• +977-01-2299324/25
  • +977-9851165508
  • info@itsecuritynepal.com

Certified Secure Computer User (CSCU)

20 Hours 2 Hours per day 7:30 AM to 5:00 PM
Certified Secure Computer User (CSCU)

Information of every individual and an organization is their sole assets. Hence protection of the assets is the key responsibility of every individual. The grounds of CSCU training is to provide professional with the necessary knowledge and skills who are liable to protect their information assets. The motive of the Certified Secure Computer User (CSCU) is to be familiar with the competency and proficiency of an expert in security and networking skills thereby adding value to the workplace.

The course deals with the fundamental understanding of various computer and network security threats like identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks and social engineering.

Course Objectives :

  • Understand the need and importance of data security.
  • Implement Operating System security measures on their computers.
  • Understand Malware and its symptoms.
  • Make an informed decision about choosing the antivirus which is most relevant to their needs.
  • Understand the risks associated with different online activities.
  • Understand why and how to secure web browsers.
  • Identify safe websites.
  • Safeguard against the threats associated with online social networking.
  • Understand how to make their social networking accounts secure.
  • Understand the threats associated with email communications and how to safeguard against them.
  • Understand the threats to mobile devices and how to safeguard against them.
  • Understand the threats associated with cloud accounts and how to safeguard against them.
  • Make an informed decision about a cloud service provider which fulfills their requirements.
  • Understand the various types of networks and the threats associated with them.
  • Configure a home network.
  • Make their networks secure.
  • Understand the threats to data and the need for data backups.
  • Back up and restore data on their computers.
  • Destroy data permanently.
  • Foundations of Security
  • Securing Operating Systems
  • Protecting Systems Using Antiviruses
  • Data Encryption
  • Data Backup and Disaster Recovery
  • Internet Security
  • Securing Network Connections
  • Securing Online Transactions
  • Securing Email Communications
  • Social Engineering and Identity Theft
  • Security on Social Networking Sites
  • Information Security and Legal Compliance
  • Securing Mobile Devices

This course is specifically designed for todays’ computer users who use the internet extensively to work, study and play.

For any Query or Custom Plan


+977-9851165508

New Baneshwor-10 (opposite to Rastriya Banijya Bank)






info@itsecuritynepal.com

Classroom Training

Classroom Training

1 on 1 Training

1 on 1 Training

Live Virtual Training

Live Virtual Training

Flip Class

Flip Class


Related Courses


Certified Ethical Hacking

Technology that changed everyone's mind and dragged them in IT industry is Hacking. To go it legally and become certified, CEH is the course designed by EC- council.

Certified Network Defender (CND)

Despite best efforts to stop breaches, several organizations area unit still being compromised. thus organizations should have, as a part of their defense mechanisms, trained network engineers who area unit targeted on protective, detecting, and responding to the threats on their networks. You will find out how to shield, find and answer the network attacks. you may learn network defense fundamentals, the applying of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. you may then learn the intricacies of network traffic signature, analysis and vulnerability scanning which is able to assist you after you style larger network security policies and winning incident response plans. These skills can assist you foster resiliency and continuity of operations throughout attacks.