Social Media Security Best Practices

Dive into the realm of digital safety and security with our comprehensive course offerings designed to equip you with the knowledge and skills needed to navigate the online world confidently. “Before You Post,” will uncover the importance of social media etiquette while traveling. Explore the nuances of “Appropriate Use of Social Media,” delving into best practices for secure engagement and brand building. Safeguard your communication channels with insights from “Email and Instant Messaging Security,” ensuring both personal and organizational data remain protected. Learn to surf the web safely with “S.A.F.E Web Browsing,” identifying and mitigating cyber threats lurking in the digital landscape. Unravel the complexities of “The Business Email Compromise,” arming yourself against phishing scams targeting financial transactions. Navigate the cloud securely in “Cloud Security,” understanding the risks and strategies for safeguarding cloud-stored information. Lastly, fortify your mobile defenses in “Living Mobile Secure,” arming yourself against the rising tide of mobile threats. Tailored for both personal and professional users of digital platforms, this course empowers you to navigate the digital realm with confidence and resilience.

What You Will Learn: 

  • Before You Post
    • Meet Bob. He’s ready to take some much-needed vacation time. Before he starts his week-long adventure, he leaves a quick post on Facebook. Unfortunately, when Bob returns home, he finds that things are not quite the same. Watch this video to find out what happened to Bob and learn about social media best practices to follow when traveling.
  • Appropriate Use of Social Media
    • Social media can be an excellent tool to connect and interact with customers, show thought leadership, and build a brand, but it also poses unique security, HR, and public relations challenges. This course covers social media best practices including secure use, accountability, harassment, how to spot scams, secure passwords, and advanced security features. This course uses high-quality video and real-world simulations to teach best practices for social media.
  • Email and Instant Messaging Security
    • Email and instant messaging (IM) are essential communication tools that most people use just about every day. They’re incredibly useful applications because they allow you to exchange messages and files quickly and efficiently with just about anyone else in the world. However, it’s a two-way street, meaning that since you can connect with anyone online, anyone else, including hackers and cybercriminals, can connect with you. This course teaches employees the email and IM best practices to protect both their organization’s sensitive information and their own personal information and identity from attack.
  • S.A.F.E Web Browsing
    • Upon completion of this module, you will be able to recognize scams used by cybercriminals that exploit consumers browsing the web, apply the S-A-F-E model to help protect against threats associated with browsing the web, and use the best practices discussed in this module to help improve your overall web browsing experience.
  • The Business Email Compromise
    • Business Email Compromise, or BEC, can take a variety of forms. In most cases, the scammers use phishing tactics to target employees with access to company finances and trick them into paying invoices or making payments to bank accounts thought to belong to trusted partners—except the money ends up in accounts controlled by the criminals. This Microlearning video will give you a quick overview of BEC and how to prevent it in your business.
  • Cloud Security
    • Cloud-based services offer incredible convenience and can help people be more productive, especially while on the go. But they also create new security challenges, because the security of any information stored on the cloud is only as good as the security of the service provider who holds it.
  • Living Mobile Secure
    • Attacks on mobile devices, mobile apps, and mobile carriers are rising fast. How can you ensure your device is secure? What happens if your phone or tablet is breached? Watch this video to learn more about what you can do to help protect yourself from mobile security threats.

Audience: This course is intended for anyone who uses social media and/or email for personal or business purposes.

Format: Self-Paced Online, 4 week access

Registration is Per-Participant

Course Title Credits Start Date Start Time End Date Delivery Type Delivery Option Instructor / Location Price
Social Media Security Best Practices .25 Any Any Any Self-Paced Online Self-Paced Online Faculty $149.00 Register Now
Course Title Credits Start Date Start Time End Date Delivery Type Delivery Option Instructor / Location Price
0
    0
    Your Cart
    Your cart is emptyCourses and Events