Вы находитесь на странице: 1из 20

Exam 112-12

CSCU V2 vs. V1
Version Change Document

What is new in version 2:


New modules covering contemporary topics like Cloud security and Malware threats.
Course optimized for Windows 8 and Windows 10 for the benefit of the students.
Email threats explained with real malicious emails used as examples.
Online social networking threats discussed in detail with more contemporary threats
posed by geotagging and augmented reality discussed.
More relevant threats to mobiles and their countermeasures discussed.
Labs replaced with discussion questions, portraying real-life situations, at the end of
each module. Students will be able to relate to these situations which will enable them
to handle these situations efficicently when faced in their daily lives.
Case studies included wherever relevant to explain the motives and impacts of online
crimes to students more efficiently.
Focus on breaking the myth of end users (employees and home users alike) that they
cannot be or would not be targeted and that they are unimportant for hackers.
Focus on enabling the students and parents in spotting online abuse of children, dealing
with it, and reporting it.
A number of demo videos with step by step instructions and security tips about the key
security features.
Entire course optimized to suit the duration of the course and yet be comprehensive in
nature.

Page. 1 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Topic Level Comparison of CSCU V1 and V2

Legend:
Purple colour: Newly added
Green: Partially added
Struck out - Not included in CSCUv2

(CSCUv1) CSCUv2 ( Windows 8 & 10)


Module 01: Foundations of Security Module 01: Introduction to Data Security
Computer Security DataDigital Building Blocks

Why Security? What is Data

How Often Do We Generate Data

Data Vs. Information


The Security, Functionality, and Ease of Use
Importance of Data in the Information Age
Triangle
Importance of Personal Data
Importance of Organizational Data
Security Risk to Home Users Threats to Data
What to Secure? Natural Threats
What Makes a Home Computer
Threats to Your Data From You
Vulnerable?
What makes a System Secure? Threats to Your Data From Others
Benefits of Computer Security Awareness Data Security
What is Data Security

Why Do We need Data Security

Elements of Security Elements of Security

Potential Losses Due to Security Attacks Potential Losses Due to Security Attacks

Financial Loss

Unavailability of Resources

Identity Theft

Loss of Trust

Page. 2 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Data Loss/Theft

Misuse of Computer Resources

Fundamental Concepts of Security Implementing Security

Precaution Precaution

Maintenance Maintenance

Reaction Reaction

Layers of Security Layers of Security

Module 02: Securing Operating Systems Module 02: Securing Operating Systems
System Security

Threats to System Security


Password Cracking

Guidelines for Windows OS Security Guidelines To Secure Windows OS


Security (8 & 10)
Lock the System When Not in Use Lock the System When Not in Use

Create a Strong User Password Create a User Account Password


Change Windows User Password:
Change a User Account Password
Windows 7
Disable the Guest Account: Windows 7 Disable the Guest Account
Lock Out Unwanted Guests in Windows
Lock Out Unwanted Guests
7
Rename the Administrator Account in
Rename The Administrator Account
Windows 7
Disable Start up Menu in Windows 7 Disable Jump Lists

Windows Updates in Windxows 7 Enable Software Updates


Two-Way Firewall Protection in
Enable Firewall
Windows
Adding New Programs in Windows
Adding New Apps In Firewall
Firewall in Windows 7
Pointers for Updates
Removing/Disabling Programs Rules
Removing/Disabling App Rules From
from the Windows Firewall in Windows
Firewall
7
Apply Software Security Patches

Page. 3 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Creating a New Windows Firewall Rule


Creating a New Firewall Rule
in Windows 7
Using Windows Defender Turn on Windows Defender

Enable BitLocker in Windows 7 Enable bitlocker

Windows Encrypting File System (EFS) Windows Encrypting File System


Configuring Windows Firewall in
Windows 7
How to Decrypt a File Using EFS in
How to Decrypt a File Using EFS
Windows?
Disabling Unnecessary Services in Windows
Disabling Unnecessary Services
7
Always Use NTFS

Killing Unwanted Processes Killing Unwanted Processes

How to Hide Files and Folders? How To Hide Files and Folder

Disable Simple File Sharing in Windows Disable Simple File Sharing

Raise the UAC Slider Bar in Windows 7 Raise The UAC Slide Bar

Launching Event Viewer in Windows 7


Event Viewer: Events and How to Read
Logs on the System
Finding Open Ports Using Netstat Tool

