CSCU Instructor Guide
CSCU Instructor Guide
User
Instructor Guide
Simplifying Security.
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Content Flow
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Training Information
Title of the Course: CSCU
Version: 1
Training Duration: 2 Days (14 Hours)
Training Timing: 9.00 AM to 5.00 PM
Note: The CSCU is an entry level certification.
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Training Session: Day 1
Start End Module
9:00 9:15 Student Introduction
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Training Session: Day 2
Start End Module
9:00 10:00 Module 07: Securing Network Connections
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Instructors may Adjust Class Timings
as per Requirement
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Content Flow
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Minimum System Requirements
Pentium‐based PC with 20 GB free
disk space
1 GB RAM (4 GB preferred)
1 NIC (disable or unplug extras)
15‐inch monitor and cards to drive
at 1024 x 768 (or at monitor’s
native resolution) and configured
at 16 million colors
Compatible keyboard and mouse
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Basic Lab Setup Requirements
Windows 7 (Ultimate or Enterprise Edition) with full patches and hot
1 fixes applied
2 Microsoft .NET Framework 3.5 SP1 or higher version
3 Adobe Acrobat Reader 10 or later version
4 WinRAR 4 or later version
5 Web Browsers: Internet Explorer , Firefox, Chrome, Safari and Opera
6 Word, Excel, and PowerPoint Viewers or Microsoft office 2010
Note: all the lab pre‐requisite tools except for the Operating System and Microsoft Office, are available in CSCU Labs DVD‐ROM
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Content Flow
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Student Introduction
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Student Introduction
Welcome the students to the course and introduce yourself
Provide a brief overview of your background to establish credibility
Ask students to introduce themselves and provide their background, security
related experience, and expectations from the course
Write your name on the whiteboard corner and do not erase this for the duration
of the class so that the students will know your name
Tell students everything that they will need for the CSCU course
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Student Introduction
Describe the contents of the CSCU courseware and the contents of the CSCU Labs DVD‐ROM
Tell the students about the modules that will be covered in the class and also explain them
on the CSCU exam and the process of taking it
You can give information to the students on when the exam will be conducted, the cost of the
exam, the total number of questions, the passing score, etc.
Consult with the training center regarding the exam delivery, they might have a prepaid exam
voucher
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 01
Foundations of Security
14 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 01?
The module gives an Briefs various elements Discusses various
introduction of basic of information security essential terminologies
security concepts such and security challenges involved in computer
as what is security and security
why it is necessary
15 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Discuss various Security Incident occurred in the recent past
Explain why computer security is important
Discuss the different Elements of Security
Discuss various Security Risks to Home Users
Discuss how a home PC becomes vulnerable
Explain how a home PC can secured or safe guarded from threats?
Discuss the benefits of computer security awareness
16 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercise
1. Compile a list of major security incidents in past 2‐ 4 years
2. List the various potential losses due to security attacks
3. Discuss various ways to increase computer security awareness
4. Create an inventory of all hardware and software at your home
or organization that need to be secured
5. Read the whitepapers available in CSCU Module 01 Foundations of
Security folder in CSCU Labs DVD‐ROM
17 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 02
Securing Operating Systems
18 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 02?
Details various threats to System Provides an assessment of various
Security Windows Security Tools
Briefs Password Cracking Discusses the different guidelines
for securing Mac OSX
Provides guidelines for Windows
Operating System security Lists various Operating Systems
security checklist
Discusses the different malware
propagation techniques
19 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Explain various Discuss various
system security malware Explain password
threats and propagation cracking
issues techniques
Discuss and
Explain the
Discuss the demonstrate
Windows
Guidelines for various measures
Encrypting File
Securing Mac OS X for Windows OS
System (EFS)
Security
20 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercise
Explore the options in the Perform the steps
control panel and try to to lockout
change the Windows unwanted users
User Password and set the
invalid login
attempts to 5
Determine the steps to Perform the steps to
configure Windows control Local Accounts
Firewall and create New with Parental Controls
Windows Firewall Rule
in Windows 7
21 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 03 Protecting
Systems Using Antiviruses
22 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 03?
Lists the most dangerous computer Discusses the need of antivirus
viruses of all time software
The module provides a brief Briefs the working of antivirus
introduction of major antivirus applications
applications
Discusses the guidelines to select the
Describes how to install and configure best antivirus software
antivirus applications
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Discuss various steps to install Explain how to test whether the
antivirus on a personal computer antivirus is working or not
Assess the features to look out Explain how to install and
before choosing the an antivirus configure McAfee antivirus
Illustrate the steps required in Discuss the antivirus security
configuring Kaspersky PURE checklist
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercise
1 2
Configure McAfee antivirus and scan
Search for a malicious program and test
your PC for any virus or malware
it against the antivirus program
programs
3 4
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 04
Data Encryption
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 04?
