CSCU V2 vs. V1 Version Change Document What is new in version 2:
New modules covering contemporary topics like Cloud security and Malware threats.
Course optimized for Windows 8 and Windows 10 for the benefit of the students.
Email threats explained with real malicious emails used as examples.
Online social networking threats discussed in detail with more contemporary threats posed by geotagging and augmented reality discussed.
More relevant threats to mobiles and their countermeasures discussed.
Labs replaced with discussion questions, portraying portraying real-life situations, at the end of each module. Students will be able to relate to these situations which will enable them to handle these situations efficicently when faced in their daily lives.
Case studies included wherever relevant to explain the motives and impacts of online crimes to students more efficiently.
Focus on breaking the myth of end users (employees and home users alike) that they cannot be or would not be targeted and that they are unimportant for hackers.
Focus on enabling the students and parents in spotting online abuse of children, dealing with it, and reporting it.
A number of demo videos with step by step instructions and security tips about the key security features.
Entire course optimized to suit the duration of the course and yet be comprehensive in nature.
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Topic Level Comparison of CSCU V1 and V2 Legend:
Purple colour: colour: Newly added Green: Partially added Struck out - Not included in CSCUv2
(CSCUv1)
CSCUv2 ( Windows 8 & 10)
Module 01: Foundations of Security
Module 01: Introduction to Data Security
Computer Security
Why Security?
Data –Digital Building Blocks
What is Data
How Often Do We Generate Data
The Security, Functionality, and Ease of Use Triangle
Importance of Data in the Information Age
Importance of Personal Data
Importance of Organizational Data
Security Risk to Home Users
What to Secure?
Natural Threats
What Makes a Home Computer Vulnerable?
Threats to Your Data From You
What makes a System Secure?
Threats to Your Data From Others
Benefits of Computer Security Awareness
Elements of Security
Potential Losses Due to Security Attacks
Data Vs. Information
Threats to Data
Data Security
What is Data Security
Why Do We need Data Security
Elements of Security
Potential Losses Due to Security Attacks
Financial Loss
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Fundamental Concepts of Security
Data Loss/Theft
Misuse of Computer Resources
Implementing Security
Precaution
Precaution
Maintenance
Maintenance
Reaction
Reaction
Layers of Security
Module 02: Securing Operating Systems
System Security
Threats to System Security
Layers of Security
Module 02: Securing Operating Systems
Password Cracking
Guidelines for Windows OS Security
Guidelines To Secure Windows OS Security (8 & 10)
Lock the System When Not in Use
Lock the System When Not in Use
Create a Strong User Password
Create a User Account Password
Change Windows User Password: Windows 7
Change a User Account Password
Disable the Guest Account: Windows 7
Disable the Guest Account
Lock Out Unwanted Guests
Rename The Administrator Account
Lock Out Unwanted Guests in Windows 7 Rename the Administrator Account in Windows 7
Disable Start up Menu in Windows 7
Disable Jump Lists
Windows Updates in Windxows 7
Enable Software Updates
Enable Firewall
Adding New Apps In Firewall
Two-Way Firewall Protection in Windows Adding New Programs in Windows Firewall in Windows 7 Pointers for Updates
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Creating a New Firewall Rule
Turn on Windows Defender
Enable bitlocker
Windows Encrypting File System (EFS)
Windows Encrypting File System
Configuring Windows Firewall in Windows 7 How to Decrypt a File Using EFS in Windows? Disabling Unnecessary Services in Windows 7
How to Decrypt a File Using EFS
Disabling Unnecessary Services
Using Windows Defender
Creating a New Windows Firewall Rule in Windows 7
Enable BitLocker in Windows 7
Always Use NTFS
Killing Unwanted Processes
Killing Unwanted Processes
How to Hide Files and Folders?
How To Hide Files and Folder
Disable Simple File Sharing in Windows
Disable Simple File Sharing
Raise the UAC Slider Bar in Windows 7
Raise The UAC Slide Bar
Launching Event Viewer in Windows 7
Event Viewer: Events and How to Read Logs on the System
Finding Open Ports Using Netstat Tool
Configuring Audit Policy
Windows Security Tools
Windows Security Tools: Microsoft Security Essentials Windows Security Tools: KeePass Password Safe Portable Windows Security Tools: Registry Mechanic
Guidelines for Securing Mac OS X
Step 1: Enabling and Locking Down the Login Window
Guidelines To Secure Mac OS X
Lock the System, When Not in Use
Disable Automatic Login
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Step 6: Use Keychain Settings Step 11: Set Up FileVault to Keep Home Folder Secure
Enable FileVault
Step 12: Firewall Security
Enable Firewall
Use Apple Software Update
Step 3: Guidelines for Creating Accounts Step 2: Configuring Accounts Preferences Step 8: Securing Date & Time Preferences Step 5: Controlling Local Accounts with Parental Controls
o
Step 9: Securing Network Preferences
Step 10: Enable Screen Saver Password
Module 03: Protecting System Using Antiviruses
Regularly Change User Account Password
Enable and Set Parental Controls
Module 03: Malware and Antivirus
What is Malware
Types Of Malware
Virus
Trojan
Worm
Spyware
Ransomware
Rootkit
Symptoms Of Malware Infection
Slow System
Pop Ups
System Crashes
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
New Browser Home Page
Peculiar Program Activity
Antivirus
Introduction to Antivirus Software
What is Antivirus?