Configuring Audit Policy

Windows Security Tools


Windows Security Tools: Microsoft
Security Essentials
Windows Security Tools: KeePass
Password Safe Portable
Windows Security Tools: Registry
Mechanic
Guidelines for Securing Mac OS X Guidelines To Secure Mac OS X
Step 1: Enabling and Locking Down the
Lock the System, When Not in Use
Login Window
Disable Automatic Login
Allow App Downloads from Mac App
Store
Enable Automatic Software Updates

Step 4: Securing the Guest Account Disable Guest Account

Page. 4 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Step 6: Use Keychain Settings


Step 11: Set Up FileVault to Keep Home
Enable FileVault
Folder Secure
Step 12: Firewall Security Enable Firewall

Use Apple Software Update

o Step 3: Guidelines for Creating Regularly Change User Account


Accounts Password
Step 2: Configuring Accounts
Preferences
Step 8: Securing Date & Time
Preferences
Step 5: Controlling Local Accounts with
Enable and Set Parental Controls
Parental Controls
Step 9: Securing Network Preferences

Step 10: Enable Screen Saver Password

Module 03: Protecting System Using Module 03: Malware and Antivirus
Antiviruses
What is Malware

Types Of Malware

Virus

Trojan

Worm

Spyware

Ransomware

Rootkit

Symptoms Of Malware Infection

Slow System

Pop Ups

System Crashes

Suspicious Hard Drive Activity

Antivirus Disabling

Page. 5 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

New Browser Home Page

Peculiar Program Activity

Antivirus

Introduction to Antivirus Software What is Antivirus?

How Does Antivirus Software Work? How Does Antivirus Work

Antivirus Software 2011 How Does an Antivirus Deal With an


Infected File
Choosing the Best Antivirus Software How to Choose The Right Antivirus
Software
Steps to Install Antivirus on Your Computer Limitations of Antivirus Software

Need for Antivirus Program

Configuring McAfee Antivirus Configuring and Using Antivirus Software

Configuring Kaspersky PURE Kaspersky PURE 3.0

Avast Antivirus

How to Test If Antivirus Is Working How To Test If an Antivirus is Working

EICAR Test

Module 04: Data Encryption


Common Terminologies

What is Encryption?

Objectives of Encryption

Usage of Encryption
Types of Encryption (This topic is covered
in Mod 6 in V2) This Module is not included in
Symmetric vs. Asymmetric Encryption CSCUv2.
Encryption Standards

Digital Certificates

How Digital Certificates Work?

Digital Signature

Cryptography Tools

Page. 6 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Module 06: Internet Security Module 04: Internet Security


Understanding Web Browser Concepts

Internet Security Internet Security

Introduction to Web Browser

Securing the Web Browser

Internet Explorer Security Settings Internet Explorer

Google Chrome: Privacy Settings Google Chrome

Mozilla Firefox Security Settings Mozilla Firefox

Apple Safari Security Settings Safari

Microsoft Edge

Browser Features and Their Risks

Identify a Secure Website

Understanding IM Security

Instant Messaging (IMing) Instant Messaging (IMing)

Instant Messaging Security Issues Instant Messaging Security Issues

Instant Messaging Security Measures Instant Messaging Security Measures

Searching the Web

Online Gaming and MMORPG


Online Gaming Risks
Insecure or Compromised Game Servers
and Game Coding
Social Risks

Social Engineering
Protection Schemes, Cyber Prostitution,
and Virtual Mugging
How the Malicious Users Make Money?

Security Practices Specific to Gaming


Recognize Administrator Mode Risks

Recognize Risks due to ActiveX and


JavaScript
Page. 7 Certified Secure Computer User Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Play the Game, Only at the Game Site


Pay Attention to Firewall Management

Child Online Safety Understanding Child Online Safety

Risks Involved Online Risks Involved Online


Determining if Children are at Risk
Online
Protecting Children from Online
Threats
Encourage Children to Report

How to Report a Crime


Actions To Take When a Child
Becomes a Victim of Online Abuse
KidZui

Module 11: Security on Social Networking Module 05: Security on Social


Sites Networking Sites
Understanding Social Networking
Social Networking Sites
Concepts
Introduction to Virtual Social
Networking
Top Social Networking Sites Top Social Networking Sites

What Is a Profile? What is a Profile?