This module gives an Discusses Digital certificates
introduction of data and its working
encryption concepts Explains Digital Signatures
Defines what is encryption Describes the working of
and its objectives Digital Signature
Lists the types of
Encryption
27 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
1 Explain the basic encryption concepts
2 Describe the usage of encryption
3 Discuss the different types of encryption
4 Differentiate between Symmetric and Asymmetric Encryption
5 Explain the concept of digital certificates and how they work
6 Discuss the use of digital signatures to secure communication
7 Explain how digital signature works
28 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercises
Compile a list of various usage of encryption
Research and compile a list of major digital certificate vendors
Run the Cryptography Tool TrueCrypt and create an encrypted partition
Run cryptography tool Folder Lock to password protecting files and folders
Visit http://www.garykessler.net/library/crypto.html and learn more about
encryption techniques
29 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 05 Data Backup
and Disaster Recovery
30 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 05?
Describes the different types of data losses and
the importance of data backup
Explains what files need to be backed up and how
often
Lists various online backup service providers
Discusses how to secure backup on storage
devices with encryption
Presents various data backup and data recovery
tools for Windows and Mac OS X
Explains physical security measures
Provides a data backup and physical security
checklist
31 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
32 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercise
Perform data backup using
Windows backup
Set Up Time Machine to backup
data in Mac OSX
Try an online backup service
Use the tool Acronis True Image
Home 2011 and perform data
backup
Use TrueCrypt tool to encrypt
backup data
Use Recover My Files tool to
recover a deleted file
33 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 06
Internet Security
34 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 06?
1 Introduces students to Internet security issues
2 Explains various security settings in Internet Explorer
3 Discusses various security settings in Mozilla Firefox
4 Discusses Google Chrome and Apple Safari privacy and security
settings
5 Discusses various online gaming risks and their countermeasures
35 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Explain how to harden Internet Explorer security settings by exploring all the
1 options
Illustrate various Mozilla Firefox security settings including privacy settings, secure
2 downloads, and how to install Plugins
3 Discuss different Google Chrome and Apple Safari privacy and security settings
Discuss various search engine and instant messaging security issues and the measures
4 to be taken to safeguard users
Describe the different threats of online games and discuss security practices to
5 stay safe while gaming
6 Discuss various child online safety issues and countermeasures
Discuss various measures to protect children from online threats and how to
7 report an online crime against a child
36 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercise
Set the security level zone to High in the Internet
1 Explorer to ensure higher security
Configure the download settings for Mozilla Firefox
2 and install the missing plugins
Visit various sites for online crime reporting and
3 explore the steps to report a cyber crime
37 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 07
Securing Network Connections
38 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 07?
Discusses the steps for setting up a home network
Explains what is a wireless network and lists the steps required
to setup wireless network in Windows 7 and Mac OSX
Describes various network security threats and the
different measures to secure network connections
Explains various techniques for securely using the network in
Windows 7 and MAC OS X environment
Provides a network security checklist
39 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Discuss home and wireless Illustrate various techniques for
networking basics securely using the network in
Describe general steps to set up a Windows 7 and MAC OS X
home network environment
Explain the process of setting up a Describe various network security
wireless network in Windows 7 threats
and Mac environment Illustrate the different measures to
Discuss various wireless network secure network connections
security threats Explain how to identify a secure
Discuss guidelines to secure website
wireless network Discuss general security practices for
home networking
Discuss basic networking problems
and how to troubleshoot these
problems
40 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercise
Setup a small home network and share files and printers
Identify a secure website
Identify the network adapter status
41 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 08
Securing Online Transactions
42 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 08?
Discusses about online shopping and Discusses how online transactions can
how it works? be secured
Explains online banking and its Assess the security measures to
advantages and disadvantages identify a secure or a vulnerable
website
Explains credit card payments and the
frauds associated with it
43 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
1 Explain the basic working of an online shopping system
2 Discuss security issues in online banking
Discuss credit card payments and describes the different types of credit card
3 frauds
4 Explain various measures for securing online transactions
Discuss the different techniques to identify secure online shopping sites such as
5 taking care of SSL and the padlock symbol
6 Describe how to identify an untrustworthy website
44 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercises
Identifying a Compile a list of Visit the websites of
trustworthy website secure online various online payment
and list its security payment service services providers and
features compare their security
features
Check the expiration Install McAfee’s
date of a SSL SiteAdvisor and
certificate perform secure
search
45 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 09
Securing Email Communications
46 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 09?
