Duration: 3 Days
In this course, you will gain the knowledge and skills needed to anticipate attacks and guard sensitive information from social media hackers. This course prepares you to become an expert in identifying risks that emerge from the unique technical composition of social media sites and master your social media breach incident response. You will learn to build a strong social media policy and defense strategy that will secure your organization's continuity and showcase your expertise. This course covers the Social Media Security Professional Common Body of Knowledge and prepares you for the SMSP certification. The exam voucher is included with this course and is valid for one year from the date issued.
CEU Credits
Upon completion of the SMSP training, you will earn 24 continuing education units (CEUs) toward CompTIA's A+, Network+, and Security+.
What You Will Learn
- Mitigate social media security risks
- Tools to respond to security breaches
- Guide and develop social media personnel security policies for an organization
- Social media theory, principles, and technical composition
- Risks, security and incident response, and governance
Audience
- Information security technician security administrators, security architectures, or security engineers
- Information Assurance C-level professionals, such as a CISO or CIO
Prerequistes
- One year of cybersecurity experience is recommended
Course Outline
1. Social Media
- Social Media Definitions
- History of Social Media
- Social Media Theory
- Characterization of Social Media Users
- Social Media Professions
2. Social Media Typing
- Different Types of Social Media
- Usage of Social Media Types
3. Social Media Implementation and Use Cases
- Public Relations
- Affairs and Outreach
- Marketing
- Sales
- Service Support
- Innovation
- Community Building
- Human Resources
4. Social Media Technical Composition
- Social Media Capabilities
- Social Media Hosting Platforms
- Social Media End User Platforms and Applications
- Social Media Standards and Protocols
5. Social Media Risks
- Social Media Vulnerabilities and Threats
- Social Media Attack Characteristics
6. Social Media Detection and Protection Strategies
- Network Perimeter and Social Media Usage
- Social Media Detection and Protection Components
- Detection and Protection Approaches:
- Malware
- Phishing
- Evil Twin Attacks
- Data Leakage
- Data Profiling
- Identity Theft
7. Social Media Security Settings
- Applying Social Network Settings
- Applying Blogging Platform Settings
- Applying Microblogging Platform Settings
8. Social Media Incident Response Strategies
- Incident Response Process
- Social Media and Incident Response
9. Social Media Management
- Social Media IT/Security Policy Framework
- Social Media Terms of Service
- Privacy Statements / Policy
Course Labs
Lab 1: Creat3 a Gmail Account for Class
Lab 2: The Conversation Prism
Lab 3: Social Media Use Case
Lab 4: Create a Mashup
Lab 5: Create a Blog and Understanding Widgets
Lab 6: Data Profiling
Lab 7: Google Image Search
Lab 8: Session Hijacking Lab
Lab 9: Hijack Using Ghost Phisher
Lab 10: Create a Social Media Policy