Level: Foundation

2 Day | Instructor Led

THE BEST OF BOTH WORLDS - Customized master instructor-led classroom training + convenience of a self-paced virtual course

The Social Media Security Hybrid course offers a comprehensive overview of information security as it applies to social networking by combining elements of training from the Social Media Security Professional (SMSP) Powered by CompTIA, Social Media Engineering & Forensics Professional (SMEFP) and Social Media Management & Governance Professional (SMMGP) courses.
In this course you will explore social networking risks, security breach detection techniques, protection techniques, incidence response and forensics as well as protection laws, regulatory compliance, development of internal policies, governance, and more.

Length and Format
2 Days. Day 1 consists of a customized, instructor-led classroom training. Students will complete the course (Day 2) by participating in a self-paced, virtual training, which includes pre-recorded video lectures focused on real life knowledge application.

Ideal Candidates
This course is ideal for professionals who have a broad base knowledge of information security concepts, tools and procedures.

Continuing Education Credits
Upon completion of the course, you will earn 16 continuing education credits toward renewal of your CompTIA and other IT industry certifications.

Inquire About

Ideal Candidates for UKI Social Media Security Hybrid Training Course Class

Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in

What You'll Learn in

Certification

There is no certification associated with this training course. However, this course covers a subset of the Social Media Security Professional (SMSP) Certification exam objectives. Certified SMSPs are the organization's first line of defense from social media security attacks.

UKI Social Media Security Hybrid Training Course Outline

Day 1 – Classroom Instruction

  • Social Media Overview
    • Social Media Definitions
    • History of Social Media
    • Social Media Theory
    • Characterization of Social Media Users
    • Social Media Professions
  • Social Media Typing
    • Identifying Different Types of Social Media
    • Identifying Usage of Social Media Types
  • Social Media Implementation & Use Cases
    • Public Relations – Affairs & Outreach
    • Marketing
    • Sales
    • Service Support
    • Innovation
    • Community Building – Collaboration
    • Human Resources – Recruiting
  • Social Media Governance Theory and Principles
    • Social Media Governance Defined
    • Social Media Policy vs. Governance
    • Leveraging Existing Corporate Governance
    • Scoping Social Media Governance in your organization
  • Understand Social Media and the Employment Relations
    • Wage And Hour Considerations
    • Discrimination Laws
    • Protected Activity Laws
    • Applicant Screening Laws
    • Employee Privacy Considerations
    • Federal Laws Applicable To Electronic
    • Communications And Data
    • Other Tort Liability For Employers
    • Safeguarding Confidential And Proprietary Information
    • Employer Policies And Practices
  • Social Media Security Operations
    • Monitoring Social Media Platforms & Services
    • Social Media Incident Response Process
    • Forensic Processes
    • Forensic Tools & Techniques
    • Legal Issues & Law Enforcement Coordination

Total CEUs Day 1: 7 Hours

Day 2 – Asynchronous Class

3 Hours - Social Media Security Professional (SMSP) Course Elements

  • Social Media Technical Composition
    • Social Media Capabilities
    • Social Media Hosting Platforms
    • Social Media End User Platforms & Applications
    • Social Media Standards and Protocols
  • Social Media Risks
    • Understanding Social Media Vulnerabilities & Threats
    • Understanding Social Media Attack Characteristics
    3 Hours - Social Media Management & Governance Professional (SMMGP) Course Elements
  • Understand Social Media Accounts and Content Law
    • Ownership Of Social Media Accounts
    • User Generated Content
    • Copyright
      • Trademarks
      • Trade Secrets
      • Defamation
  • Understand Social Media Privacy and Compliance
    • Protection Through Terms Of Use And Privacy And Privacy Policies
    • Effect Of Social Media Use On Privacy And Security Compliance
    • Compliance With Securities And Disclosure Laws
    • Social Media As A Marketing Tool
  • Understand Social Media eDiscovery
    • Social Media And eDiscovery
    • Evidentiary Exposure
    • Federal Rules Of Civil Procedure
    • State Laws And eDiscovery Guidelines
    • Record Retention Policy
  • Understand Social Media Regulatory Compliance
    • Social Media Regulatory Compliance
    • Financial Services
    • Health Care
    • Federal Trade Commission Rulings
  • Social Media and FISMA
  • 3 Hours - Social Media Engineering & Forensics Professional (SMEFP) Course Elements
  • Social Media Protection Techniques
    • Administrative Controls
    • System Controls
    • Software Approach
  • Social Media Monitoring and Detection Techniques
    • Monitoring Social Media Platforms & Services
    • Managed Automated Tools
    • Unmanaged Automated Tools
  • Social Media Incident Handling and Forensics
    • Forensic Methodology
    • Collecting the Evidence
    • Working with Vendors
    • Handling the Evidence
    • Admissibility in Court

Total CEUs Day 2 (Asynchronous): 9 Hours
Total Course CEUs Day 1&2: 16 Hours

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.



All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.



One major catalyst of change is the advancement of technology. As the hardware of war improves through technological development, so must the tactical, operational, and strategic usage adapt to its improved capabilities both to maximize our own capabilities and to counteract our enemy's. MCDP-1 Warfighting

For the first time in history, the cyber and warfare climate have intertwined. The blending of these two worlds has shown the importance of functional, practical and aggressive cybersecurity. UKI’s CyberVanguard Series Tier I: Enterprise Guardian focuses on enhancing foundational policies and best practices, with advanced fundamentals, empowering cybersecurity teams to protect their enterprise network.

 



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W