Social Media Threats and Counter Measures | Social Media | Free Udemy Course
Social Media Growth | Social Media Management | Social Media Platforms | Social Networking Sites | Social Media Strategy - Free Course | Free Udemy Course
new- 1.5 hours hours of on-demand video
- Full lifetime access
- Access on mobile and TV
This course on Social Media Threats and Counter Measures is based upon the facts that we experience in our life since the inception of the social media. The key purpose of this course is to educate the masses about dark side of the social media along with counter measures.Social media are Internet based communication and mutual interaction technologies. These are computer networks created for exchanging multimedia rich contents between users specially pictures and video clips. Social media (SM) sites are amongst the most widely used technologies on the Internet e.g Facebook, Google+, Linkedln, Twitter etc. These sites have hundreds of millions of daily users and the number is ever increasing with the advent of smart phones and 3G I 4G even 5G networks. People enjoy using Online Social Networks (OSN) to interact with families, friends and other people through sharing of experiences, pictures, videos, and other types of information. On the other hand social media also has a dark side which is rip with hackers, fraudsters, online predators and intelligence agencies; all capable of using OSN as a platform for targeting their next victim.Unfortunately, most users are unaware of the security risks associated with social media platforms that mainly include breach of privacy, identity theft, malware, fake profiles, blackmailing and sexual harassment.According to recent studies, many social media users expose intimate and sensitive personal details about themselves, their friends, families, personal relationships and organisations, either by posting photos or by directly providing information such as home/ office addresses/ phone numbers, current activities and location. Moreover, Facebook users tend to accept friendship requests from unknown people, who are sometimes friend of their friends. By accepting these friend requests, users unknowingly disclose their private information to total strangers. This information could be used maliciously, harming users both in the virtual and in the real world. These risks increase manifold when the users are children or teenagers who are more exposed and vulnerable than the adults. Horrifically, in some cases cyberbullying through social media can lead to catastrophic results like committing suicide by the affected children.In this era of social media growth, we must keep some preventive measures while using social media. In this course following main topics have been covered:-Introduction to the Social Media Terminologies used in cyber worldSocial Media ThreatsCounter MeasuresConclusionWe hope the students will learn a lot from this valuable course.Who this course is for:Users of Social Media PlatformsTeenagers who use social mediaParents, who can observe their wards for online activities after completing this courseTeachers, who must educate their students about threats of social mediaBusiness Executives, who can guide their team leaders to educate subordinates.
Course Content:
Sections are minimized for better readability, click the section title to view the course content
JOIN OUR WHATSAPP GROUP TO GET LATEST COUPON AS SOON AS UPDATED
JOIN WHATSAPPJOIN OUR TELEGRAM CHANNEL TO GET LATEST COUPON
JOIN TELEGRAMJOIN OUR FACEBOOK GROUP TO GET LATEST COUPON
JOIN FACEBOOKFree Online Tools And Converters for your use
URL Encoder
Input a string of text or a URL and encode the entered string
Try itURL Decoder
Input an encoded string of text or a URL and decode the entered string
Try itColor Contrast Checker (WCAG)
Calculate the color contrast ration for your website (WCAG)
Try itXML Formatter
Paste or upload an XML and have it formatted to a beautiful XML format
Try itURL Slug Generator
Convert any title or sentence into a variety of slugs for your pages URL
Try itE-Signature
Draw an e-signature or type a signature for your online signature
Try it