How Does Antivirus Software Work?
How Does Antivirus Work
Antivirus Software 2011
Choosing the Best Antivirus Software
Steps to Install Antivirus on Your Computer
Need for Antivirus Program
Configuring McAfee Antivirus
Configuring Kaspersky PURE
How to Test If Antivirus Is Working
How Does an Antivirus Deal With an Infected File How to Choose The Right Antivirus Software Limitations of Antivirus Software
Configuring and Using Antivirus Software
Kaspersky PURE 3.0
Avast Antivirus
How To Test If an Antivirus is Working
EICAR Test
Module 04: Data Encryption
Common Terminologies
What is Encryption?
Objectives of Encryption
Usage of Encryption
Types of Encryption (This topic is covered in Mod 6 in V2)
Symmetric vs. Asymmetric Encryption
Encryption Standards
Digital Certificates
How Digital Certificates Work?
This Module is not included in CSCUv2.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Module 06: Internet Security
Module 04: Internet Security
Internet Security
Understanding Web Browser Concepts
Internet Security
Introduction to Web Browser
Securing the Web Browser
Internet Explorer Security Settings
Internet Explorer
Google Chrome: Privacy Settings
Google Chrome
Mozilla Firefox Security Settings
Mozilla Firefox
Apple Safari Security Settings
Safari
Microsoft Edge
Instant Messaging (IMing)
Browser Features and Their Risks
Identify a Secure Website
Understanding IM Security
Instant Messaging (IMing)
Instant Messaging Security Issues
Instant Messaging Security Issues
Instant Messaging Security Measures
Instant Messaging Security Measures
Searching the Web
Online Gaming and MMORPG
Online Gaming Risks
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Play the Game, Only at the Game Site
Pay Attention to Firewall Management
Child Online Safety
Risks Involved Online
Understanding Child Online Safety
Encourage Children to Report
How to Report a Crime
Module 11: Security on Social Networking Sites Social Networking Sites
Determining if Children are at Risk Online Protecting Children from Online Threats
Risks Involved Online
Actions To Take When a Child Becomes a Victim of Online Abuse Abuse KidZui
Module 05: Security on Social Networking Sites
Understanding Social Networking Concepts Introduction to Virtual Social Networking
Top Social Networking Sites What Is a Profile?
Top Social Networking Sites
What is a Profile?
Information Available on Social Networking Sites Understanding Various Social Networking Security Threats
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Social Networking Threats to Minors
Facebook Privacy Settings
Social Networking Threats to Minors
Understanding Facebook Security Settings
Facebook Privacy and Security Settings
Profile Settings
Profile Settings
Privacy Settings for Applications
Privacy Settings for Applications
Settings to Block Users
Settings to Block Users
Recommended Actions for Facebook Search Settings
Facebook: Security Tips
Geotagging
Recommended Actions for Facebook Search Settings Facebook: Security Tips
Understanding Twitter Security Settings
Account Settings
Security Settings
Privacy Settings
Password Settings
Email Notifications
App Settings
Blocking User Accounts
Staying Safe on MySpace
Module 09: Securing Email
Module 06: Securing Email
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Email Security Threats
Understanding Various Email Security Threats
Email Security Threats
Malicious Email Attachments
Malicious Email Attachments
Malicious user redirection
Malicious User Misdirection
Email Attachments: Caution
Email Attachments: Caution
Phishing
Email Security Threats: Phishing
Hoax/Chain Emails
Email Security Threats: Hoax Mail
Nigerian Scam
Nigerian Scam
Spamming
Email Security Threats: Spamming
Scam Emails
Anti-Spamming Tool
Anti-Spamming Tool: SPAMfighter
Spamming Countermeasures
Email Security Procedures
Creating Strong Passwords Disable/unselect the Keep Me Signed In/Remember Me functions.
