Use of Force
Use of Force
  • Home
  • Training
    • Use of Force Training
    • Crisis Intervention
    • OC Pepper Spray
    • Cybersecurity
    • Certified Specialist
    • Recertification
    • K9 Basic Obedience
  • Register
    • Online Training
    • In-Class Training
    • Recertification
  • Equipment
  • Apparel
  • Gallery
  • Reseller
  • Certified Instructors
    • Become an Instructor
    • Instructors
  • Instructor Login
  • Fraud Prevention
  • Customer Support
  • Contact Us
  • More
    • Home
    • Training
      • Use of Force Training
      • Crisis Intervention
      • OC Pepper Spray
      • Cybersecurity
      • Certified Specialist
      • Recertification
      • K9 Basic Obedience
    • Register
      • Online Training
      • In-Class Training
      • Recertification
    • Equipment
    • Apparel
    • Gallery
    • Reseller
    • Certified Instructors
      • Become an Instructor
      • Instructors
    • Instructor Login
    • Fraud Prevention
    • Customer Support
    • Contact Us
  • Sign In

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Training
    • Use of Force Training
    • Crisis Intervention
    • OC Pepper Spray
    • Cybersecurity
    • Certified Specialist
    • Recertification
    • K9 Basic Obedience
  • Register
    • Online Training
    • In-Class Training
    • Recertification
  • Equipment
  • Apparel
  • Gallery
  • Reseller
  • Certified Instructors
    • Become an Instructor
    • Instructors
  • Instructor Login
  • Fraud Prevention
  • Customer Support
  • Contact Us

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

CCTV & Cybersecurity Fundamentals | Level 3

The GCT Cybersecurity Fundamentals Certification Program is self paced and delivered entirely online.


The program and certification is recognized and is in use by major Corporations, Government Organizations and Private Security Agencies.


Duration: 3.5 Hours

Level: 3

Why you should take this course

  • Protect yourself and your Private Information
  • Increased employment opportunities
  • Increased personal qualifications
  • Self protection and education
  • Increased specialized training

Who should take this course

Anyone Using Digital Platforms: Remote Workers, CCTV Operators, General IT Users, Security Staff and Management.


Your personal information, computer and cell phone pictures, emails, banking and financial information, as well as unauthorized access to your home computer, cell phone camera and Security CCTV systems can be accessed remotely by hackers.


The main focus of this program is to provide security personnel with a basic understanding of how potential criminals may exploit weaknesses in technology.


The program will explain how individuals use these weaknesses to assist them in committing crimes such as identity theft, vehicle thefts, unauthorized access to reports, emails and reporting software, as well as CCTV monitoring and cell phone jamming techniques aimed to disable security procedures by bypassing camera monitoring software.

Certification

Upon completion of the training program, you will receive a Digital Cybersecurity Fundamentals Certification.

Over +50,000 Trained and Certified

CCTV Cybersecurity Fundamentals | Level 3

This approved program and certification is recognized and is in use by major Corporations, Government Organizations and Private Security Agencies.


Upon completion of the training program, you will receive a Digital Cybersecurity Fundamentals Certification.


The program and certification is recognized and is in use by agencies in Canada, USA, UK, Europe, Asia, Australia and the Middle East.

Course Content

  • Understanding Common Cyber Threats
  • Malware, Ransomware, and Viruses
  • Phishing and Social Engineering Attacks
  • Social Media Security
  • How Social Media Accounts Get Hacked
  • Personal Information Theft
  • Common Methods of Stealing Personal Information
  • Remote Attacks on Personal Computers
  • Types of Remote Attacks - Remote Desktop & Trojan Horses
  • Protecting Your Personal Computer from Remote Threats
  • Cybersecurity and Physical Security
  • Securing Devices in Physical Environments
  • Hacking into CCTV Systems 
  • Securing Surveillance Systems
  • Cell Phone and Camera Hacking 
  • Unauthorized Access to Live Viewing Systems
  • What is Live Viewing Unauthorized Access
  • VOIP and Phone Security
  • Protecting Against VOIP Wiretaps and Phone Hacking
  • Firewalls, Antivirus Software, and Encryption
  • Best Practices for Protecting Your Devices
  • More...


Duration: 3.5 Hours

Level: 3

Certification: This Cybersecurity certification does not expire

Register Now

Copyright © 2025 Use of Force  Training & Non Violent Crisis Training - All Rights Reserved.

  • Use of Force Training
  • Crisis Intervention
  • OC Pepper Spray
  • Cybersecurity
  • Terms and Conditions