Certified Secure Computer User (CSCU)
  • What You Will Learn

    The purpose of the CSCU is to recognize the competency and expertise of a professional in security and networking skills thereby adding value to the workplace. By hiring Certified Secure Computer Users, organizations are able to decrease the learning curve of a new employee and increase productivity. Educational institutions can provide greater value to students by providing them a solid base from which to build their career in the corporate world.

    Certified individuals have an assured means of demonstrating formal recognition of their expertise and skills on their resume to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction. Established and credible proofs of technical abilities can open doors for increased responsibility and better opportunities.

    This certification is an excellent complement to educational offerings in the domain of security and networking. The CSCU certification verifies a candidate’s knowledge and skills to protect their information assets. The candidate is introduced to various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering.

    PRICE: $699
  • Course Details

    Course Duration

    12 weeks, 15 hours a week

    Credit to be Awarded

    Certified Secure Computer User (CSCU) Certification

    Learning method

    “Blended”

  • Prequisites

    General Requirement

    Students must be 18 years of age, possess a high school diploma, or General Equivalency Diploma (GED), or Home School Diploma.

  • Outline

    1. Introduction to Security
    2. Securing Operating Systems
    3. Malware and Antivirus
    4. Internet Security
    5. Security on Social Networking Sites
    6. Securing Email Communications
    7. Securing Mobile Devices
    8. Securing the Cloud
    9. Securing Network Connections
    10. Data Backup and Disaster Recovery