Certified Secure Computer User

by ID Cyber Solutions Claim Listing

The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ID Cyber Solutions Logo

img Duration

2 Days

Course Details

The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life. It teaches basic techniques of being secure both online and offline.

 

After successfully completing this course, students will be able to:

  • Understand the need and importance of data security.

  • Implement Operating System security measures on their computers.

  • Understand Malware and its symptoms.

  • Make an informed decision about choosing the antivirus which is most relevant to their needs.

  • Understand the risks associated with different online activities.

  • Understand why and how to secure web browsers.

  • Identify safe websites.

  • Safeguard against the threats associated with online social networking.

  • Understand how to make their social networking accounts secure.

  • Understand the threats associated with email communications and how to safeguard against them.

  • Understand the threats to mobile devices and how to safeguard against them.

  • Understand the threats associated with cloud accounts and how to safeguard against them.

  • Make an informed decision about a cloud service provider which fulfills their requirements.

  • Understand the various types of networks and the threats associated with them.

  • Configure a home network.

  • Make their networks secure.

  • Understand the threats to data and the need for data backups.

  • Back up and restore data on their computers.

  • Destroy data permanently.

 

Who is it For?

This course is specifically designed for today’s computer users who uses the internet extensively to work, study and play.

  • Glasgow Branch

    29 Eagle Street, Glasgow
  • Teacher's Name
  • Cary
  • Teacher's Experience
  • Cary Hendricks is a highly accomplished security technical investigator, advisor and trainer with over 20 years’ broad experience working with Government Agencies throughout the world. His specialties include lawful interception, security analysis and strategy, network and security architecture, intelligence management and analysis, systems administration and engineering. He is a Certified Ethical Hacker, qualified Computer Forensic Investigator and a Certified Instructor for both. Cary Hendricks has mentored and coached Law Enforcement and members of Homeland Security Agencies on classified projects and regularly trains their security personnel to ensure that they remain at the center of excellence in their tactical roles. He previously held the role of International Technology Manager for Memex Technology with a worldwide client base providing Intelligence Management solutions for law enforcement agencies. He has also worked with various South African technology companies as a specialist security contractor and served in the South African Defence Force (Air Force) from 1987 to 1997, where he worked in different units responsible for electronic warfare, radar and electronic countermeasures and computer security.
  • Gender
  • N/A
  • Teacher's Nationality
  • N/A

Check out more Network Security courses in UK

Cyber Management Alliance Logo

Cybersecurity Executive Briefing and Awareness Session 

During this session, we also aim to understand the attendees, their vision and objectives, and the unique challenges the business is facing in the current environment. Where the session needs to be tailored to bespoke requirements, we will work with the client to ensure the session

by Cyber Management Alliance
European Centre of Technology Logo

Cyber Security Essentials For Businesses Course

The ECT’s course is designed to identify the main risks affecting businesses today, provide guidance on the legal requirements and offer practical solutions on how to manage and reduce these threats.

by European Centre of Technology [Claim Listing ]
Grey Wolf Cyber Security Logo

Cyber Security Essentials Course

Our Cyber Security Essentials course enables you to guard your organisation against cyberattack. We will teach you how to protect yourself against the most common cyber threats and subsequently demonstrate your commitment to cyber security.

by Grey Wolf Cyber Security [Claim Listing ]
Computer Training Wales Logo

Network Security Course

This Network Security course covers the key aspects related to the protection of the sensitive information on a computer network. It details the various mechanisms developed to provide fundamental security services for data communication.

by Computer Training Wales [Claim Listing ]
North Star Cyber Security Logo

Cybersecurity

Cyber awareness determines the level of awareness and knowledge that users have about cyber security best practises and how to protect themselves whilst in the workplace and at home

by North Star Cyber Security [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy