CSCU v2 Version Change Document

May 8, 2019 | Author: Thithe | Category: Keamanan & Privasi Online, Computer Security, Antivirus Software, Email, Backup
Share Embed Donate


Short Description

CSCU V2...

Description

Exam 112-12

CSCU V2 vs. V1 Version Change Document What is new in version 2: 

New modules covering contemporary topics like Cloud security and Malware threats.



Course optimized for Windows 8 and Windows 10 for the benefit of the students.



Email threats explained with real malicious emails used as examples.



Online social networking threats discussed in detail with more contemporary threats posed by geotagging and augmented reality discussed.



More relevant threats to mobiles and their countermeasures discussed.



Labs replaced with discussion questions, portraying portraying real-life situations, at the end of each module. Students will be able to relate to these situations which will enable them to handle these situations efficicently when faced in their daily lives.



Case studies included wherever relevant to explain the motives and impacts of online crimes to students more efficiently.



Focus on breaking the myth of end users (employees and home users alike) that they cannot be or would not be targeted and that they are unimportant for hackers.



Focus on enabling the students and parents in spotting online abuse of children, dealing with it, and reporting it.



A number of demo videos with step by step instructions and security tips about the key security features.



Entire course optimized to suit the duration of the course and yet be comprehensive in nature.

Page. 1

Certified Secure Computer User Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12

Topic Level Comparison of CSCU V1 and V2 Legend: 

Purple colour: colour: Newly added Green: Partially added Struck out - Not included in CSCUv2

 

(CSCUv1)

CSCUv2 ( Windows 8 & 10)

Module 01: Foundations of Security

Module 01: Introduction to Data Security



Computer Security





Why Security?

Data –Digital Building Blocks 

What is Data



How Often Do We Generate Data





The Security, Functionality, and Ease of Use Triangle



Importance of Data in the Information Age 

Importance of Personal Data



Importance of Organizational Data



Security Risk to Home Users



What to Secure?



Natural Threats



What Makes a Home Computer Vulnerable?



Threats to Your Data From You



What makes a System Secure?



Threats to Your Data From Others



Benefits of Computer Security Awareness



Elements of Security



Potential Losses Due to Security Attacks



Data Vs. Information





Threats to Data

Data Security 

What is Data Security



Why Do We need Data Security



Elements of Security

Potential Losses Due to Security Attacks 

Financial Loss

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12





Fundamental Concepts of Security

Data Loss/Theft



Misuse of Computer Resources

Implementing Security



Precaution



Precaution



Maintenance



Maintenance



Reaction



Reaction

Layers of Security

Module 02: Securing Operating Systems 

System Security



Threats to System Security 









Layers of Security

Module 02: Securing Operating Systems

Password Cracking

Guidelines for Windows OS Security



Guidelines To Secure Windows OS Security (8 & 10)



Lock the System When Not in Use



Lock the System When Not in Use



Create a Strong User Password



Create a User Account Password

Change Windows User Password: Windows 7



Change a User Account Password

Disable the Guest Account: Windows 7



Disable the Guest Account



Lock Out Unwanted Guests



Rename The Administrator Account









Lock Out Unwanted Guests in Windows 7 Rename the Administrator Account in Windows 7



Disable Start up Menu in Windows 7



Disable Jump Lists



Windows Updates in Windxows 7



Enable Software Updates



Enable Firewall



Adding New Apps In Firewall







Two-Way Firewall Protection in Windows Adding New Programs in Windows Firewall in Windows 7 Pointers for Updates

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12







Creating a New Firewall Rule



Turn on Windows Defender



Enable bitlocker

Windows Encrypting File System (EFS)



Windows Encrypting File System

Configuring Windows Firewall in Windows 7 How to Decrypt a File Using EFS in Windows? Disabling Unnecessary Services in Windows 7



How to Decrypt a File Using EFS



Disabling Unnecessary Services

Using Windows Defender 



Creating a New Windows Firewall Rule in Windows 7

Enable BitLocker in Windows 7









Always Use NTFS



Killing Unwanted Processes



Killing Unwanted Processes



How to Hide Files and Folders?



How To Hide Files and Folder



Disable Simple File Sharing in Windows



Disable Simple File Sharing



Raise the UAC Slider Bar in Windows 7



Raise The UAC Slide Bar



Launching Event Viewer in Windows 7 

Event Viewer: Events and How to Read Logs on the System



Finding Open Ports Using Netstat Tool



Configuring Audit Policy



Windows Security Tools 







Windows Security Tools: Microsoft Security Essentials Windows Security Tools: KeePass Password Safe Portable Windows Security Tools: Registry Mechanic

Guidelines for Securing Mac OS X 

Step 1: Enabling and Locking Down the Login Window



Guidelines To Secure Mac OS X 

Lock the System, When Not in Use



Disable Automatic Login

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12



Step 6: Use Keychain Settings Step 11: Set Up FileVault to Keep Home Folder Secure



Enable FileVault



Step 12: Firewall Security



Enable Firewall



Use Apple Software Update



Step 3: Guidelines for Creating Accounts Step 2: Configuring Accounts Preferences Step 8: Securing Date & Time Preferences Step 5: Controlling Local Accounts with Parental Controls



o









Step 9: Securing Network Preferences



Step 10: Enable Screen Saver Password



Module 03: Protecting System Using Antiviruses

Regularly Change User Account Password

Enable and Set Parental Controls

Module 03: Malware and Antivirus 

What is Malware



Types Of Malware





Virus



Trojan



Worm



Spyware



Ransomware



Rootkit

Symptoms Of Malware Infection 

Slow System



Pop Ups



System Crashes

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12





New Browser Home Page



Peculiar Program Activity

Antivirus



Introduction to Antivirus Software



What is Antivirus?



