Computer Security User

Available Upon Request
Book Your Seat Today!

Kindly advise me your company detail and our consultant will contact you soonest!

Course Objectives

  • To prepare users from cybersecurity treats

Description

In this two days course, you will learn the fundamental of computer security consisting of system security, network, firewall, antivirus and etc. Find out what are the security tools available and how to become a smart computer user?

Target Audience

End-users of computers, mobile devices, networks, and the Internet.

Training Outline

Foundations of Security
  • Security Incidents
  • Essential Terminologies
  • Computer Security
  • Why Security?
  • Potential Losses Due to Security Attacks
  • Elements of Security
  • Fundamental Concepts of Security
  • Layers of Security
  • Security Risks to Home Users
  • What to Secure?
  • What Makes a Home Computer Vulnerable?
  • What Makes a System Secure?
  • Benefits of Computer Security Awareness
  • Basic Computer Security Mechanisms
Securing Operating Systems
  • System Security
  • Threats to System Security
  • How Does Malware Propagate?
  • Guidelines for Windows Operating System Security
  • Two-Way Firewall Protection in Windows
  • Windows Encrypting File System (EFS)
  • How to Hide Files and Folders?
  • Windows Security Tools
  • Guidelines for Securing Mac OS X
  • Resources on the Internet for Computer Security
  • Operating System Security Checklists
Protecting Systems Using Antiviruses
  • The Most Dangerous Computer Viruses of All Time
  • Introduction to Antivirus Software
  • How Does Antivirus Software Work?
  • Antivirus Software today
  • Steps to Install Antivirus on Your Computer
  • How to Test if Antivirus is working?
  • Choosing the Best Antivirus Software
  • Configuring McAfee Antivirus
  • Configuring Kaspersky PURE
  • Antivirus Security Checklist
Data Encryption
  • Common Terminologies
  • What Is Encryption?
  • Objectives of Encryption
  • Types of Encryption
  • Encryption Standards
  • Symmetric vs. Asymmetric Encryption
  • Usage of Encryption
  • Digital Certificates
  • Working of Digital Certificates
  • Digital Signature
  • How Digital Signature Works?
  • Cryptography Tools
Data Backup and Disaster Recovery
  • Data Backup
  • What Files to Backup and How Often?
  • Online Data Backup
  • Online Backup Service Providers
  • Types of Backup
  • Windows 10: Backup and Restore
  • Data Encryption
  • MAC OS X: Backup and Restore
  • Data Backup Tools
  • Data Recovery Tools
  • Physical Security
  • Physical Security Measures
  • Laptop Theft
  • Physical Security Checklist
Internet Security
  • Internet Security
  • Internet Explorer Security Settings
  • Mozilla Firefox Security Settings
  • Google Chrome Security Settings
  • Apple Safari Security Settings
  • Instant Messaging (IMing)
  • Searching on the Web
  • Online Gaming and MMORPG
  • Online Gaming Risks
  • Security Practices Specific to Gaming
  • Child Online Safety
  • Role of Internet in Child Pornography
  • Protecting Children from Online Threats
  • How to Report a Crime?
  • Internet Security Laws
  • Internet Security Checklists
Securing Network Connections
  • Home Network
  • Steps for Home Networking
  • Wireless Networks
  • Setting Up a Wireless Network
  • Common Threats to Wireless Network
  • Securing Wireless Network
  • Using the Network with Windows 10
  • Using the Network with MAC OS X
  • Network Security Threats
  • Securing Network Connections
  • General Security Practices in Home Networking
  • Network Adapters
  • Troubleshooting with Network Adapters
  • Network Security Checklist
Securing Online Transactions
  • Online Shopping
  • How Online Shopping Works?
  • Online Banking Securing
  • Online Transactions
  • Choosing a Secure Online Payment Service
  • SSL and the Padlock Symbol
  • Identifying a Trustworthy Website
  • Identifying an Untrustworthy Website
  • McAfee’s SiteAdvisor
  • Online Transactions Security Checklist
Securing Email Communications
  • Email System
  • Email Security
  • Email Security Threats
  • Spamming
  • Hoax/Chain and Scam Emails
  • Email Security Control Layers
  • Email Security Procedures
  • How to Obtain Digital Certificates?
  • Online Email Encryption Service
  • Email Security Tools
  • Email Security Checklist
  • Security Checklist for Checking Emails on Mobile
Social Engineering and Identity Theft
  • What is Identity Theft?
  • Personal Information that Can be Stolen
  • How do Attackers Steal Identity?
  • What do Attackers do with Stolen Identity?
  • Examples of Identity Theft
  • How to Find if You are a Victim of Identity Theft?
  • What to do if Identity is Stolen?
  • Reporting Identity Theft
  • Prosecuting Identity Theft
  • Guidelines for Identity Theft Protection
  • Guidelines for Protection from
  • Computer Based Identity Theft
  • IP Address Hiding Tools
Security on Social Networking Sites
  • Social Networking Sites
  • What is a Profile?
  • Top Social Networking Sites
  • Security Risks Involved in Social Networking Sites
  • Staying Safe on Facebook
  • Facebook: Security Tips
  • Security Measures
  • Social Networking Security Checklist
  • Social Networking Security Checklist for Parents and Teachers
Information Security and Legal Compliance
  • HIPPA (Health Insurance Portability and Accountability Act)
  • HIPPA Checklist
  • FERPA (Family Educational Rights and Privacy Act)
  • FERPA Checklist
  • PCI DSS (Payment Card Industry Data Security Standard)
  • PCI DSS Checklist
Securing Mobile Devices
  • Mobile Device Security
  • Mobile Phone Services
  • Mobile Device Security Risks
  • Mobile Malware
  • Threats to Bluetooth Devices
  • Mobile Security Procedures
  • Mobile Phone Anti‐Virus Tools
  • Secure Bluetooth Connectivity
  • Securing iPhone and iPad
  • Mobile Security Tools
  • Mobile Phone Security Checklists

Prerequisite

Nil.