Certified Secure Computer User
The purpose of the training program is to provide individuals with the necessary knowledge and skills to protect their information assets.



Ideal For
There are no prerequisites for the E|CSCU program, any individuals who uses computers and surfs the web, social media, email, chats, etc, but is not aware of computer security issues.
E|CSCU is specifically designed for today’s computer user, particularly those lacking in computer security knowledge! As the internet is quickly moving into a necessity, so is the need to learn how to safely work online, send emails, browse, and stream videos.
There are no prerequisites for the E|CSCU program, any individuals who uses computers and surfs the web, social media, email, chats, etc, but is not aware of computer security issues.
E|CSCU is specifically designed for today’s computer user, particularly those lacking in computer security knowledge! As the internet is quickly moving into a necessity, so is the need to learn how to safely work online, send emails, browse, and stream videos.
There are no prerequisites for the E|CSCU program, any individuals who uses computers and surfs the web, social media, email, chats, etc, but is not aware of computer security issues.
E|CSCU is specifically designed for today’s computer user, particularly those lacking in computer security knowledge! As the internet is quickly moving into a necessity, so is the need to learn how to safely work online, send emails, browse, and stream videos.
What to Expect
SKILL LEVEL
Intermediate
DURATION
2 training days (Live Training) + Examination
CERTIFICATION
After Completion
LANGUAGE
English
Skills You Will Learn
Introduction to Data Security
Securing Operating Systems
Malware and Antivirus
Internet Security
Security on Social Networking Sites
Securing Email Communications
Introduction to Data Security
Securing Operating Systems
Malware and Antivirus
Internet Security
Security on Social Networking Sites
Securing Email Communications
Introduction to Data Security
Securing Operating Systems
Malware and Antivirus
Internet Security
Security on Social Networking Sites
Securing Email Communications
Securing Mobile Devices
Securing the Cloud
Securing Network Connections
Data Backup and Disaster Recovery
Securing IoT Devices and Gaming Consoles
Secure Remote Work
Securing Mobile Devices
Securing the Cloud
Securing Network Connections
Data Backup and Disaster Recovery
Securing IoT Devices and Gaming Consoles
Secure Remote Work
Securing Mobile Devices
Securing the Cloud
Securing Network Connections
Data Backup and Disaster Recovery
Securing IoT Devices and Gaming Consoles
Secure Remote Work
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module Title 3
Module Title 4
Module Title 5
Module Title 6
Module Title 7
Module Title 8
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module Title 3
Module Title 4
Module Title 5
Module Title 6
Module Title 7
Module Title 8
Course Outcome
Comprehensive computer security knowledge
Anti-viruses protection
Disaster recovery
Safe browsing
Comprehensive computer security knowledge
Anti-viruses protection
Disaster recovery
Safe browsing
Comprehensive computer security knowledge
Anti-viruses protection
Disaster recovery
Safe browsing
Course Intake
1 Jan 2025 → 1 March 2025
2 days | Monday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module Title 3
Module Title 4
Module Title 5
Module Title 6
Module Title 7
Module Title 8
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module Title 3
Module Title 4
Module Title 5
Module Title 6
Module Title 7
Module Title 8