Alternate Email Address
Using HTTPS
Turn Off Preview Feature
Email Filtering: Avoiding Unwanted
Understanding Various Email Security Procedures
Create and Use Strong Passwords Disable Keep Me Signed In/Stay Signed In Functions Provide Recovery Email Address for Mail Recovery Use HTTPS Enabled Email Service Provider
Turn Off the Preview Feature
Avoid Unwanted Emails Using Filters
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Online Email Encryption Service
Encrypt Your Mails
Email Security Tools
Email Security Tools
Module 13: Securing Mobile Devices
Module 07: Securing Mobile Devices
Understanding Mobile Device Security Concepts
Mobile Phone Services
Securing Mobile Devices
Mobile Device Security
Mobile Device Security
Why Mobile Device Security
Mobile Operating Systems
IMEI Number
Importance of IMEI Number
IMEI Number
Mobile Device Security Risks
Mobile Malware
Understanding Threats To a Mobile Device
Mobile Device Security Risks
Mobile Malware
Mobile Application Vulnerabilities
Mobile Application Vulnerabilities
Threats to Bluetooth Devices
Threats to Bluetooth Devices
Mobile Security Procedures
Patching Mobile Platforms and Applications
Understanding Various Mobile Security Procedures
Updating Mobile Operating Systems Updating Applications in Android Devices
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Install Only Signed Applications
Regularly Back Up Important Data
Securing iPhone and iPad
Enable SIM PIN Protection
Enable Passcode Protection
Understanding How to Secure iPhone and iPad Devices Securing iPhone and iPad: Enable SIM PIN Protection Securing iPhone and iPad: Enable Passcode Protection Securing iPhone and iPad: Enable Touch Id Securing iPhone and iPad: Enable AutoLock
Enable Auto-Lock and Re-map Button
Enable the Auto-Lock Feature
iPad Security
Securing iPhone and iPad: iPad Security
Securing iPhone and iPad: Data Backup
Securing iPhone and iPad: Find my iPhone Understanding How to Secure Android Devices
Android: Setting Screen Lock
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
BlackBerry Password Keeper Encrypting Data on Your BlackBerry Device BlackBerry: Device Password Windows Phone 7 Mobiles: Use of PIN to Lock SIM Card
Mobile Security Tools
Windows: Setting up SIM PIN
Windows: Data Backup
Windows: Find My Phone
Mobile Security Tools
Lookout Mobile Security
Snap Secure Mobile Security
Module 08: Securing the Cloud
This module is a new module in Version 2
The Concept of Cloud
Types Of Clouds
Cloud Services
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Encrypt Have a Disciplined Online Behavior Avoid Storing Sensitive Data on Cloud
Cloud Privacy Issues
Data Ownership
Data Location
Data Migration
Data Permanency
Addressing Cloud Privacy Issues
Encrypt
Read Terms and Conditions Carefully
Avoid the Share Feature on Cloud
Avoid Storing Sensitive Data on Cloud
Choosing a Cloud Service Provider
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Setting Up a Wireless Network in Mac
Changing Wireless Networking Configuration in Mac
Common Threats to Wireless Network
Using the Network with Windows 7
Securing Wireless Network
Setting Up the PC’s Name and Workgroup Name in Windows 7
Sharing
Transferring Files
Simple File Sharing in Windows 7
Hiding a Shared Disk or Folder
How to Share Printer in Windows 7?
Using Printers on Other PC’s
Understanding Setting Up a Wireless Network in Mac Setting Up a Wireless Network in Mac
Understanding Threats to Wireless Network Security and Countermeasures
Common Threats to Wireless Network
Securing Wireless Network
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Use Strong Passwords, Make Regular Backups, and Know about Encryption
Use Encryption
Identify a Secure Website
Browsing only secure websites-
General Security Practices in Home Networking
Network Adapters
Checking Network Adapter
Network Setup Wizard
How to Isolate Networking Problems (Windows 7): Network Adapter? Network Adapter Status
Troubleshooting with Network Adapters
Network Adapter is Unplugged Network Adapter Has Limited or No Connectivity Network Adapter is Connected, but User Cannot Reach the Internet
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Restoring Data
Incremental Backup in Windows
Restoring Backed Up Data
Securing Backup on Storage Devices with Encryption
Time Machine (Apple Software)
Time Machine (Apple Software)
Setting Up Time Machine
Setting Up Time Machine
Restoring Files from Time Machine Backups
MAC OS X Backup and Restore Procedures
Restoring Files from Time Machine Backups
Understanding Secure Data Destruction
Why Do We Need to Destroy Data
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
Physical Security
Physical Security Measures: Locks
Physical Security Measures: Biometrics
Physical Security Measures: Fire Prevention Physical Security Measures: HVAC Considerations
Securing Laptops from Theft
Laptop Theft Countermeasures
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Exam 112-12
What Is Identity Theft? o
o
o
o
Personal Information that Can be Stolen How Do Attackers Steal Identity? What Do Attackers Do with Stolen Identity? Identity Theft Example
Social Engineering o
Social Engineering Examples Human-Based Social Engineering
This module is not included in CSCUv2. The main topics are covered in detail in Module 5.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Titles you can't find anywhere else
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website.