Social Media Security Professional (SMSP) Prep Course

$2,295.00


  • classroom

  • virtual

  • Onsite
Duration: 3 Days

In this course, you will gain the knowledge and skills needed to anticipate attacks and guard sensitive information from social media hackers. This course prepares you to become an expert in identifying risks that emerge from the unique technical composition of social media sites and master your social media breach incident response. You will learn to build a strong social media policy and defense strategy that will secure your organization's continuity and showcase your expertise. This course covers the Social Media Security Professional Common Body of Knowledge and prepares you for the SMSP certification. The exam voucher is included with this course and is valid for one year from the date issued.

CEU Credits

Upon completion of the SMSP training, you will earn 24 continuing education units (CEUs) toward CompTIA's A+, Network+, and Security+.

What You Will Learn

 

  • Mitigate social media security risks
  • Tools to respond to security breaches
  • Guide and develop social media personnel security policies for an organization
  • Social media theory, principles, and technical composition
  • Risks, security and incident response, and governance

Audience

 

  • Information security technician security administrators, security architectures, or security engineers
  • Information Assurance C-level professionals, such as a CISO or CIO

Prerequistes

 

  • One year of cybersecurity experience is recommended

Course Outline

 

1. Social Media

  • Social Media Definitions
  • History of Social Media
  • Social Media Theory
  • Characterization of Social Media Users
  • Social Media Professions

2. Social Media Typing

  • Different Types of Social Media
  • Usage of Social Media Types

3. Social Media Implementation and Use Cases

  • Public Relations
  • Affairs and Outreach
  • Marketing
  • Sales
  • Service Support
  • Innovation
  • Community Building
    • Collaboration
  • Human Resources
    • Recruiting

4. Social Media Technical Composition

  • Social Media Capabilities
  • Social Media Hosting Platforms
  • Social Media End User Platforms and Applications
  • Social Media Standards and Protocols

5. Social Media Risks

  • Social Media Vulnerabilities and Threats
  • Social Media Attack Characteristics

6. Social Media Detection and Protection Strategies

  • Network Perimeter and Social Media Usage
  • Social Media Detection and Protection Components
  • Detection and Protection Approaches:
    • Malware
    • Phishing
    • Evil Twin Attacks
    • Data Leakage
    • Data Profiling
    • Identity Theft

7. Social Media Security Settings

  • Applying Social Network Settings
  • Applying Blogging Platform Settings
  • Applying Microblogging Platform Settings

8. Social Media Incident Response Strategies

  • Incident Response Process
  • Social Media and Incident Response

9. Social Media Management

  • Social Media IT/Security Policy Framework
  • Social Media Terms of Service
  • Privacy Statements / Policy

Course Labs

 

Lab 1: Creat3 a Gmail Account for Class

Lab 2: The Conversation Prism

Lab 3: Social Media Use Case

Lab 4: Create a Mashup

Lab 5: Create a Blog and Understanding Widgets

Lab 6: Data Profiling

Lab 7: Google Image Search

Lab 8: Session Hijacking Lab

Lab 9: Hijack Using Ghost Phisher

Lab 10: Create a Social Media Policy