Beruflich Dokumente
Kultur Dokumente
Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
CSCU certification.
Exam Details
Number of Questions: 50
Skills Measured
The exam 112-12 tests CSCU candidates on the following 13 domains.
1.
Foundations of Security
2.
3.
4.
Data Encryption
5.
6.
Internet Security
7.
Page 1
8.
9.
Test Objectives
CSCU Module 01: Foundations of Security
Highlight the information system assets that need to be protected from cybercriminals and other security
incidents
Discuss various factors that make a home computer vulnerable to security breaches
Explain various threats to computer system security including malware attacks and password cracking
Illustrate different measures to secure Windows OS such as locking the system, creating strong
passwords, disabling unwanted accounts, updating and patching OS and applications, configuring
Windows firewall, etc.
Discuss the Windows Encrypting File System (EFS) and explain how to encrypt and decrypt files in Window
Explain the usage of Windows security utilities such as Windows Defender and BitLocker
Discuss the threats of open ports and explain how to detect open ports
Page 2
Explain how to hide files and folders, and disable simple file sharing in Windows
Provide security tools that can be used to enhance Windows security such as Microsoft Security
Essentials, KeePass Password Safe Portable, Registry Mechanic and Windows Defender
Illustrate the different measures to secure Mac OS X such as enabling and locking down the login window,
configuring account preferences, creating accounts, securing the guest accounts, controlling local
accounts with parental controls, using keychain settings, and using apple software update.
Illustrate how to secure date & time preferences, configure network preferences, enable screen saver
password, and set up FileVault to keep home folder secure
Discuss various factors that help in choosing the best antivirus software
Explain the steps to install and configure popular antivirus programs such as McAfee and Kaspersky PURE
antivirus programs
Discuss various factors that determine a data backup plan such as what files and how often to backup
Page 3
Describe how to use data backup tools on Windows and Mac OS X OSs
Provide a list of data recovery tools for Windows and Mac OS X OSs
Discuss various physical security measures such as locks, biometrics, and fire prevention
Explain various techniques to secure Internet Explorer such as configuring Internet, Intranet, Trusted and
Restricted zone, cookie settings, privacy settings, securing ActiveX Controls, deleting Browsing History and
securing file downloads
Illustrate various Mozilla Firefox security settings including privacy settings, secure downloads, and how to
install Plugins
Explain various search engine and Instant Messaging (IM) security issues
Discuss the different security measures for search engine and IM security
Describe the different threats of online games and Discuss security practices to stay safe while gaming
Provide a list of actions to take when the child becomes an online victim
Provide a checklist for parents to protect their child from online threats
Page 4
Explain the process of setting up a wireless network in Windows 7 and Mac environment
Explain various techniques for securely using the network in Windows 7 environment including setting up
a PCs name and workgroup name in Windows 7, sharing, transferring files, simple file sharing , hiding a
shared disk or folder, sharing printers, accessing files on other PCs and Windows Easy Transfer
Discuss various measures for securely using the network in MAC OS X environment including setting up
the PCs name, setting up the workgroup name, creating user accounts and groups, sharing files and
folders, sharing printers, and accessing other Macs on the network
Illustrate the different measures to secure network connections such as use of firewall, antivirus
programs, strong passwords, making regular backups, and encryption
Discuss credit card payments and describes the different types of credit card frauds
Discuss the different techniques to identify secure online shopping sites such as taking care of SSL and the
padlock symbol
Discuss various email security threats such as malicious email attachments, spamming, hoax/chain and
scam emails, and Nigerian scam
Page 5
Explain various email security procedures such as creating strong passwords, providing alternate email
address, unchecking Keep Me Signed In/Remember Me, using https, checking for last account activity,
scanning email attachments, turning off preview feature, and email filtering
Explain how to obtain digital certificates and digitally sign your emails
Discuss the different social networking security threats such as cyber bullying, identity theft, phishing
scams, malware attacks, site flaws
Explain how to stay safe on Facebook by configuring privacy settings, profile settings, privacy settings for
applications, settings to block users and search settings
Discuss the different measures to stay safe on MySpace by changing settings for account, comments and
mail, friends request, IM and streaming
Page 6
Provide a social networking security checklist for parents and teachers to protect their child from social
networking threats
Discuss different provisions of FERPA (Family Educational Rights and Privacy Act)
Explain the different mobile security threats such as device loss, malware infection, application
vulnerabilities
Explain general mobile security procedure such as patching of mobile platforms and applications, avoiding
mobile device theft, using power-on authentication, regularly backing up important data, using encryption
to secure data in mobile device, enabling auto-lock feature, installing only signed applications and
installing mobile phone antivirus
Provide guidelines to Secure Bluetooth Connectivity
Explain various security measures for iPhone and iPad such as enabling passcode protection, enabling SIM
PIN Protection, enabling auto-lock and re-mapping buttons
Explain basic security procedures for BlackBerry and Windows Phone 7 mobile devices such as setting
device password, changing the device password, locking device, encrypting data , using PIN and SIM lock
Page 7