Information Available on Social
Networking Sites
Understanding Various Social Networking
Security Threats
Security Risks Involved in Social Networking Security Risks Associated with
Sites Social Networking Sites
Phishing Scams Phishing

Identity Theft Identity Theft

Malware Attacks Malware

Site Flaws Site Flaws

Cyberbullying URL Spoofing

Clickjacking

Social Engineering

Page. 8 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Geotagging

Social Networking Threats to Minors Social Networking Threats to


Minors
Understanding Facebook Security Settings

Facebook Privacy Settings Facebook Privacy and Security Settings

Profile Settings Profile Settings

Privacy Settings for Applications Privacy Settings for Applications

Settings to Block Users Settings to Block Users

Recommended Actions for Facebook Recommended Actions for Facebook


Search Settings Search Settings
Facebook: Security Tips Facebook: Security Tips

Understanding Twitter Security Settings

Account Settings

Security Settings

Privacy Settings

Password Settings

Email Notifications

App Settings

Blocking User Accounts

Staying Safe on MySpace

Module 09: Securing Email Module 06: Securing Email


Communications Communications
Understanding Email Security Concepts

Introduction to Email

Email Clients
Key Considerations While Choosing an
Email Client
Email Service Providers

Email Message

Email Security Email Security

Page. 9 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Understanding Various Email Security


Threats
Email Security Threats Email Security Threats

Malicious Email Attachments Malicious Email Attachments

Malicious user redirection Malicious User Misdirection

Email Attachments: Caution Email Attachments: Caution

Phishing Email Security Threats: Phishing

Hoax/Chain Emails Email Security Threats: Hoax Mail

Nigerian Scam Nigerian Scam

Spamming Email Security Threats: Spamming

Scam Emails

Anti-Spamming Tool Anti-Spamming Tool: SPAMfighter

Spamming Countermeasures
Understanding Various Email Security
Email Security Procedures
Procedures
Creating Strong Passwords Create and Use Strong Passwords
Disable/unselect the Keep Me Signed Disable Keep Me Signed In/Stay Signed
In/Remember Me functions. In Functions
Provide Recovery Email Address for
Alternate Email Address
Mail Recovery
Use HTTPS Enabled Email Service
Using HTTPS
Provider
Turn Off Preview Feature Turn Off the Preview Feature
Email Filtering: Avoiding Unwanted
Avoid Unwanted Emails Using Filters
Emails
Scanning Email Attachments Scan Email Attachments for Malware

Check for Last Account Activity Check for Last Account Activity

Digitally Sign Your Emails Digitally Sign Your Emails

Signing your Emails

How to Obtain Digital Certificates?

Installing Digital Certificate

o Microsoft Outlook Download


Settings

Page. 10 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Online Email Encryption Service Encrypt Your Mails

Email Security Tools Email Security Tools

Module 13: Securing Mobile Devices Module 07: Securing Mobile Devices
Understanding Mobile Device Security
Concepts
Mobile Phone Services Securing Mobile Devices

Mobile Device Security Mobile Device Security

Why Mobile Device Security

Mobile Operating Systems

IMEI Number IMEI Number

Importance of IMEI Number

Understanding Threats To a Mobile Device

Mobile Device Security Risks Mobile Device Security Risks

Mobile Malware Mobile Malware

Mobile Application Vulnerabilities Mobile Application Vulnerabilities

Threats to Bluetooth Devices Threats to Bluetooth Devices


Understanding Various Mobile Security
Mobile Security Procedures
Procedures
Patching Mobile Platforms and
Updating Mobile Operating Systems
Applications
Updating Applications in Android
Devices
What to DO if Your Mobile is Lost or
Updating Applications in iOS Devices
Stolen
Install Mobile Phone Anti-Virus Install Mobile Phone Antivirus

Mobile Phone Anti-Virus Tools

Use Power-On Authentication

Secure Bluetooth Connectivity Securing Bluetooth Connectivity

Securing Wi-Fi Connectivity


Use Encryption to Secure Data in Mobile
Mobile Device Encryption
Device
Avoid Mobile Device Theft Avoiding Mobile Device Theft

Page. 11 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Install Only Signed Applications

