This Course has passed

Certified Secure Computer User

Trainers
Cary Hendricks Head Trainer / CEH Trainer
Start
19/07/2018 9:00 am
End
20/07/2018 5:00 pm
Address
29 Eagle Street, Glasgow G4 9XA, United Kingdom   View map
Phone
01414110101

£350.00 ext VAT

The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life. It teaches basic techniques of being secure both online and offline.

12 in stock (can be backordered)

SKU: tr0002 Categories: ,

Sponsors

Status

This Course has passed

Details

The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life. It teaches basic techniques of being secure both online and offline.

After successfully completing this course, students will be able to:

  • Understand the need and importance of data security.
  • Implement Operating System security measures on their computers.
  • Understand Malware and its symptoms.
  • Make an informed decision about choosing the antivirus which is most relevant to their needs.
  • Understand the risks associated with different online activities.
  • Understand why and how to secure web browsers.
  • Identify safe websites.
  • Safeguard against the threats associated with online social networking.
  • Understand how to make their social networking accounts secure.
  • Understand the threats associated with email communications and how to safeguard against them.
  • Understand the threats to mobile devices and how to safeguard against them.
  • Understand the threats associated with cloud accounts and how to safeguard against them.
  • Make an informed decision about a cloud service provider which fulfills their requirements.
  • Understand the various types of networks and the threats associated with them.
  • Configure a home network.
  • Make their networks secure.
  • Understand the threats to data and the need for data backups.
  • Back up and restore data on their computers.
  • Destroy data permanently.