How Does Antivirus Software Work?



How Does Antivirus Work



Antivirus Software 2011



Choosing the Best Antivirus Software



Steps to Install Antivirus on Your Computer



Need for Antivirus Program



Configuring McAfee Antivirus



Configuring Kaspersky PURE



How to Test If Antivirus Is Working











How Does an Antivirus Deal With an Infected File How to Choose The Right Antivirus Software Limitations of Antivirus Software

Configuring and Using Antivirus Software 

Kaspersky PURE 3.0



Avast Antivirus

How To Test If an Antivirus is Working 

EICAR Test

Module 04: Data Encryption 

Common Terminologies



What is Encryption?



Objectives of Encryption



Usage of Encryption



Types of Encryption (This topic is covered in Mod 6 in V2) 

Symmetric vs. Asymmetric Encryption



Encryption Standards



Digital Certificates



How Digital Certificates Work?

This Module is not included in CSCUv2.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12

Module 06: Internet Security

Module 04: Internet Security 



Internet Security

Understanding Web Browser Concepts 

Internet Security



Introduction to Web Browser



Securing the Web Browser



Internet Explorer Security Settings



Internet Explorer



Google Chrome: Privacy Settings



Google Chrome



Mozilla Firefox Security Settings



Mozilla Firefox



Apple Safari Security Settings



Safari



Microsoft Edge

 

Instant Messaging (IMing)



Browser Features and Their Risks



Identify a Secure Website

Understanding IM Security 

Instant Messaging (IMing)



Instant Messaging Security Issues



Instant Messaging Security Issues



Instant Messaging Security Measures



Instant Messaging Security Measures



Searching the Web



Online Gaming and MMORPG 

Online Gaming Risks

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12





Play the Game, Only at the Game Site



Pay Attention to Firewall Management

Child Online Safety 



Risks Involved Online

Understanding Child Online Safety 





Encourage Children to Report



How to Report a Crime



Module 11: Security on Social Networking Sites Social Networking Sites

Determining if Children are at Risk Online Protecting Children from Online Threats







Risks Involved Online

Actions To Take When a Child Becomes a Victim of Online Abuse Abuse KidZui

Module 05: Security on Social Networking Sites 

Understanding Social Networking Concepts Introduction to Virtual Social Networking





Top Social Networking Sites What Is a Profile?



Top Social Networking Sites



What is a Profile?

Information Available on Social Networking Sites Understanding Various Social Networking Security Threats





Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12







Social Networking Threats to Minors 



Facebook Privacy Settings

Social Networking Threats to Minors

Understanding Facebook Security Settings 

Facebook Privacy and Security Settings



Profile Settings



Profile Settings



Privacy Settings for Applications



Privacy Settings for Applications



Settings to Block Users



Settings to Block Users





Recommended Actions for Facebook Search Settings





Facebook: Security Tips 



Geotagging

Recommended Actions for Facebook Search Settings Facebook: Security Tips

Understanding Twitter Security Settings 

Account Settings



Security Settings



Privacy Settings



Password Settings



Email Notifications



App Settings



Blocking User Accounts

Staying Safe on MySpace

Module 09: Securing Email

Module 06: Securing Email

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12  



Email Security Threats

Understanding Various Email Security Threats



Email Security Threats



Malicious Email Attachments



Malicious Email Attachments



Malicious user redirection



Malicious User Misdirection



Email Attachments: Caution



Email Attachments: Caution



Phishing



Email Security Threats: Phishing



Hoax/Chain Emails



Email Security Threats: Hoax Mail



Nigerian Scam



Nigerian Scam



Spamming



Email Security Threats: Spamming



Scam Emails



Anti-Spamming Tool



Anti-Spamming Tool: SPAMfighter



Spamming Countermeasures

Email Security Procedures 



Creating Strong Passwords Disable/unselect the Keep Me Signed In/Remember Me functions.



