UKI Social Media Security Professional (SMSP)

3 Day | Instructor Led

The Social Media Security Professional (SMSP) Course is designed for individuals who must acquire knowledge and skills to anticipate attacks and guard sensitive information from social media hackers. In this course you will learn to identify and mitigate social media security risks and you will leave with tools to quickly respond to security breaches. The Social Media Security Professional Course is taught in a three-day format and includes lectures, demonstrations and hands-on labs.

This course prepares you for the Social Media Security Professional (SMSP) Certification. Certified SMSPs are the organization's first line of defense from social media security attacks.

Ideal Candidates for the UKI Social Media Security Course and the SMSP Certification
SMSP is designed for professionals who work with social media solutions and have experience in the cyber security space. Candidate roles include: information security technician, security administrator, security architect, security engineer or any other role that is responsible for information security. SMSP is also ideal for Information Assurance professionals in Chief Information Security Officer (CISO), Chief Information Officer (CIO) or other roles responsible for developing social media usage policies and education programs for end users.

Inquire About:
UKI Social Media Security Professional (SMSP)

Ideal Candidates for UKI Social Media Security Professional (SMSP) Class

UKI Social Media Security Professional (SMSP) Prerequisites

A minimum of one (1) year of cybersecurity work experience is recommended, but not required to attend the Social Media Security Professional Training.

What You'll Get in UKI Social Media Security Professional (SMSP)

Comprehensive Social Media Security Training that prepares you for the industry's first Social Media Security Professional (SMSP) Certification

Expert Level Instruction

UKI Social Media Security Course Material

Daily Homework and Quizzes

Daily demonstration and hands-on labs

DVD with Tools, References & Examples

What You'll Learn in UKI Social Media Security Professional (SMSP)

1. Social Media Theory and Principles

2. Social Media Technical Composition

3. Social Media Risks

4. Social Media Security & Incident Response

5. Social Media Security Management

UKI Social Media Security Professional (SMSP) Certification

Students must pass the final exam administered at the end of the training course in order to earn the UKI Social Media Security Professional (SMSP) Certification. Learn more about the SMSP Certification.

To register for the Social Media Security Professional Training, contact our Authorized Training Partners or fill out the form at the bottom of this page and a member of our team will get back to you shortly.

UKI Social Media Security Professional (SMSP) Outline

  • Social Media Overview
    • Social Media Definitions
    • History of Social Media
    • Social Media Theory
    • Characterization of Social Media Users
    • Social Media Professions
  • Social Media Typing
    • Identifying Different Types of Social Media
    • Identifying Usage of Social Media Types
  • Social Media Implementation & Use Cases
    • Public Relations–Affairs & Outreach
    • Marketing
    • Sales
    • Service Support
    • Innovation
    • Community Building–Collaboration
    • Human Resources–Recruiting
  • Social Media Technical Composition
    • Social Media Capabilities
    • Social Media Hosting Platforms
    • Social Media End User Platforms & Applications
    • Social Media Standards and Protocols
  • Social Media Risks
    • Understanding Social Media Vulnerabilities & Threats
    • Understanding Social Media Attack Characteristics
  • Social Media Detection & Protection Strategies
    • Network Perimeter & Social Media Usage
    • Social Media Detection & Protection Components
    • Detection & Protection Approaches:
      • Malware
      • Phishing
      • Evil Twin Attacks
      • Data Leakage
      • Data Profiling
      • Identity Theft
    • Social Media Security Settings
      • Applying Social Network Settings
      • Applying Blogging Platform Settings
      • Applying Microblogging Platform Settings
    • Social Media Incident Response Strategies
      • The Incident Response Proces
      • Social Media & Incident Response
    • Social Media Management
      • Understanding the Social Media IT/Security Policy Framework
      • Understanding Social Media Terms of Service
      • Understanding Privacy Statements / Policy


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.

One major catalyst of change is the advancement of technology. As the hardware of war improves through technological development, so must the tactical, operational, and strategic usage adapt to its improved capabilities both to maximize our own capabilities and to counteract our enemy's. MCDP-1 Warfighting

For the first time in history, the cyber and warfare climate have intertwined. The blending of these two worlds has shown the importance of functional, practical and aggressive cybersecurity. UKI’s CyberVanguard Series Tier I: Enterprise Guardian focuses on enhancing foundational policies and best practices, with advanced fundamentals, empowering cybersecurity teams to protect their enterprise network.


© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W