UKI Social Media Security Professional (SMSP)

3 Day | Instructor Led

The Social Media Security Professional (SMSP) Course is designed for individuals who must acquire knowledge and skills to anticipate attacks and guard sensitive information from social media hackers. In this course you will learn to identify and mitigate social media security risks and you will leave with tools to quickly respond to security breaches. The Social Media Security Professional Course is taught in a three-day format and includes lectures, demonstrations and hands-on labs.

This course prepares you for the Social Media Security Professional (SMSP) Certification. Certified SMSPs are the organization's first line of defense from social media security attacks.

Ideal Candidates for the UKI Social Media Security Course and the SMSP Certification
SMSP is designed for professionals who work with social media solutions and have experience in the cyber security space. Candidate roles include: information security technician, security administrator, security architect, security engineer or any other role that is responsible for information security. SMSP is also ideal for Information Assurance professionals in Chief Information Security Officer (CISO), Chief Information Officer (CIO) or other roles responsible for developing social media usage policies and education programs for end users.

Inquire About
UKI Social Media Security Professional (SMSP)

Ideal Candidates for UKI Social Media Security Professional (SMSP) Class

UKI Social Media Security Professional (SMSP) Prerequisites

A minimum of one (1) year of cybersecurity work experience is recommended, but not required to attend the Social Media Security Professional Training.

What You'll Get in UKI Social Media Security Professional (SMSP)

Comprehensive Social Media Security Training that prepares you for the industry's first Social Media Security Professional (SMSP) Certification

Expert Level Instruction

UKI Social Media Security Course Material

Daily Homework and Quizzes

Daily demonstration and hands-on labs

DVD with Tools, References & Examples

What You'll Learn in UKI Social Media Security Professional (SMSP)

1. Social Media Theory and Principles

2. Social Media Technical Composition

3. Social Media Risks

4. Social Media Security & Incident Response

5. Social Media Security Management

UKI Social Media Security Professional (SMSP) Certification

Students must pass the final exam administered at the end of the training course in order to earn the UKI Social Media Security Professional (SMSP) Certification. Learn more about the SMSP Certification.

REGISTRATION
To register for the Social Media Security Professional Training, contact our Authorized Training Partners or fill out the form at the bottom of this page and a member of our team will get back to you shortly.

UKI Social Media Security Professional (SMSP) Outline

  • Social Media Overview
    • Social Media Definitions
    • History of Social Media
    • Social Media Theory
    • Characterization of Social Media Users
    • Social Media Professions
  • Social Media Typing
    • Identifying Different Types of Social Media
    • Identifying Usage of Social Media Types
  • Social Media Implementation & Use Cases
    • Public Relations–Affairs & Outreach
    • Marketing
    • Sales
    • Service Support
    • Innovation
    • Community Building–Collaboration
    • Human Resources–Recruiting
  • Social Media Technical Composition
    • Social Media Capabilities
    • Social Media Hosting Platforms
    • Social Media End User Platforms & Applications
    • Social Media Standards and Protocols
  • Social Media Risks
    • Understanding Social Media Vulnerabilities & Threats
    • Understanding Social Media Attack Characteristics
  • Social Media Detection & Protection Strategies
    • Network Perimeter & Social Media Usage
    • Social Media Detection & Protection Components
    • Detection & Protection Approaches:
      • Malware
      • Phishing
      • Evil Twin Attacks
      • Data Leakage
      • Data Profiling
      • Identity Theft
    • Social Media Security Settings
      • Applying Social Network Settings
      • Applying Blogging Platform Settings
      • Applying Microblogging Platform Settings
    • Social Media Incident Response Strategies
      • The Incident Response Proces
      • Social Media & Incident Response
    • Social Media Management
      • Understanding the Social Media IT/Security Policy Framework
      • Understanding Social Media Terms of Service
      • Understanding Privacy Statements / Policy

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.



One major catalyst of change is the advancement of technology. As the hardware of war improves through technological development, so must the tactical, operational, and strategic usage adapt to its improved capabilities both to maximize our own capabilities and to counteract our enemy's. MCDP-1 Warfighting

For the first time in history, the cyber and warfare climate have intertwined. The blending of these two worlds has shown the importance of functional, practical and aggressive cybersecurity. UKI’s CyberVanguard Series Tier I: Enterprise Guardian focuses on enhancing foundational policies and best practices, with advanced fundamentals, empowering cybersecurity teams to protect their enterprise network.

 



Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W