The CSCU training program aims at equipping the students with the necessary knowledge and skills to protect their information assets.
Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 225 Students Enrolled
- 04:29 Hours
Course Overview
The program is designed to interactively teach the students
about the whole gamut of information security threats they face
ranging from identity theft and credit card fraud to their physical
safety. The skills acquired during the course of this program will
not only help the students to identify these threats but also to
mitigate them effectively
Who this course is for:
- College Students
- IT admin
- Internet Users
What you'll learn
- Introduction to Security
- Securing Operating Systems
- Malware and Antivirus
- Internet Security
- Security on Social Networking Sites
- Securing Email Communications
- Securing Mobile Devices
- Securing the Cloud
- Securing Network Connections
- Data Backup and Disaster Recovery
Course Curriculum
-
Introduction to CSCU 00:01:07
-
Introduction to CSCU 00:01:07
-
Introduction to Data S... 00:04:48
-
Introduction to Data Security 00:04:48
-
What is data 00:04:31
-
What is data 00:04:31
-
Data vs information 00:01:20
-
Data vs information 00:01:20
-
Why is personal data i... 00:03:06
-
Why is personal data important 00:03:06
-
How is organizational ... 00:04:15
-
How is organizational data important 00:04:15
-
Threads of data 00:03:07
-
Threads of data 00:03:07
-
What is data security 00:03:23
-
What is data security 00:03:23
-
Element of security 00:08:21
-
Element of security 00:08:21
-
How to implement secur... 00:06:30
-
How to implement security 00:06:30
-
Securing operating sys... 00:05:32
-
Securing operating system 00:05:32
-
What does operating sy... 00:04:31
-
What does operating system do 00:04:31
-
Guidelines for window ... 00:05:01
-
Guidelines for window OS security 00:05:01
-
How to disable guest a... 00:02:23
-
How to lockout unwante... 00:04:09
-
Rename the administrat... 00:05:13
-
How to Disable Jump Li... 00:05:04
-
What are software upda... 00:05:45
-
What are software update 00:05:45
-
How to Enable Windows ... 00:03:37
-
How to Enable Windows ... 00:00:52
-
How to turn on windows... 00:07:47
-
How to turn on windows defender 00:07:47
-
How to enable bitlocke... 00:02:17
-
How to disable unneces... 00:05:41
-
Gudielines for mac OS ... 00:05:29
-
Gudielines for mac OS X security 00:05:29
-
Discussion question 00:02:44
-
Discussion question 00:02:44
-
Malware and antivirus 00:04:03
-
Malware and antivirus 00:04:03
-
What is malware 00:07:32
-
What is malware 00:07:32
-
What is antivirus 00:08:04
-
What is antivirus 00:08:04
-
What is kaspersky pure... 00:03:56
-
What is kaspersky pure 3.0 00:03:56
-
How to test if antivir... 00:04:21
-
How to test if antivirus is working 00:04:21
-
Antivirus security che... 00:00:44
-
Antivirus security checklist 00:00:44
-
Discussion question 00:02:09
-
Discussion question 00:02:09
-
Windows security 00:05:05
-
Windows security 00:05:05
-
Internet Security 00:03:42
-
Internet Security 00:03:42
-
How To Secure Web Brow... 00:01:11
-
How To Secure Web Browsers 00:01:11
-
What Are The Threats T... 00:01:11
-
What Are The Threats To Web Browsers 00:01:11
-
Instant Messaging 00:03:09
-
Instant Messaging 00:03:09
-
Child Online Security 00:04:35
-
Child Online Security 00:04:35
-
Discussion Questions 00:01:40
-
Discussion Questions 00:01:40
-
Social Networking Site... 00:02:53
-
Social Networking Sites 00:02:53
-
What Are The Risks Ass... 00:04:15
-
What Is Geotagging 00:02:32
-
What Is Geotagging 00:02:32
-
What Are The Social Ne... 00:01:55
-
Facebook 00:14:58
-
Facebook 00:14:58
-
Twitter 00:04:40
-
Twitter 00:04:40
-
Social Networking Secu... 00:01:45
-
Social Networking Security Checklist 00:01:45
-
Discussion Question 00:00:49
-
Discussion Question 00:00:49
-
Securing Email Communi... 00:01:00
-
Securing Email Communications 00:01:00
-
Email Clients 00:01:40
-
Email Clients 00:01:40
-
Email Security 00:00:49
-
Email Security 00:00:49
-
What Are Email Securit... 00:04:26
-
What Are Email Security Threats 00:04:26
-
Email Security Procedu... 00:07:23
-
Email Security Procedures 00:07:23
-
Securing Mobile Device... 00:02:11
-
Securing Mobile Devices 00:02:11
-
IMEI Number 00:02:23
-
IMEI Number 00:02:23
-
What Are Mobile Device... 00:01:22
-
Mobile Malware 00:02:41
-
Mobile Malware 00:02:41
-
Threats To Bluetooth D... 00:01:59
-
Threats To Bluetooth Devices 00:01:59
-
Various Security Proce... 00:08:20
-
Mobile Security Tools ... 00:03:43
-
Mobile Security Tools And Software 00:03:43
-
Securing Cloud 00:02:27
-
Securing Cloud 00:02:27
-
Types Of Cloud And Clo... 00:01:15
-
How Cloud Works 00:01:02
-
How Cloud Works 00:01:02
-
Threats To Cloud Secur... 00:00:51
-
Threats To Cloud Security 00:00:51
-
Precautions 00:01:49
-
Precautions 00:01:49
-
Bases For Choosing A C... 00:01:25
-
Bases For Choosing A Cloud Security 00:01:25
-
What Are Networks 00:05:59
-
What Are Networks 00:05:59
-
Home Network 00:01:30
-
Home Network 00:01:30
-
Wireless Network 00:02:32
-
Wireless Network 00:02:32
-
Threats To Wireless Ne... 00:01:38
-
Threats To Wireless Networks 00:01:38
-
Secure And Measures Fo... 00:03:01
-
Data Backup 00:02:56
-
Data Backup 00:02:56
-
Reasons For Data Loss 00:01:24
-
Reasons For Data Loss 00:01:24
-
Types Of Data Backups 00:03:39
-
Types Of Data Backups 00:03:39
-
Create Backups And Res... 00:03:23
-
Deleting Vs Permanent ... 00:04:34
-
Deleting Vs Permanent Destruction 00:04:34
Item Reviews - 0
Submit Reviews
This Course Include:
- 04:29 Hours On-Demand Videos
- 75 Lessons
- Lifetime Access
- Access on Mobile and TV