• Discusses how various email Briefs email security control layers
systems work? and security procedures
• Describes email security and the Discusses how to create strong
threats associated to it passwords
• Explains spamming and its Explains how to digitally sign your
countermeasures email and how to obtain digital
• Discusses hoax/chain and scam certificates
emails
47 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Explain the working of email systems
Discuss the various email security threats
Explain the threats of malicious email attachments
How to Discuss spamming and its countermeasures
Teach this
Module? Discuss email security procedures
Explain how to obtain digital certificates and digitally sign emails
Discuss email communication checklist
48 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercises
Create a new email id with
strong passwords that are
difficult to crack
Try to send private email Check for last account
messages using the online activity in your email
email encryption service: account
Lockbin
Obtain a digital signature from Configure MS Outlook to
http://www.comodo.com and turn off Preview Feature
digitally sign your email
49 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 10 Social
Engineering and Identity Theft
50 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 10?
Introduces identity theft This module discusses
and social engineering personal information that
can be stolen
Explains the methods This module discusses
that attackers use to various forms of social
steal identity engineering
51 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Explain social engineering and discuss its forms
Discuss the common targets of social engineering attack
Explain what attackers can do with stolen identity
How to Describe what is identity theft and how to steal identity?
Teach this
Module? Demonstrate identity theft and social engineering example
Discuss how to find if you are a victim of identity theft?
Discuss what to do if identity is stolen?
52 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercises
Evaluate the most common ways attackers
use to commit identity theft
Summarize what you will do If you become a victim
of identity theft?
List and evaluate social engineering exploit
techniques
53 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 11 Security
on Social Networking Sites
54 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 11?
This module delves on Social Networking Sites and
1 their evolution
Explains various security risks involved with social
2 networking
3 Explains how to stay safe on Facebook and MySpace
4 Provides the social networking security checklist
55 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Discuss social networking
Provide an introduction of
security checklist for parents
social networking sites
and teachers
Illustrate MySpace Explain what is a Profile?
account settings
Illustrate Facebook privacy Describe various social
settings networking threats to minors
Discuss the different social networking
security threats
56 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercises
Create a profile in Facebook or MySpace or in any of
the social networking sites
On your Facebook profile, block few friends
Try to block users by age on MySpace
57 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CSCU Module 12 Information
Security and Legal Compliance
58 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 12?
This module explains HIPAA (Health Insurance Portability and Accountability Act)
Provides a HIPAA compliance checklist
Explains about FERPA (Family Educational Rights and Privacy Act)
Provides FERPA checklist
Explains PCI DSS (Payment Card Industry Data Security Standard )
Discusses PCI DSS requirements
59 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Explain the students about HIPAA (Health Insurance Portability and Accountability Act) and
its objectives
Discuss FERPA (Family Educational Rights and Privacy Act) and the rights given to students by
FERPA
Explain the students about PCI DSS (Payment Card Industry Data Security Standard ) and its
objectives
60 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercises
Visit http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html
and read more about HIPPA
Visit http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html
and read more about HIPPA
Visit https://www.pcisecuritystandards.org/security_standards/
and read more about HIPPA
Read the whitepapers available in CSCU Module 12 Information
Security and Legal Compliance folder in CSCU Labs DVD‐ROM
61 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 13
Securing Mobile Devices
62 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What is Covered in Module 13?
Discusses mobile
Introduces various device security Discusses various
mobile device threats and mobile threats to
security issues application Bluetooth devices
vulnerabilities
Discusses the various
Lists the various Explains mobile
security issues in
mobile phone anti‐ security
iPhone, Blackberry,
virus tools available procedure
and Windows Phone 7
mobile
63 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Teach this Module?
Explain how to secure mobile devices from
various security risks? Explain the security procedure in iPhone
Give a brief introduction on Mobile
Describe how to secure BlackBerry and
Security Procedures
Windows Mobile
Explain how to install mobile phone
antivirus and scan the mobile Present various mobile security tools
7. Discuss the bluetooth and mobile phone security checklist
64 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Exercises
Enable Auto‐Lock feature in your mobile
Enable Passcode Protection in your iPhone
Set the Blackberry device password
Perform the steps to lock your Blackberry device and set the
invalid login attempts to 4.
Perform the steps to change the password of the Windows
mobile
65 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.