If you are a regular user of the computer, you need to learn to use it securely and safely. Gain the fundamental knowledge of becoming a responsible computer user with the course in Certified Secure Computer User. Learn how to protect your data and information from malicious threats and attacks. It is an extensive course that will teach you about computer and network security threats that primarily focus on identity threats, scams, viruses, credit card fraud and loss of confidential information.
It is an extensive course that covers a range of key modules such as introduction to security, securing operating systems, internet security, malware and antivirus, securing mobile devices and email communication. Each module is discussed in-depth ensuring learners gain a firm understanding of the importance of taking the necessary steps to minimise security exposure.
The Certified Secure Computer User has been designed to educate learners about the primary threats to computer and network security. Qualifying in this course will give you a firm foundation that will make you a marketable candidate to leading organisations and enterprises.
With so many commitments in our lives, we may not have the time to learn new skills. The beauty of studying online is that you get to find this balance between your education and your daily commitments
Study 365 offers hundreds of online courses to students across the world. Gaining new skills as never been this easy as many of our courses are open to students with little or no qualifications or previous experience. All the courses are up-to-date and relevant, affordable, will build on existing expertise or give you a jump-start to a new career. The courses are meticulously designed and equal what is offered in a classroom setting. With a solid reputation that has established and made us made us one of the most trusted and reliable online course providers we offer the most convenient path to gain recognised skills and training that will give you the opportunity to put into practice your knowledge and expertise in your chosen career. You can learn at your own pace at Study 365 and you will be provided with all the necessary material, tutorials, qualified course instructor, narrated e-learning modules, interactive quizzes and free resources which include Free CV writing pack, free career support and course demo to make your learning experience enriching and more rewarding.
This course is suitable for computer users of today who use it extensively for a wide range of activities and functions.
Learners should be age 19 or over, and must have a basic understanding of Maths, English, and ICT.
In order to successfully complete the Certified Secure Computer User, learners have to sit for the EC-Council exam that demonstrates academic rigour and real-world applicability. Learners are expected to maintain high integrity by achieving the relevant test score.
Successful learners will be awarded the Certified Secure Computer User by EC-Council Certified.
EC-Council is a global leader in creating information security trainings and certification programmes. EC-Council operates in 145 countries and is widely recognised for developing Certified Ethical Hacker and Certified Security Analyst amongst a range of courses and programmes. They are proud to have trained information security professionals globally and influenced the mindset of organisations around the world. Their primary goal is to certify individuals and organisations in information security skills.
This course in Certified Secure Computer User will enhance your qualification for a number of jobs in the IT industry. The qualification will demonstrate your skills and expertise in using the computer safely and effectively while mitigating threats. You can also use this certificate as an opportunity to win various job incentives put forth by your employer or to study further in the area and improve your knowledge on the subject.
|1: Introduction to Security|
|Introduction to Security|
|2: Securing Operating Systems|
|Securing Operating Systems|
|3: Malware and Antivirus|
|Malware and Antivirus|
|4: Internet Security|
|5: Security on Social Networking Sites|
|Security on Social Networking Sites|
|6: Securing Email Communications|
|Securing Email Communications|
|7: Securing Mobile Devices|
|Securing Mobile Devices|
|8: Securing the Cloud|
|Securing the Cloud|
|9: Securing Network Connections|
|Securing Network Connections|
|10: Data Backup and Disaster Recovery|
|Data Backup and Disaster Recovery|