Regularly Back Up Important Data


Understanding How to Secure iPhone and
Securing iPhone and iPad
iPad Devices
Securing iPhone and iPad: Enable SIM
Enable SIM PIN Protection
PIN Protection
Enable Passcode Protection Securing iPhone and iPad: Enable
Passcode Protection
Securing iPhone and iPad: Enable
Touch Id
Securing iPhone and iPad: Enable Auto-
Enable Auto-Lock and Re-map Button
Lock
Enable the Auto-Lock Feature

iPad Security Securing iPhone and iPad: iPad Security

Securing iPhone and iPad: Data Backup


Securing iPhone and iPad: Find my
iPhone
Understanding How to Secure Android
Devices
Android: Setting Screen Lock

Android: Setting SIM Lock

Android: Data Backup

Android: Encrypting the Phone

Android: Android Device Manager


Android Data on Your BlackBerry
Device
Securing Blackberry and Windows Phone 7 Understanding How to Secure Windows
Mobiles Device
Windows Phone 7 Mobiles: Changing
Windows: Enabling Password
the Password of the Phone
BlackBerry: Setting Device Password Windows: Setting up SIM PIN
BlackBerry: Changing the Device
Windows: Data Backup
Password
BlackBerry: Lock Your Device Windows: Find My Phone

BlackBerry: Setting Device Password

BlackBerry: Device Password

Page. 12 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

BlackBerry Password Keeper


Encrypting Data on Your BlackBerry
Device
BlackBerry: Device Password
Windows Phone 7 Mobiles: Use of PIN
Windows: Setting up SIM PIN
to Lock SIM Card
Windows: Data Backup

Windows: Find My Phone

Mobile Security Tools Mobile Security Tools

Lookout Mobile Security

Snap Secure Mobile Security

Module 08: Securing the Cloud


This module is a new The Concept of Cloud
module in Version 2 Types Of Clouds

Cloud Services

How Cloud Works

Benefits of Cloud
Threats To Cloud Security
Data Breach

Data Loss

Account Hacking

Disgruntled Insider

Technology Loopholes

Shared Space
Safeguarding Against Cloud Security
Threats
Back Up Data

Update Backups Regularly

Create Strong Passwords

Choose Two Step Authentication

Page. 13 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Encrypt

Have a Disciplined Online Behavior

Avoid Storing Sensitive Data on Cloud

Cloud Privacy Issues

Data Ownership

Data Location

Data Migration

Data Permanency

Addressing Cloud Privacy Issues

Encrypt

Read Terms and Conditions Carefully

Avoid the Share Feature on Cloud

Avoid Storing Sensitive Data on Cloud

Choosing a Cloud Service Provider


Questions to Ask Before Choosing a
Service Provider

Module 07: Securing Network Connections Module 09: Securing Network Connections
Understanding Various Networking
Concepts
Types of networks
Recognize the options for connecting
to a network like: cable, wireless.
Home Network Home Network

Network Devices

Steps for Home Networking Steps for Home Networking

Wireless Networks Wireless Networks


Understanding Setting Up a Wireless
Network in Windows 8 & 10
Setting Up a Wireless Network in Setting Up a Wireless Network in
Windows 7 Windows 8 & 10
Changing Wireless Networking
Configuration in Windows 7

Page. 14 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Understanding Setting Up a Wireless


Setting Up a Wireless Network in Mac
Network in Mac
Changing Wireless Networking
Setting Up a Wireless Network in Mac
Configuration in Mac
Understanding Threats to Wireless
Network Security and Countermeasures
Common Threats to Wireless Network Common Threats to Wireless Network

Using the Network with Windows 7


Securing Wireless Network Securing Wireless Network
Setting Up the PCs Name and
Workgroup Name in Windows 7
Sharing

Transferring Files

Simple File Sharing in Windows 7

Hiding a Shared Disk or Folder

How to Share Printer in Windows 7?

Using Printers on Other PCs

Accessing Files on Other PCs

Windows Easy Transfer


How to Setup a Wireless Network in Mac
Using the Network with MAC OS X
OS X?
Setting Up the PCs Name in MAC OS X
Setting Up the Workgroup Name in
MAC OS X
Creating User Accounts and Groups in
MAC OS X
Sharing Files and Folders in Macintosh
OS X
Printer Sharing in Macintosh OS X

Accessing Other Macs on Your Network

Network Security Threats Network Security Threats

Securing Network Connections Measures to Secure Network Connections

Use Firewall Use Firewall

Use Antivirus Protection Use Antivirus

Page. 15 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Use Strong Passwords, Make Regular


Use Encryption
Backups, and Know about Encryption
Identify a Secure Website Browsing only secure websites-

