UKI Social Media Engineering & Forensics Professional (SMEFP)

3 Day | Instructor Led

The Social Media Engineering & Forensics Professional (SMEFP) Course prepares information security professionals to effectively design, implement and operate secure social media solutions. In this course you will learn to detect cyber security attacks stemming from social media channels, analyze the impact of the breach, mitigate the risks, and collect necessary evidence of breach for further investigation and possible prosecution. This course teaches individuals to lead necessary staff training to prevent security breaches originating from social media platforms. The Social Media Engineering & Forensics Course is taught in a five day format and includes lectures, demonstrations and hands-on labs.

This course prepares you for the Social Media Engineering & Forensics Professional (SMEFP) Certification.

Ideal Candidates for the UKI Social Media Engineering & Forensics Course and Certification
The Social Media Engineering & Security Course is ideal for individuals with proven hands-on experience in the cybersecurity space. Candidate job roles include: security administrator, systems administrator, network administrator, security architect, security engineer, penetration tester, risk assessment engineer, forensics engineer, information security director, chief information security officer* or any other role that is responsible for information security. The candidate job roles list is not exhaustive.

Inquire About
UKI Social Media Engineering & Forensics Professional (SMEFP)

Ideal Candidates for UKI Social Media Engineering & Forensics Professional (SMEFP) Class

UKI Social Media Engineering & Forensics Professional (SMEFP) Prerequisites

Social Media Security Professional (SMSP) Course. This prerequisite can be waived if the individual has two years of documented cybersecurity experience.

What You'll Get in UKI Social Media Engineering & Forensics Professional (SMEFP)

Comprehensive Social Media Engineering & Forensics Training that prepares you for the industry's first Social Media Engineering & Forensics Professional (SMEFP) Certification

Expert Level Instruction

UKI Social Media Engineering & Forensics Course Material

Daily Homework and Quizzes

Daily demonstration and hands-on labs

DVD with Tools, References & Example

End of Course Certification Exam

What You'll Learn in UKI Social Media Engineering & Forensics Professional (SMEFP)

1. Social Media Technical Decomposition

2. Social Media Risks

3. Social Media Engineering

4. Social Media Requirements Analysis

5. Social Media Design Analysis and Solutions

6. Social Media Implementation and Integration

7. Social Media Verification and Validation

8. Social Media Secure Operations

9. Protection Techniques

10. Monitoring and Detection Techniques

11. Incident Handling and Forensics

UKI Social Media Engineering & Forensics Professional (SMEFP) Certification

Students must pass the final exam administered at the end of the training course in order to earn the UKI Social Media Engineering & Forensics Professional (SMEFP) Certification. Learn more about the SMEFP Certification.

Price
Course price includes the SMEFP exam voucher and all required materials.
Call us at 1.888.677.5696 or fill out the form below to learn more.

REGISTRATION
To register for the Social Media Engineering & Forensics Training, fill out the form below and a member of our team will get back to you shortly.

Please also use the form below if you have any questions, requests for additional training dates, or if you would like to leave feedback for us. We look forward to your message.

UKI Social Media Engineering & Forensics Professional (SMEFP) Outline

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.



All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.



One major catalyst of change is the advancement of technology. As the hardware of war improves through technological development, so must the tactical, operational, and strategic usage adapt to its improved capabilities both to maximize our own capabilities and to counteract our enemy's. MCDP-1 Warfighting

For the first time in history, the cyber and warfare climate have intertwined. The blending of these two worlds has shown the importance of functional, practical and aggressive cybersecurity. UKI’s CyberVanguard Series Tier I: Enterprise Guardian focuses on enhancing foundational policies and best practices, with advanced fundamentals, empowering cybersecurity teams to protect their enterprise network.

 



© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W