Certified Secure Computer User (CSCU 112-12)


Duration: 2 days

About this course

The purpose of the Certified Secure Computer User (CSCU 112-12) course is to provide students with the necessary knowledge and skills to protect their information assets. This course will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

Audience Profile

This course is specifically designed for today’s computer user. As the internet is quickly moving into a necessity, so is the need to learn how to safely browse, watch videos, send an email, and even work online! This certification is an excellent complement to educational offerings in the domain of security and networking.

Learning Objectives

  • Introduction To Data Security
  • Securing Operating Systems
  • Malware and Antiviruses
  • Internet Security
  • Security On Social Networking Sites
  • Securing Email Communications
  • Securing Mobile Devices
  • Securing The Cloud
  • Securing Network Connections
  • Data Backup and Disaster Recovery

Certification Exam

This course will prepare you for the CSCU (112-12) Exam.


Any computer user with basic knowledge of information assets. Computer Users and Network Administrators can benefit greatly by taking this course.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.


  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll


Domain 1: Introduction to Data Security 

• Understanding Data – Digital Building Blocks
• Understanding and Implementing Data Security

Domain 2: Data Security Threats

• Overview of Data Security Threats
• Overview of Malware
• Understanding Internet and Social Networking Security Threats
• Understanding Email Security Threats
• Understanding Mobile Device Security Threats
• Understanding Wireless and Cloud Security Threats

Domain 3: Operating Systems Security

• Guidelines to Secure Windows Operating Systems
• Guidelines to Secure Mac OS X
• Overview of Antivirus

Domain 4: Internet and Social Networking Sites Security

• Understanding Web Browser Concepts
• Understanding IM Security
• Understanding Child Online Safety
• Understanding Social Networking Concepts
• Understanding Facebook and Twitter Security Settings

Domain 5: Email Communication and Mobile Device Security

• Understanding Email Security Concepts
• Understanding Various Email Security Procedures
• Understanding Mobile Device Security Concepts
• Understanding Various Mobile Security Procedures
• Understanding How to Secure iPhone, iPad, Android, and Windows Devices
• Overview of Mobile Security Tools

Domain 6: Cloud and Network Connection Security

• Understanding Cloud Concepts
• Safeguarding Against Cloud Security Threats
• Understanding Cloud Privacy Issues
• Understanding Various Networking Concepts
• Understanding Setting Up a Wireless Network in Windows and Mac
• Understanding Wireless Network Security Countermeasures

Domain 7: Data Backup and Disaster Recovery

• Overview of Data Backup Concepts
• Understanding Windows/MAC OS X Backup and Restore Procedures
• Understanding Secure Data Destruction