefits of Computer Security Awareness
 Basic Computer Security Checklist

CSCU Module 02: Securing Operating Systems


 System Security
 Threats to System Security
o Password Cracking
 How Does Malware Propagate?
 Guidelines for Windows OS Security
o Lock the System When Not in Use
o Create a Strong User Password
o Change Windows User Password: Windows 7
o Disable the Guest Account: Windows 7
o Lock Out Unwanted Guests in Windows 7

Page 1 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Rename the Administrator Account in Windows 7


o Disable Start up Menu in Windows 7
o Windows Updates in Windows 7
o Pointers for Updates
o Apply Software Security Patches
o Configuring Windows Firewall in Windows 7
o Adding New Programs in Windows Firewall in Windows 7
o Removing/Disabling Programs Rules from the Windows Firewall in Windows 7
o Creating a New Windows Firewall Rule in Windows 7
o Two-Way Firewall Protection in Windows
o Always Use NTFS
 Windows Encrypting File System (EFS)
o How to Decrypt a File Using EFS in Windows?
o Using Windows Defender
o Enable BitLocker in Windows 7
o Launching Event Viewer in Windows 7
o Event Viewer: Events and How to Read Logs on the System
o Disabling Unnecessary Services in Windows 7
o Killing Unwanted Processes
o Finding Open Ports Using Netstat Tool
o Configuring Audit Policy
o How to Hide Files and Folders?
o Disable Simple File Sharing in Windows
o Raise the UAC Slider Bar in Windows 7
 Windows Security Tools
o Windows Security Tools: Microsoft Security Essentials
o Windows Security Tools: KeePass Password Safe Portable
o Windows Security Tools: Registry Mechanic
o Windows Security Tools: Windows Defender
 Guidelines for Securing Mac OS X
o Step 1: Enabling and Locking Down the Login Window
o Step 2: Configuring Accounts Preferences
o Step 3: Guidelines for Creating Accounts
o Step 4: Securing the Guest Account
o Step 5: Controlling Local Accounts with Parental Controls

Page 2 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Step 6: Use Keychain Settings


o Step 7: Use Apple Software Update
o Step 8: Securing Date & Time Preferences
o Step 9: Securing Network Preferences
o Step 10: Enable Screen Saver Password
o Step 11: Set Up FileVault to Keep Home Folder Secure
o Step 12: Firewall Security
 Resources on the Internet for Computer Security
 Operating Systems Security Checklist
 Windows 7 Security Checklist
 MAC OS Security Checklist

CSCU Module 03: Protecting Systems Using Antiviruses


 Introduction to Antivirus Software
o The Most Dangerous Computer Viruses of All Time
o Introduction to Antivirus Software
o Need for Antivirus Program
 How Does Antivirus Software Work?
o Antivirus Software 2011
 Choosing the Best Antivirus Software
 Steps to Install Antivirus
o Steps to Install Antivirus on Your Computer
o How to Test if Antivirus is Working?
 Configuring McAfee Antivirus
 Configuring Kaspersky PURE
o Configuring Kaspersky PURE: Backup and Restore
o Configuring Kaspersky PURE: Computer Protection
o Configuring Kaspersky PURE: Parental Control
o Kaspersky PURE: Administrative Tools
 Antivirus Security Checklist

CSCU Module 04: Data Encryption


 Encryption
o Common Terminologies
o What Is Encryption?

Page 3 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Objectives of Encryption
o Usage of Encryption
 Types of Encryption
o Symmetric vs. Asymmetric Encryption
 Encryption Standards
 Digital Certificates
o How Digital Certificates Work
 Digital Signature
 How Digital Signature Works
 Cryptography Tools
 TrueCrypt
 Cryptography Tools

CSCU Module 05: Data Backup and Disaster Recovery


 Data Backup Introduction
o Data Backup
o Types of Data Loss
o What Files to Backup and How Often?
o Online Data Backup
o Online Backup Service Providers
o Types of Backup
 Windows 7 Backup and Restore
o Back Up the Data Using Windows Backup
o Steps to Backup Data
o Restoring Data
 Data Encryption
o Securing Backup on Storage Devices with Encryption
o Data Encryption Tool: TrueCrypt
 MAC OS X Backup and Restore
o Time Machine (Apple Software)
o Setting Up Time Machine
o Restoring Files from Time Machine Backups
 Data Backup Tools
o Windows Data Backup Tool: Acronis True Image Home 2011
o Windows Data Backup Tool: NovaBACKUP Home Protection

Page 4 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Data Backup Tools for Windows


o MAC OS X Data Backup Tool: Data Backup
o MAC OS X Data Backup Tool: SmartBackup
o Data Backup Tools for MAC OS X
 Data Recovery Tools
o Windows Data Recovery Tool: Recover My Files
o Windows Data Recovery Tool: EASEUS Data Recovery Wizard
o Data Recovery Tools for Windows
o MAC OS X Data Recovery Tool: Boomerang Data Recovery Software
o MAC OS X Data Recovery Tool: VirtualLab
o Data Recovery Tools for MAC OS X
 Physical Security
o Physical Security Measures: Locks
o Physical Security Measures: Biometrics
o Physical Security Measures: Fire Prevention
o Physical Security Measures: HVAC Considerations
o Securing Laptops from Theft
o Laptop Theft Countermeasures
 Data Backup Checklist
 Physical Security Checklist

CSCU Module 06: Internet Security


 Browser Security
o Internet Security
o Internet Explorer Security Settings
Internet Explorer Security Settings: Internet Zone
Internet Explorer Security Settings: ActiveX Controls
Internet Explorer Security Settings: Local Intranet Zone
Internet Explorer Security Settings: Trusted Sites Zone
Internet Explorer Security Settings: Restricted Zone
Understanding Cookies
Internet Explorer Privacy Settings
Deleting Browsing History
Do Not Allow the Browser to Remember any Password
Securing File Downloads

Page 5 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Mozilla Firefox: Security Settings


Mozilla Firefox: Privacy Settings
Securing File Downloads
Installing Plugins
o Google Chrome Privacy and Security Settings
Google Chrome: Privacy Settings
Google Chrome: Security Settings
o Apple Safari: Security Settings
o Testing the Browser for Privacy
 Search Engine and IM Security
o Instant Messaging (IMing)
o Instant Messaging Security Issues
o Instant Messaging Security Measures
o Searching on the Web
 Online Games
o Online Gaming and MMORPG
o Online Gaming Risks
o Insecure or Compromised Game Servers and Game Coding
o Social Risks
o Social Engineering
Message from a Gamer About a Password Stolen by a Malicious Program
Protection Schemes, Cyber Prostitution, and Virtual Mugging
o How the Malicious Users Make Money
o Security Practices Specific to Gaming
Recognize Administrator Mode Risks
Recognize Risks due to ActiveX and JavaScript
Play the Game, Only at the Game Site
Pay Attention to Firewall Management
 Child Online Safety
o Risks Involved Online
Misdirected Searches
Stealth Sites and Misleading URLs
Child Pornography, Grooming, and Cyberbullying
o Role of the Internet in Child Pornography
o Effects of Pornography on Children

Page 6 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Risks Involved in Social Networking Websites


o Unsolicited Emails
o Chat Rooms
o Finding if Children are at Risk Online
o Protecting Children from Online Threats
o Encourage Children to Report
o How to Report a Crime
o Security Software for Protecting Children from Online Threats
KidZui
o Actions To Take When the Child Becomes an Online Victim
 Internet Laws
o USA PATRIOT Act
o Children’s Online Privacy Protection Act (COPPA)
o The Digital Millennium Copyright Act
o Highlights of DMCA
o CAN-SPAM Act
o Computer Misuse Act 1990
o European Union Data Protection Directive (95/46/EC)
o Data Protection Act 1998
 Internet Security Checklists
 Checklist for Parents to Protect Their Child from Online Threats

CSCU Module 07: Securing Network Connections


 Home and Wireless Networks
o Home Network
Network Devices
Steps for Home Networking
o Wireless Networks
 Setting Up a Wireless Network
o Setting Up a Wireless Network in Windows 7
o Changing Wireless Networking Configuration in Windows 7
o Setting Up a Wireless Network in Mac
o Changing Wireless Networking Configuration in Mac
 Wireless Network Security
o Common Threats to Wireless Network
o Securing Wireless Network

Page 7 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

 Using the Network with Windows 7


o Setting Up the PC’s Name and Workgroup Name in Windows 7
o Sharing
o Transferring Files
o Simple File Sharing in Windows 7
o Hiding a Shared Disk or Folder
o How to Share Printer in Windows 7?
o Using Printers on Other PC’s
o Accessing Files on Other PCs
o Windows Easy Transfer
 Using the Network with MAC OS X
o Setting Up the PC’s Name in MAC OS X
o Setting Up the Workgroup Name in MAC OS X
o Creating User Accounts and Groups in MAC OS X
o Sharing Files and Folders in Macintosh OS X
o Printer Sharing in Macintosh OS X
o Accessing Other Macs on Your Network
o Network Security Threats
 Securing Network Connections
o Use Firewall
o Use Antivirus Protection
o Use Strong Passwords, Make Regular Backups, and Know about Encryption
o Identify a Secure Website
o General Security Practices for Home Networking
 Network Adapters
o Checking Network Adapter
o Network Setup Wizard
o How to Isolate Networking Problems (Windows 7): Network Adapter?
o Network Adapter Status
 Troubleshooting with Network Adapters
o Network Adapter is Unplugged
o Network Adapter Has Limited or No Connectivity
o Network Adapter is Connected, but User Cannot Reach the Internet
 Network Security Checklist

Page 8 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

CSCU Module 08: Securing Online Transactions


 Online Shopping
o How Online Shopping Works?
 Online Banking
 Credit Card Payments
o Types of Credit Card Frauds
o Guidelines for Ensuring Credit Card Safety
 Securing Online Transactions
o Choosing a Secure Online Payment Service
o Online Payment Services
 SSL and the Padlock Symbol
o What Does the SSL Show?
 Identifying a Trustworthy Website
 Identifying an Untrustworthy Website
 McAfee’s SiteAdvisor
o Rating Icons
 Online Transactions Security Checklist

CSCU Module 09: Securing Email Communications


 Introduction to Email Security
o Email Threat Scenario 2011
o How Various Email Systems Work?
o Email Security
 Email Security Threats
o Malicious Email Attachments
Email Attachments: Caution
o Spamming
Spamming Countermeasures
o Anti-Spamming Tool: SPAMfighter
o Hoax/Chain and Scam Emails
o Nigerian Scam
 Email Security Procedures
o Email Security Control Layers
o Email Security Procedures

Page 9 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

Creating Strong Passwords


Alternate Email Address
Keep Me Signed In/Remember Me
Using HTTPS
Check for Last Account Activity
Scanning Email Attachments
Turn Off Preview Feature
Email Filtering: Avoiding Unwanted Emails
 How to Obtain Digital Certificates?
o Digitally Sign Your Emails
o How to Obtain Digital Certificates?
o Installing a Digital Certificate
o Signing Your Emails
o Microsoft Outlook Download Settings
 Email Security Tools
o Online Email Encryption Service: Lockbin
o Email Security Tools
 Email Communication Checklist
 Email Security Checklist
 Security Checklist for Checking Emails on Mobile

CSCU Module 10: Social Engineering and Identity Theft


 Identity Theft Statistics 2011
 Scenario
 Identity Theft
o What is Identity Theft?
o Personal Information that Can be Stolen
o How do Attackers Steal Identity?
o What do Attackers do with Stolen Identity?
o Identity Theft Example
 Social Engineering
o Social Engineering Example
o Criminal as Phone Banker
o Authority Support Example
o Technical Support Example

