Certified Secure Computer User

by ID Cyber Solutions Claim Listing

The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ID Cyber Solutions Logo

img Duration

2 Days

Course Details

The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life. It teaches basic techniques of being secure both online and offline.

 

After successfully completing this course, students will be able to:

  • Understand the need and importance of data security.

  • Implement Operating System security measures on their computers.

  • Understand Malware and its symptoms.

  • Make an informed decision about choosing the antivirus which is most relevant to their needs.

  • Understand the risks associated with different online activities.

  • Understand why and how to secure web browsers.

  • Identify safe websites.

  • Safeguard against the threats associated with online social networking.

  • Understand how to make their social networking accounts secure.

  • Understand the threats associated with email communications and how to safeguard against them.

  • Understand the threats to mobile devices and how to safeguard against them.

  • Understand the threats associated with cloud accounts and how to safeguard against them.

  • Make an informed decision about a cloud service provider which fulfills their requirements.

  • Understand the various types of networks and the threats associated with them.

  • Configure a home network.

  • Make their networks secure.

  • Understand the threats to data and the need for data backups.

  • Back up and restore data on their computers.

  • Destroy data permanently.

 

Who is it For?

This course is specifically designed for today’s computer users who uses the internet extensively to work, study and play.

  • Glasgow Branch

    29 Eagle Street, Glasgow
  • Teacher's Name
  • Cary
  • Teacher's Experience
  • Cary Hendricks is a highly accomplished security technical investigator, advisor and trainer with over 20 years’ broad experience working with Government Agencies throughout the world. His specialties include lawful interception, security analysis and strategy, network and security architecture, intelligence management and analysis, systems administration and engineering. He is a Certified Ethical Hacker, qualified Computer Forensic Investigator and a Certified Instructor for both. Cary Hendricks has mentored and coached Law Enforcement and members of Homeland Security Agencies on classified projects and regularly trains their security personnel to ensure that they remain at the center of excellence in their tactical roles. He previously held the role of International Technology Manager for Memex Technology with a worldwide client base providing Intelligence Management solutions for law enforcement agencies. He has also worked with various South African technology companies as a specialist security contractor and served in the South African Defence Force (Air Force) from 1987 to 1997, where he worked in different units responsible for electronic warfare, radar and electronic countermeasures and computer security.
  • Gender
  • N/A
  • Teacher's Nationality
  • N/A

Check out more Network Security courses in UK

ID Cyber Solutions Logo

Certified Incident Handler

Our Certified Incident Handler certification is a course designed to teach best practise for incident response, needed to protect your organisation and clients in the event of a cyber-attack incident through planning, triage, forensic analysis and recovery.

by ID Cyber Solutions [Claim Listing ]
SecureIT Consult Logo

Cybersecurity

Get your staff better protected through KnowBe4’s Security Awareness Training, with the largest commercially available training library, and a wide array of Simulated Phishing scenarios that will engage, inform, and upskill your workers to ensure that they don’t make mistakes as your infrastruc...

by SecureIT Consult [Claim Listing ]
Pentagon Training Logo

CCSP Certified Cloud Security Professional

The growth and development of cloud technology in business requires proven security professionals who know how to ensure data, applications and infrastructure in the cloud is secure. CCSP (Certified Cloud Security Professional) holders have this knowledge.

by Pentagon Training [Claim Listing ]
Talented Training Logo

S.I.A. Security

This regulated qualification is ideal for anyone wishing to work as a door supervisor as it provides them with the necessary skills and knowledge to apply for an SIA licence in this field.

by Talented Training [Claim Listing ]
Net Security Training Logo

CCSP (Certified Cloud Security Professional)

On this accelerated Certified Cloud Security Professional (CCSP) course you’ll get the cloud security skills you need to manage cloud environments and purchased cloud services.

by Net Security Training [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy