Level: Foundation

2 Day | Instructor Led

THE BEST OF BOTH WORLDS - Customized master instructor-led classroom training + convenience of a self-paced virtual course

The Social Media Security Hybrid course offers a comprehensive overview of information security as it applies to social networking by combining elements of training from the Social Media Security Professional (SMSP) Powered by CompTIA, Social Media Engineering & Forensics Professional (SMEFP) and Social Media Management & Governance Professional (SMMGP) courses.
In this course you will explore social networking risks, security breach detection techniques, protection techniques, incidence response and forensics as well as protection laws, regulatory compliance, development of internal policies, governance, and more.

Length and Format
2 Days. Day 1 consists of a customized, instructor-led classroom training. Students will complete the course (Day 2) by participating in a self-paced, virtual training, which includes pre-recorded video lectures focused on real life knowledge application.

Ideal Candidates
This course is ideal for professionals who have a broad base knowledge of information security concepts, tools and procedures.

Continuing Education Credits
Upon completion of the course, you will earn 16 continuing education credits toward renewal of your CompTIA and other IT industry certifications.

Inquire About:

Ideal Candidates for UKI Social Media Security Hybrid Training Course Class


There Are No PreRequisites Defined for this Course

What You'll Get in

What You'll Learn in


There is no certification associated with this training course. However, this course covers a subset of the Social Media Security Professional (SMSP) Certification exam objectives. Certified SMSPs are the organization's first line of defense from social media security attacks.

UKI Social Media Security Hybrid Training Course Outline

Day 1 – Classroom Instruction

  • Social Media Overview
    • Social Media Definitions
    • History of Social Media
    • Social Media Theory
    • Characterization of Social Media Users
    • Social Media Professions
  • Social Media Typing
    • Identifying Different Types of Social Media
    • Identifying Usage of Social Media Types
  • Social Media Implementation & Use Cases
    • Public Relations – Affairs & Outreach
    • Marketing
    • Sales
    • Service Support
    • Innovation
    • Community Building – Collaboration
    • Human Resources – Recruiting
  • Social Media Governance Theory and Principles
    • Social Media Governance Defined
    • Social Media Policy vs. Governance
    • Leveraging Existing Corporate Governance
    • Scoping Social Media Governance in your organization
  • Understand Social Media and the Employment Relations
    • Wage And Hour Considerations
    • Discrimination Laws
    • Protected Activity Laws
    • Applicant Screening Laws
    • Employee Privacy Considerations
    • Federal Laws Applicable To Electronic
    • Communications And Data
    • Other Tort Liability For Employers
    • Safeguarding Confidential And Proprietary Information
    • Employer Policies And Practices
  • Social Media Security Operations
    • Monitoring Social Media Platforms & Services
    • Social Media Incident Response Process
    • Forensic Processes
    • Forensic Tools & Techniques
    • Legal Issues & Law Enforcement Coordination

Total CEUs Day 1: 7 Hours

Day 2 – Asynchronous Class

3 Hours - Social Media Security Professional (SMSP) Course Elements

  • Social Media Technical Composition
    • Social Media Capabilities
    • Social Media Hosting Platforms
    • Social Media End User Platforms & Applications
    • Social Media Standards and Protocols
  • Social Media Risks
    • Understanding Social Media Vulnerabilities & Threats
    • Understanding Social Media Attack Characteristics
    3 Hours - Social Media Management & Governance Professional (SMMGP) Course Elements
  • Understand Social Media Accounts and Content Law
    • Ownership Of Social Media Accounts
    • User Generated Content
    • Copyright
      • Trademarks
      • Trade Secrets
      • Defamation
  • Understand Social Media Privacy and Compliance
    • Protection Through Terms Of Use And Privacy And Privacy Policies
    • Effect Of Social Media Use On Privacy And Security Compliance
    • Compliance With Securities And Disclosure Laws
    • Social Media As A Marketing Tool
  • Understand Social Media eDiscovery
    • Social Media And eDiscovery
    • Evidentiary Exposure
    • Federal Rules Of Civil Procedure
    • State Laws And eDiscovery Guidelines
    • Record Retention Policy
  • Understand Social Media Regulatory Compliance
    • Social Media Regulatory Compliance
    • Financial Services
    • Health Care
    • Federal Trade Commission Rulings
  • Social Media and FISMA
  • 3 Hours - Social Media Engineering & Forensics Professional (SMEFP) Course Elements
  • Social Media Protection Techniques
    • Administrative Controls
    • System Controls
    • Software Approach
  • Social Media Monitoring and Detection Techniques
    • Monitoring Social Media Platforms & Services
    • Managed Automated Tools
    • Unmanaged Automated Tools
  • Social Media Incident Handling and Forensics
    • Forensic Methodology
    • Collecting the Evidence
    • Working with Vendors
    • Handling the Evidence
    • Admissibility in Court

Total CEUs Day 2 (Asynchronous): 9 Hours
Total Course CEUs Day 1&2: 16 Hours


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

The BEC XXE exercise is a customized, six-hour, Cyber Range exercise hosted on ManTech’s Advanced Cyber Range Environment (ACRE). Lead by expert cyber security engineers, the exercise can be executed in a classroom and remotely. In this exercise, BEC-based attacks are simulated. Participants will be introduced to variations of the BEC attack (both external and internal) and will capture, preserve and recover network and host-based artifacts from the attacks. They will also determine the origin of the attacks, the extent of the compromise, and any on-going activity related to it. Discussion focuses on blue team threat hunter tasks. This exercise uses a hands-on keyboard approach to create realistic technical training and management interaction opportunities where participants respond to and report events as identified. Participants are engaged via an Incident Response "Observe/Engage" Model and are encouraged to view the attack as if it were happening to their institutions in real time. Participants are asked to share what they have done or would do based on the facts provided.

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W