General Security Practices in Home


Networking
Network Adapters
Checking Network Adapter

Network Setup Wizard


How to Isolate Networking Problems
(Windows 7): Network Adapter?
Network Adapter Status

Troubleshooting with Network Adapters


Network Adapter is Unplugged
Network Adapter Has Limited or No
Connectivity
Network Adapter is Connected, but User
Cannot Reach the Internet

Module 05: Data Backup and Disaster Module 10: Data Backup and Disaster
Recovery Recovery
Data Backup Concepts

Data Backup Data Backup

Need for Backup Need for a Data Backup

Types of Data Loss Reasons for Data Loss

What Files to Backup and How Often? What Files to Backup and How Often

Online Backup Service Providers Online Backup Service Providers

Types of Backup Types of Data Backups

Full Backup

Incremental Backup

Differential Backup

Online Data Backup Online Data Backup

Back Up the Data Using Windows Backup Windows Backup and Restore Procedures

Steps to Backup Data Full Backup in Windows


Page. 16 Certified Secure Computer User Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Incremental Backup in Windows

Restoring Data Restoring Backed Up Data

Securing Backup on Storage Devices with MAC OS X Backup and Restore Procedures
Encryption
Time Machine (Apple Software) Time Machine (Apple Software)

Setting Up Time Machine Setting Up Time Machine


Restoring Files from Time Machine Restoring Files from Time Machine
Backups Backups
Understanding Secure Data Destruction
Why Do We Need to Destroy Data
Permanently?
Deletion Vs. Permanent Destruction

Ways to Permanently Destroying Data

Data Backup Tools for Windows


Acronis True Image Home 2011

NovaBACKUP Home Protection

Data Backup Tools for Windows

Data Backup Tools for MAC OS X


MAC OS X Data Backup Tool: Data
Backup
MAC OS X Data Backup Tool:
SmartBackup
Data Backup Tools for MAC OS X

Data Recovery Tools for Windows


Windows Data Recovery Tool: Recover
My Files
Windows Data Recovery Tool: EASEUS
Data Recovery Wizard
Data Recovery Tools for Windows

MAC OS X Data Recovery Tool


Boomerang Data Recovery Software

VirtualLab

Data Recovery Tools for MAC OS X

Page. 17 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Physical Security
Physical Security Measures: Locks

Physical Security Measures: Biometrics


Physical Security Measures: Fire
Prevention
Physical Security Measures: HVAC
Considerations
Securing Laptops from Theft

Laptop Theft Countermeasures

Module 08: Securing Online Transactions


Online Shopping

o How Online Shopping Works?


This module is not included in
Online Banking CSCUv2.
Credit Cards Payments

Types of Credit Card Frauds

Guidelines for Ensuring Credit Card Safety

Securing Online Transactions

Online Payment Services

o Choosing a Secure Online Payment


Service
SSL and the Padlock Symbol

o What Does the SSL Show?

Identifying a Trustworthy Website

Identifying an Untrustworthy Website

McAfees Site Advisor

o Rating Icons

Online Transactions Security Checklist

Module 10: Social Engineering and Identity


Theft
Page. 18 Certified Secure Computer User Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

What Is Identity Theft? This module is not included in


o Personal Information that Can be CSCUv2. The main topics are
Stolen covered in detail in Module 5.
o How Do Attackers Steal Identity?

o What Do Attackers Do with Stolen


Identity?
o Identity Theft Example

Social Engineering

o Social Engineering Examples

o Human-Based Social Engineering

o Computer-Based Social Engineering

Computer-Based Social
Engineering: Phishing
Phony Security Alerts

o Computer-based Social Engineering


Through Social Networking
Websites
How to Learn if You Are a Victim of Identity
Theft
What to Do if Identity Is Stolen

Reporting Identity Theft

o Federal Trade Commission

o econsumer.gov

o Internet Crime Complaint Center

Prosecuting Identity Theft

Protecting from Identity Theft

o IP Address Hiding Tools

Identity Theft Protection Checklist

Computer Based Identity Theft Protection


Checklist

Module 12: Information Security and Legal

Page. 19 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 112-12

Compliance
This module is not included in
HIPPA CSCUv2.
o HIPPA Checklist

FERPA

o FERPA Checklist

PCI DSS

o PCI DSS Checklist

Page. 20 Certified Secure Computer User Copyright by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

Вам также может понравиться