SMSP Certification Training | Social Media Security Professional

classroom Live training locations in Canada onsite training virtual training live
Classroom Live Online Live Onsite Training Self-Paced

SMSP Certification Training | Social Media Security Professional

Introduction:

SMSP Certification Training | Social Media Security Professional Course Description

In this SMSP Certification Training | Social Media Security Professional Training course, you will gain the knowledge and skills needed to anticipate attacks and guard sensitive information from social media hackers. This SMSP Certification Training | Social Media Security Professional Training course prepares you to become an expert in identifying risks that emerge from the unique technical composition of social media sites and master your social media breach incident response. With SMSP Certification Training | Social Media Security Professional Training, you will also learn to build a strong social media policy and defense strategy that will secure your organization’s continuity and showcase your expertise. This SMSP Certification Training | Social Media Security Professional Training course covers the Social Media Security Professional Common Body of Knowledge and prepares you for the SMSP certification. The exam voucher is included with this course and is valid for one year from the date issued.

Audience / Target Group:

Information security technician security administrators, security architectures, or security engineers
Information Assurance C-level professionals, such as a CISO or CIO

Related Courses:

CompTIA Mobility+ Training
CompTIA Storage+ Training

Duration: 3 days

Skills Gained:

Mitigate social media security risks
Tools to respond to security breaches
Guide and develop social media personnel security policies for an organization
Social media theory, principles, and technical composition
Risks, security and incident response, and governance

Course Content:

1. Social Media

Social Media Definitions
History of Social Media
Social Media Theory
Characterization of Social Media Users
Social Media Professions

2. Social Media Typing

Different Types of Social Media
Usage of Social Media Types

3. Social Media Implementation and Use Cases

Public Relations
Affairs and Outreach
Marketing
Sales
Service Support
Innovation
Community Building
Collaboration
Human Resources
Recruiting

4. Social Media Technical Composition

Social Media Capabilities
Social Media Hosting Platforms
Social Media End User Platforms and Applications
Social Media Standards and Protocols

5. Social Media Risks

Social Media Vulnerabilities and Threats
Social Media Attack Characteristics

6. Social Media Detection and Protection Strategies

Network Perimeter and Social Media Usage
Social Media Detection and Protection Components
Detection and Protection Approaches:
Malware
Phishing
Evil Twin Attacks
Data Leakage
Data Profiling
Identity Theft

7. Social Media Security Settings

Applying Social Network Settings
Applying Blogging Platform Settings
Applying Microblogging Platform Settings

8. Social Media Incident Response Strategies

Incident Response Process
Social Media and Incident Response

9. Social Media Management

Social Media IT/Security Policy Framework
Social Media Terms of Service
Privacy Statements / Policy

Labs

Lab 1: Create a Gmail Account for Class
Lab 2: The Conversation Prism
Lab 3: Social Media Use Case
Lab 4: Create a Mashup
Lab 5: Create a Blog and Understanding Widgets
Lab 6: Data Profiling
Lab 7: Google Image Search
Lab 8: Session Hijacking Lab
Lab 9: Hijack Using Ghost Phisher
Lab 10: Create a Social Media Policy

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

Location

If multiple locations, please list in the additional comments field.

On-site
Virtual


Public Training Schedule
Private Group Training

Print Friendly, PDF & Email