
Cybersecurity Fundamentals Certification
Cybersecurity Fundamentals
The GCT Cybersecurity Fundamentals Certification Program is self paced and delivered entirely online.
The program and certification is recognized and is in use by major Corporations, Government Organizations and Private Security Agencies.
Duration: 3.5 Hours
Why you should take this course:
- Protect yourself and your Private Information
- Increased employment opportunities
- Increased personal qualifications
- Self protection and education
- Increased specialized training
Who should take this course
Anyone Using Digital Platforms: Remote Workers, CCTV Operators, General IT Users, Security Staff and Management.
Your personal information, computer and cell phone pictures, emails, banking and financial information, as well as unauthorized access to your home computer, cell phone camera and Security CCTV systems can be accessed remotely by hackers.
The main focus of this program is to provide security personnel with a basic understanding of how potential criminals may exploit weaknesses in technology.
The program will explain how individuals use these weaknesses to assist them in committing crimes such as identity theft, vehicle thefts, unauthorized access to reports, emails and reporting software, as well as CCTV monitoring and cell phone jamming techniques aimed to disable security procedures by bypassing camera monitoring software.
Certification
Upon completion of the training program, you will receive a Digital Cybersecurity Fundamentals Certification.
Over +50,000 Trained and Certified
Cybersecurity Fundamentals
This approved program and certification is recognized and is in use by major Corporations, Government Organizations and Private Security Agencies.
Upon completion of the training program, you will receive a Digital Cybersecurity Fundamentals Certification.
The program and certification is recognized and is in use by agencies in Canada, USA, UK, Europe, Asia, Australia and the Middle East.
Course Content
- Understanding Common Cyber Threats
- Malware, Ransomware, and Viruses
- Phishing and Social Engineering Attacks
- Social Media Security
- How Social Media Accounts Get Hacked
- Personal Information Theft
- Common Methods of Stealing Personal Information
- Remote Attacks on Personal Computers
- Types of Remote Attacks - Remote Desktop & Trojan Horses
- Protecting Your Personal Computer from Remote Threats
- Cybersecurity and Physical Security
- Securing Devices in Physical Environments
- Hacking into CCTV Systems
- Securing Surveillance Systems
- Cell Phone and Camera Hacking
- Unauthorized Access to Live Viewing Systems
- What is Live Viewing Unauthorized Access
- VOIP and Phone Security
- Protecting Against VOIP Wiretaps and Phone Hacking
- Firewalls, Antivirus Software, and Encryption
- Best Practices for Protecting Your Devices
- More...
Duration: 3.5 Hours
Certification: This Cybersecurity certification does not expire.