Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CSCU Exam Blueprint v1 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CSCU Exam Blueprint v1

Certified Secure Computer User


Exam Blueprint

S.No. Domain Sub-Domains Weightage


1 Introduction to Data • Understanding Data – Digital Building 10%
Security Blocks
• Understanding and Implementing Data
Security
2 Data Security Threats • Overview of Data Security Threats 24%
• Overview of Malware
• Understanding Internet and Social
Networking Security Threats
• Understanding Email Security Threats
• Understanding Mobile Device Security
Threats
• Understanding Wireless and Cloud
Security Threats
3 Operating Systems Security • Guidelines to Secure Windows 16%
Operating Systems
• Guidelines to Secure Mac OS X
• Overview of Antivirus
4 Internet and Social • Understanding Web Browser Concepts 8%
Networking Sites Security • Understanding IM Security
• Understanding Child Online Safety
• Understanding Social Networking
Concepts
• Understanding Facebook and Twitter
Security Settings
5 Email Communication and • Understanding Email Security 12%
Mobile Device Security Concepts
• Understanding Various Email Security
Procedures
• Understanding Mobile Device Security
Concepts
• Understanding Various Mobile
Security Procedures
• Understanding How to Secure iPhone,
iPad, Android, and Windows Devices
• Overview of Mobile Security Tools

Page | 1 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Secure Computer User
Exam Blueprint

6 Cloud and Network • Understanding Cloud Concepts 20%


Connection Security • Safeguarding Against Cloud Security
Threats
• Understanding Cloud Privacy Issues
• Understanding Various Networking
Concepts
• Understanding Setting Up a Wireless
Network in Windows and Mac
• Understanding Wireless Network
Security Countermeasures
7 Data Backup and Disaster • Overview of Data Backup Concepts 10%
Recovery • Understanding Windows/MAC OS X
Backup and Restore Procedures
• Understanding Secure Data
Destruction

Page | 2 Certified Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like