Cybersecurity Fundamentals
In today’s world, everyone is commonly using social media apps, wireless internet, home and business camera systems, cellular devices, email services and personal messaging systems.
Your personal information, computer and cell phone pictures, emails, banking and financial information, as well as unauthorized access to your home computer, cell phone camera and Security CCTV systems can be accessed remotely by hackers.
Learn the basics on how to protect yourself as well as commonly used techniques used by hackers to gain access to your personal information and network.
The program can be completed from your home computer, laptop or smart phone. This program can be completed on your own time and pace.
The GCTactical training program and certification is currently recognized and is in use by major corporations and private security agencies in Canada, USA, Europe, Asia, Australia and the Middle East.

CYBERSECURITY FUNDAMENTALS CERTIFICATION
Course Outline
-
Understanding Common Cyber Threats
-
Malware, Ransomware, and Viruses
-
Phishing and Social Engineering Attacks
-
How Social Media Accounts Get Hacked
-
Personal Information Theft
-
Remote Attacks on Personal Computers
-
Types of Remote Attacks – Remote Desktop & Trojan Horses
-
Protecting Your Personal Computer from Remote Threats
-
Securing Devices in Physical Environments
-
Hacking into CCTV Systems
-
Securing Surveillance Systems
-
Cell Phone and Camera Hacking
-
Unauthorized Access to Live Viewing Systems
-
What is Live Viewing Unauthorized Access
-
VOIP and Phone Security
-
Protecting Against VOIP Wiretaps and Phone Hacking
-
Firewalls, Antivirus Software, and Encryption
-
Best Practices for Protecting Your Devices
-
Responding to a Security Breach
Duration: 1 hour
WHY SHOULD YOU TAKE THIS COURSE ?
This 1 hour training program provides the learner with essential skills to deal with potential online attacks and the capability to detect and avoid Cybersecurity threats.
What are the benefits ?
-
Protect yourself and your Private Information
-
Protect your organization
-
Increased employment opportunities
-
Increased personal qualifications
-
Self protection and education
-
Increased specialized training
Who should take this course ?
-
Front Line Workers
-
Security Guards and Private Investigators
-
Loss Prevention Officers
- Investigators
- Fraud Detection Specilaists
- CCTV Operators
-
Tech Support and Customer Service Representatives
Do you want to register and take this course ?
If you have already paid or have been registered for this training program, you can Login to begin your online course.
If you have not paid and you would like to register for this training program, you can Register Here