Alert:

This is the sole official MRGT platform. All information on our partners and affiliates is published here. Any individual or organization claiming association outside this site is unauthorized, and MRGT accepts no responsibility for their training programs, services, or any other engagements.
Certified Secure Computer User (C|SCU)

Course Outline

Module 1: Introduction to Data Security
Module 2: Securing Operating Systems
Module 3: Malware and Antivirus
Module 4: Internet Security
Module 5: Security on Social Networking Sites
Module 6: Securing Email Communications
Module 7: Securing Mobile Devices
Module 8: Securing the Cloud
Module 9: Securing Network Connections
Module 10: Data Backup and Disaster Recovery
Module 11: Securing IOT Devices & Gaming Console
Module 11: Securing IOT Devices & Gaming Console
Module 12: Secure Remote Work

Course Outline

Network Defense Essentials

Network Security Fundamentals
Identification, Authentication, and Authorization
Network Security Controls: Administrative Controls
Network Security Controls: Physical Controls
Network Security Controls: Technical Controls
Virtualization and Cloud Computing
Wireless Network Security
Mobile Device Security
IoT Device Security
Cryptography and the Public Key
Data Security
Network Traffic Monitoring

Ethical Hacking Essentials

Information Security Fundamentals
Ethical Hacking Fundamentals
Information Security Threats and Vulnerability
Password Cracking  and Countermeasures
Social Engineering  and Countermeasures
Network Level Attacks and Countermeasures
Web Application Attacks and Countermeasures
Wireless Attacks and Countermeasures
Mobile Attacks and Countermeasures
IOT & OT Attacks and Countermeasures
Cloud Computing Threats and Countermeasures
Penetration Testing Fundamentals

Digital Forensics Essentials

Computer Forensics Fundamentals
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Defeating Anti-forensics Techniques
Windows Forensics
Linux and Mac Forensics
Network Forensics
Investigating Web Attacks
Dark Web Forensics
Investigating Email Crimes
Malware Forensics