0% found this document useful (0 votes)
810 views3 pages

CSCU Exam Blueprint v3

The document is an exam blueprint for the Certified Secure Computer User exam. It outlines 12 domains that will be covered in the exam, including introduction to data security, securing operating systems, malware and antivirus, internet security, security on social networking sites, securing email communications, securing mobile devices, securing the cloud, securing network connections, data backup and disaster recovery, securing IoT devices and gaming consoles, and secure remote working. For each domain it lists the relevant sub-domains and the number of questions and weightage allocated to that domain in the exam.

Uploaded by

tanifahniati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
810 views3 pages

CSCU Exam Blueprint v3

The document is an exam blueprint for the Certified Secure Computer User exam. It outlines 12 domains that will be covered in the exam, including introduction to data security, securing operating systems, malware and antivirus, internet security, security on social networking sites, securing email communications, securing mobile devices, securing the cloud, securing network connections, data backup and disaster recovery, securing IoT devices and gaming consoles, and secure remote working. For each domain it lists the relevant sub-domains and the number of questions and weightage allocated to that domain in the exam.

Uploaded by

tanifahniati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CSCU Exam Blueprint v3

Cer�fied Secure Computer User


Exam Blueprint

S. No. Domains Sub Domains No. of Weightage


Ques�ons (%)
1 Introduc�on to • Data Security 4 8
Data Security • Elements of Security
• Poten�al Losses Due to Security A�acks

2 Securing • Guidelines for Windows OS Security 4 8


Opera�ng • Guidelines for Mac OS X Security
Systems

3 Malware and • Malware 5 10


An�virus • An�virus
• Installing An�virus So�ware

4 Internet • Internet Security 5 10


Security • Web Browser Security
• Instant Messaging Security
• Child Online Safety

5 Security on • Social Networking Sites 4 8


Social • Risks Associated with Social
Networking Networking Sites
Sites • Social Networking Security

6 Securing Email • Email Security 4 8


Communica�ons • Email Security Threats
• Email Security Procedures
• Email Filtering
• Encryp�on

7 Securing • Mobile Device Security Threats 4 8


Mobile Devices • Security Vulnerabili�es in Mobile Phones
• Threats to Bluetooth Devices
• Mobile Device Security
• Mobile Security Tools

Page | 1 Cer�fied Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduc�on is Strictly Prohibited.
Cer�fied Secure Computer User
Exam Blueprint

8 Securing Cloud • Cloud Compu�ng 4 8


• Different types of Cloud
• Different types of Cloud
Compu�ng Services
• Threats to Cloud Security
• Privacy Issues Faced on Cloud
• Precau�ons Can Be Taken For
Cloud Data Privacy

9 Securing • Networks 4 8
Network • Home Network
Connec�ons • Wireless Networks
• Threats to Wireless Networks
• Secure Wireless Networks
• Home Network Safety Checklist

10 Data Backup • Data Backup 4 8


and Disaster • Reasons for Data Loss
Recovery • Types of Data Backup
• Advantages of Online Data Backup
• System Image Backup in Windows
• Mac Backup through Time Machine
• Data Encryp�on
• Wiping Hard Drives
• Destroying Hard Drives

11 Securing IoT • IoT Devices 4 8


Devices and • IoT Devices Risks and Countermeasures
Gaming Console • Secure Alexa Devices
• Gaming Consoles
• Securing Gaming Console

12 Secure Remote • Remote Working 4 8


Working • Security Risks in Remote Working
• Digital Security Tips in Remote Working
• Physical Security Tips in Remote
Working
• Secure Remote Working Checklist
• Secure Video Conferencing

Page | 2 Cer�fied Secure Computer User Copyright © by EC-Council


All Rights Reserved. Reproduc�on is Strictly Prohibited.

You might also like