Free Webinars

Social Media Security: The New Frontier – What You Need to Know to Stay Ahead
By: Dr. Scott Wells, Co-founder and Chief Architect of Social Media Security Professional (SMSP) Certification Powered by CompTIA

This presentation based on the Social Media Security Professional (SMSP) certification program powered by CompTIA investigates the personal a nd professional risks involved in unauthorized access to social media accounts. Using high profile security breaches as illustrations, we will explore the method and attack vectors used by hackers such as privacy assaults, data leakage and identity theft challenges via access-point spoofing and session hijacking. Dr. Scott Wells will demonstrate how easy it is to take over a social networking account via session hijacking, and will guide you through an evil twin attack to reveal its potential consequences to your personal and your organization's reputation. The presentation concludes with countermeasures such as Google's content based image searching to give you a security checkup and leave you with actionable steps to boost the security of your social media accounts.

Click here To start the presentation.


Locking Down Social Media - Next Generation Security Enhancements
By: Dr. Scott Wells, Co-founder and Chief Architect of Social Media Security Professional (SMSP) Certification Powered by CompTIA

Not one day goes by that you don't read about a high profile social media account being hacked into and the damage that was caused. In an attempt to stop the bleeding, social media platforms are responding with quick security fixes, some that work and some that don't. Through the analysis of high profile hacks and a live demonstration, Dr. Scott Wells will reveal system vulnerabilities and explore how well the new security measures address the problems at hand. The presentation concludes with best practices and actionable steps to help you boost the security of your personal and your organization's social media accounts. Click on "play webcast" below to start the presentation.

;

Social Network Security on Mobile Devices - What are Friends for?
By: Scott A. Wells, Ph.D., Co-founder, Ultimate Knowledge Institute

As Social Media continues to increase its overwhelming number of users and the volume of data continues to rise, the connectivity avenues are changing. According to recent studies, 31% of all smartphone online minutes are spent on social media and access to social media from mobile devices has increased by 63% in 2012, compared to 2011. From a social media security standpoint, this creates and even larger attack surface with new challenges.

Social Network Security on Mobile Devices explores privacy assaults, data leakage and identity theft challenges via access-point spoofing and session hijacking as we take our social media clients on the road.

Click on "play webcast" below to start the presentation.





Social Media Security Professional (SMSP) Training Course Overview
By: Scott A. Wells, Ph.D., Co-founder, Ultimate Knowledge Institute

Explore Social Media Security with UKI's master trainer and delve into the SMSP exam knowledge requirements with this one hour free online webcast. At the end of the session you will have a better understanding of social media technical composition and risks.

Start the presentation >>

We Provide Expert Instruction in the Following Courses:
CISSP Certification Training | CCNA Certification Training | REDHAT Linux Essentials - RH033 Certification Training | Fiber Optic Installer Certification Training | CompTIA A+ 5 Day Certification Training | CompTIA Linux+ Certification Training | CISM Certification Training | SSCP Certification Training | Architecting on AWS Certification Training | UKI Social Media Security Professional (SMSP) - Online Only Certification Training | MCITP: Enterprise Administrator 2008 Upgrade Certification Training | CEH Certification Training | CompTIA Network+ N10-005 Certification Training | ITIL® Foundation Certification Training | Installing and Configuring Windows Server 2012 (M20410) Certification Training | CAP Certification Training | UKI Social Media Engineering & Forensics Professional (SMEFP) Certification Training | RedHat Linux System Administration Foundations Certification Training | CCNP Voice Certification Training | CISA Certification Training | CCNA Voice Certification Training | CHFI Certification Training | ECSA Certification Training | ISSEP Certification Training | MCITP: Enterprise and Server Administrator Certification Training | MCTS: Windows 7 Desktop Administrator 70-680 Certification Training | MCSE 2003/MCTS: Windows 7/Security+ Certification Training | UKI Social Media Security Professional (SMSP) Certification Training | CCNP Certification Training | Administering Microsoft Windows Server 2012 (M20411) Certification Training | Implementing Desktop Application Environments (M20416) Certification Training | Configuring Advanced Windows Server 2012 Services (M20412) Certification Training | Designing and Implementing a Server Infrastructure on Windows 2012 (M20413) Certification Training | CCNA Security Certification Training | Certified Wireless Network Administrator Certification Training | UKI Social Media Management & Governance Professional (SMMGP) Certification Training | UKI Social Media Governance Certification Training | UK EC Council Certified Incident Handler Certification Training | Cyber Kung Fu for the Certified in Risk and Information Systems Control (CRISC) Certification Training | CompTIA Security+ SY0-401 Certification Training | UKI Social Media Security Hybrid Training Course Certification Training | Implementing an Advanced Server Infrastructure (M20414) Certification Training | MCSA: Windows Server 2012 Boot Camp Certification Training | Cyber Kung Fu for the Certified Information Security Manager (CISM) Certification Training | CompTIA Storage + Certification Training | Security Operations on AWS Certification Training | Advanced VMware vSphere Design, Optimize, & Manage Certification Training | PMP v5 Certification Training | Cyber Kung Fu for Wireshark Certification Training | Cyber Kung Fu for the Certified Information Systems Security Professional (CISSP) Certification Training | CompTIA Advanced Security Practitioner (CASP) CAS 002 Certification Training | Quick SharePoint 2013 Maintenance for the Part-Time Administrator Certification Training | CompTIA Network+ (N10-006) Certification Training | Security Design and Solutions, Network Security Design, Conduct a Security Assessment and Host Security Certification Training | Cyber Vanguard Series-Cyber Strike Certification Training | Cyber Vanguard Series- Enterprise Guardian Certification Training | CompTIA Cloud+ Certification Training | ISC2 Certified Cloud Security Professional (CCSP) Certification Training | Cyber Vanguard Series- Cyber Storm Assault Tactics Certification Training | Risk Management Framework for DoD - Fundamentals Certification Training | Programming in HTML5 with JavaScript and CSS3 Certification Training | RedHat System Administration II - RH135 Certification Training | Risk Management Framework for DoD - Deep Dive Certification Training | FUNDAMENTALS OF VMWARE ESXi SERVER Certification Training | AWS Technical Essentials Certification Training | Big Data on AWS Certification Training |
Copyright © 2017 Ultimate Knowledge Institute | Privacy Policy
ITIL® is a registered trade mark of AXELOS® Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS® Limited.
The Swirl logo™; is a trade mark of AXELOS® Limited.

All other trademarks mentioned in this web site are the property of their respective owners.