Page 10 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Human-Based Social Engineering


o Computer-Based Social Engineering
Computer-Based Social Engineering: Phishing
Phony Security Alerts
Computer-Based Social Engineering through Social Networking Websites
 How to Find if You Are a Victim of Identity Theft
 What to Do if Identity Is Stolen
 Reporting Identity Theft
o Federal Trade Commission
o econsumer.gov
o Internet Crime Complaint Center
o Prosecuting Identity Theft
 IP Hiding Tools
o Hiding IP Address Using Quick Hide IP Tool
o IP Address Hiding Tools
 Identity Theft Protection Checklist
 Computer Based Identity Theft Protection Checklist

CSCU Module 11: Security on Social Networking Sites


 Introduction to Social Networking Sites
o Social Networking Sites
o What is a Profile?
o Top Social Networking Sites
 Social Networking Security Threats
o Security Risks Involved in Social Networking Sites
Cyberbullying
Identity Theft
Phishing Scams
Malware Attacks
Site Flaws
Social Networking Threats to Minors
 Staying Safe on Facebook
o Facebook Privacy Settings
o Profile Settings
o Privacy Settings for Applications

Page 11 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Settings to Block Users


o Recommended Actions for Facebook Search Settings
o Facebook: Security Tips
 Staying Safe on MySpace
o Step 1: Go to “Account Settings”
o Step 2: Check Settings for “Comments” and “Mail”
o Step 3: Check Settings for “Friends Request” and “IM”
o Step 4: Check Settings for Stream Settings
o Step 5: Settings for Block Users By Age
 Social Networking Security Checklist
 Social Networking Security Checklist for Parents and Teachers

CSCU Module 12: Information Security and Legal Compliance


 Health Insurance Portability and Accountability Act (HIPPA)
o HIPAA Checklist
 FERPA (Family Educational Rights and Privacy Act)
o FERPA Checklist
 PCI DSS (Payment Card Industry Data Security Standard )
o PCI DSS Checklist

CSCU Module 13: Securing Mobile Devices


 Introduction to Mobile Security
o Mobile Device Security
o Worldwide Smartphone Sales to End Users by Operating System in 2011 Market Shares
o Mobile Phone Services
o IMEI Number
 Mobile Security Threats
o Mobile Device Security Risks
o Mobile Malware
o Mobile Application Vulnerabilities
o Threats to Bluetooth Devices
 Mobile Security Procedure
o Patching of Mobile Platforms and Applications
o Avoid Mobile Device Theft
o What to Do if Your Mobile is Lost or Stolen?

Page 12 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User Exam 112-12
Course Outline

o Use Power-on Authentication


o Regularly Back Up Important Data
o Use Encryption to Secure Data in Mobile Device
o Enable Auto-Lock Feature
o Install Only Signed Applications
o Install Mobile Phone AntiVirus
o Mobile Phone Anti-Virus Tools
o Secure Bluetooth Connectivity
 Securing iPhone and iPad
o Enable Passcode Protection
o Enable SIM PIN Protection
o Enable Auto-Lock and Re-map Button
o iPad Security
 Securing BlackBerry and Windows Phone 7 Mobile
o BlackBerry: Setting Device Password
o BlackBerry: Changing the Device Password
o BlackBerry: Lock Your Device
o BlackBerry: Device Password
o BlackBerry Password Keeper
o Encrypting Data on Your BlackBerry Device
o Windows Phone 7 Mobile: Use of PIN to Lock SIM Card
o Windows Phone 7 Mobile: Changing the Password of the Phone
 Mobile Security Tools
o Mobile Security Tools: PhoneBAK Anti-theft
o Mobile Security Tools
 Bluetooth Security Checklist
 Mobile Phone Security Checklist

Page 13 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

S-ar putea să vă placă și