Alternate Email Address



Using HTTPS



Turn Off Preview Feature



Email Filtering: Avoiding Unwanted



Understanding Various Email Security Procedures 







Create and Use Strong Passwords Disable Keep Me Signed In/Stay Signed In Functions Provide Recovery Email Address for Mail Recovery Use HTTPS Enabled Email Service Provider



Turn Off the Preview Feature



Avoid Unwanted Emails Using Filters

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12



Online Email Encryption Service



Encrypt Your Mails



Email Security Tools



Email Security Tools

Module 13: Securing Mobile Devices

Module 07: Securing Mobile Devices 

Understanding Mobile Device Security Concepts



Mobile Phone Services



Securing Mobile Devices



Mobile Device Security



Mobile Device Security



Why Mobile Device Security



Mobile Operating Systems



IMEI Number



Importance of IMEI Number



IMEI Number

 

Mobile Device Security Risks 

Mobile Malware

Understanding Threats To a Mobile Device 

Mobile Device Security Risks



Mobile Malware



Mobile Application Vulnerabilities



Mobile Application Vulnerabilities



Threats to Bluetooth Devices



Threats to Bluetooth Devices



Mobile Security Procedures 

Patching Mobile Platforms and Applications



Understanding Various Mobile Security Procedures 



Updating Mobile Operating Systems Updating Applications in Android Devices

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12





Install Only Signed Applications



Regularly Back Up Important Data

Securing iPhone and iPad 

Enable SIM PIN Protection



Enable Passcode Protection



Understanding How to Secure iPhone and iPad Devices Securing iPhone and iPad: Enable SIM PIN Protection Securing iPhone and iPad: Enable Passcode Protection Securing iPhone and iPad: Enable Touch Id Securing iPhone and iPad: Enable AutoLock









Enable Auto-Lock and Re-map Button



Enable the Auto-Lock Feature



iPad Security





Securing iPhone and iPad: iPad Security



Securing iPhone and iPad: Data Backup

Securing iPhone and iPad: Find my iPhone Understanding How to Secure Android Devices







Android: Setting Screen Lock

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12











BlackBerry Password Keeper Encrypting Data on Your BlackBerry Device BlackBerry: Device Password Windows Phone 7 Mobiles: Use of PIN to Lock SIM Card

Mobile Security Tools



Windows: Setting up SIM PIN



Windows: Data Backup



Windows: Find My Phone



Mobile Security Tools 

Lookout Mobile Security



Snap Secure Mobile Security

Module 08: Securing the Cloud

This module is a new module in Version 2



The Concept of Cloud 

Types Of Clouds



Cloud Services

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12













Encrypt Have a Disciplined Online Behavior Avoid Storing Sensitive Data on Cloud

Cloud Privacy Issues 

Data Ownership



Data Location



Data Migration



Data Permanency

Addressing Cloud Privacy Issues 

Encrypt



Read Terms and Conditions Carefully



Avoid the Share Feature on Cloud



Avoid Storing Sensitive Data on Cloud

Choosing a Cloud Service Provider

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12





Setting Up a Wireless Network in Mac



Changing Wireless Networking Configuration in Mac







Common Threats to Wireless Network



Using the Network with Windows 7



Securing Wireless Network 

Setting Up the PC’s Name and Workgroup Name in Windows 7



Sharing



Transferring Files



Simple File Sharing in Windows 7



Hiding a Shared Disk or Folder



How to Share Printer in Windows 7?



Using Printers on Other PC’s

Understanding Setting Up a Wireless Network in Mac Setting Up a Wireless Network in Mac

Understanding Threats to Wireless Network Security and Countermeasures 

Common Threats to Wireless Network



Securing Wireless Network

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12





Use Strong Passwords, Make Regular Backups, and Know about Encryption



Use Encryption

Identify a Secure Website



Browsing only secure websites-



General Security Practices in Home Networking



Network Adapters 

Checking Network Adapter



Network Setup Wizard







How to Isolate Networking Problems (Windows 7): Network Adapter? Network Adapter Status

Troubleshooting with Network Adapters 





Network Adapter is Unplugged Network Adapter Has Limited or No Connectivity Network Adapter is Connected, but User Cannot Reach the Internet

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12



Restoring Data



Incremental Backup in Windows



Restoring Backed Up Data



Securing Backup on Storage Devices with Encryption



Time Machine (Apple Software)



Time Machine (Apple Software)

Setting Up Time Machine



Setting Up Time Machine







Restoring Files from Time Machine Backups

MAC OS X Backup and Restore Procedures





Restoring Files from Time Machine Backups

Understanding Secure Data Destruction 

Why Do We Need to Destroy Data

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12



Physical Security 

Physical Security Measures: Locks



Physical Security Measures: Biometrics





Physical Security Measures: Fire Prevention Physical Security Measures: HVAC Considerations



Securing Laptops from Theft



Laptop Theft Countermeasures

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12



What Is Identity Theft? o

o

o

o



Personal Information that Can be Stolen How Do Attackers Steal Identity? What Do Attackers Do with Stolen Identity? Identity Theft Example

Social Engineering o

Social Engineering Examples Human-Based Social Engineering

This module is not included in CSCUv2. The main topics are covered in detail in Module 5.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Titles you can't find anywhere else

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.

Exam 112-12 Compliance 

HIPPA o



FERPA o



HIPPA Checklist

FERPA Checklist

PCI DSS o

PCI DSS Checklist

This module is not included in CSCUv2.

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF