TDI

Certified Secure Computer User CSCU V2

Duration

5 Days

Start Date

27-Jul-2026

End Date

31-Jul-2026

Venue

CAIRO – EGYPT

price

1475 KD

20% discount for group above 5 attendees

Course Overview

This EC-Council accredited course provides essential cybersecurity awareness and practical skills for end-users in the digital workplace. Covering the latest threats and defensive techniques, the program transforms everyday computer users into the first line of defense against cyber attacks through hands-on labs and real-world simulations.

Course Objectives

Upon completion, participants will be able to:
✔ Identify modern cyber threats targeting end-users
✔ Secure devices and online activities effectively
✔ Implement strong authentication and password practices
✔ Recognize and avoid social engineering attacks
✔ Safely navigate social media and cloud services
✔ Respond appropriately to security incidents

Who Should Attend

This course is designed for:
◼ All organizational staff (non-technical users)
◼ Remote workers and BYOD users
◼ Administrative and support personnel
◼ Students and home computer users
◼ Professionals needing security awareness training

Course Content Breakdown

Day 1: Cybersecurity Fundamentals

  • Understanding the cyber threat landscape
    • Device security (computers, smartphones, IoT)
    • Secure browsing and download practices
    • Workshop: Analyzing phishing attempts

Day 2: Identity & Access Protection

  • Creating and managing strong credentials
    • Multi-factor authentication methods
    • Social engineering defense techniques
    • Lab: Simulated attack scenarios

Day 3: Secure Communication

  • Email security best practices
    • Safe social media usage
    • Video conferencing and messaging security
    • Practical: Secure communication setup

Day 4: Data Protection

  • Data classification and handling
    • Secure cloud storage practices
    • Backup and recovery procedures
    • Hands-on: Encrypting sensitive files

Day 5: Incident Response

  • Recognizing security incidents
    • Reporting procedures
    • Mobile device security
    • Final assessment: Security awareness challenge