Certified User of CSCU Computers

As an accredited training partner of the International Council EC-Council, which is the leading authority in the field of information technology that certifies and certifies individuals in various areas of information security and electronic business skills, We offer the most powerful information technology courses in accordance with the official curricula of the International Council and at the hands of certified trainers to provide the trainees with the best training that is compatible with international training standards.

As an accredited training partner of the International Council EC-Council, which is the leading authority in the field of information technology that certifies and certifies individuals in various areas of information security and electronic business skills, We offer the most powerful information technology courses in accordance with the official curricula of the International Council and at the hands of certified trainers to provide the trainees with the best training that is compatible with international training standards.
The CSCU Computer Certified User course aims to provide students with the knowledge and skills necessary to protect their information, The program is designed to teach students interactively about the threats faced by computer users that affect the security of computers, networks and information such as: identity and personal information theft, fraud and credit card theft, The safety of computer hardware and parts and their safety, In addition to identifying these threats and working to mitigate them effectively.

Course outputs
• Learn the basics of various computer and network security threats.
• Learn and understand identity theft processes, deception tricks, malware, Social engineering, and financial fraud.
• Learn ways to protect your mobile device, media, and data.
• Enable participants to protect computers, accounts, and social networking profiles as a user.
• Understanding of security incidents and preparing reports.

interlocutor
MODULE 1: Introduction to security
MODULE 2: Securing Operating Systems
MODULE 3: Malware and Antivirus
MODULE 4: Internet Security
MODULE 5: Security on Social Networking Sites
MODULE 6: Securing Email Communications
MODULE 7: Securing Mobile Devices
MODULE 8: Securing the Cloud
MODULE 9: Securing Network Connections
MODULE 10: Data Backup and Disaster Recovery