Complete Privacy and Security in Online Social Media and Awareness Training

Discover the Importance of Privacy and Security in Online Social Media. Empower Yourself with Our Social Media Awareness Training.

Security Awareness

Our Client

What is Using Social Network Safely

Social networks such as LinkedIn, Facebook, and Twitter are commonplace and can be excellent business tools. However, using them can be risky as well. Staying safe on social media isn’t easy. Online bullying and harassment have become a commonplace threat. Similarly, privacy and security in online social media is also a huge risk.

As you go through this course, you’ll learn about these dangers. You’ll also learn how to protect yourself and your organization from them. During the course of this training, first, we’ll introduce you to the risks of using social networks. Then, you’ll look at privacy and security in online social media. You’ll learn about the threats that you may face when using social networks. We’ll cover shortened URLs, phishing, and 3rd party applications as well.

Lastly, we’ll look at the precautions you must take when using social networks. You’ll learn about primary defenses and other measures you can take for staying safe on social media.

Course Description

CategoryInformation Security
Course NameUsing Social Networks Safely
Duration30 mins
Certificate IncludedYes
Languages English
Course TypeInteractive online training
FormatLM-light, SCORM 1.2
Supported DevicesDesktop/Laptop, Tablet, Phone
Last UpdatedJune 30, 2021

What you’ll learn

  • What are social networks?
  • Risks of using social networks
  • How criminals and hackers can exploit careless use of social networks
  • Security and privacy threats and how they might affect you
  • How to protect yourself and your organization from the risks posed by social networks


  1. Using social media safely
  2. Structure of the ‘Using social media safely’  course
  3. Social media for business and personal use
  4. The risks of social networks
  5. What are social networks?
  6. What are the risks of using social networks?
  7. Examples of how criminals exploit social networks
  8. Security and privacy threats on social media
  9. The threat of using shortened URLs over social media
  10. How to deal with malicious shortened URLs
  11. Phishing over social media
  12. Malicious social media 3rd party applications
  13. Security threats when using wireless connections
  14. Protecting yourself and your organization over social media
  15. Social media defenses – Privacy controls
  16. Social media defenses – Limit the information you post
  17. Social media defenses – Other security measures
  18. Social media defenses – Keep your eyes and ears open

Who Should Attend?

  • Marketing and sales staff
  • Company staff that handles company’s social media handles, including customer service agents
  • All members of staff who maintain personal social media accounts
  • IT security staff who need to expand their understanding of their attack surface

Why emPower

100s of customers

  • 14+ Years of experience in working with small to large businesses from different industries
  • 95% customer retention

Customer Experience

  • 24x7 dedicated support and toll free number
  • 99%+ guaranteed uptime

Extremely Cost-effective

  • As low as $0.99/user/yr
  • We will match or better the price of your current LMS

Effective Courses

  • Each course is 20-40 min long to ensure engagement with quizzes and certificate
  • SCORM 1.2 Compliant


  • No setup costs
  • We deploy your customized solution in less than 48 hours

Our Achievements

Here you can review some statistics about our Education Center

Individual Users

Start Your Certification Course Today

Harassment is a legal offense, managers and supervisors must identify behaviors that need to be recorded as harassment. As you go through the sexual harassment training – in New York, you’ll learn about different types of sexual harassment. At the workplace, you can classify most harassment into one of the three categories listed below.

  1. Verbal Harassment

    Verbal harassment covers verbal misconduct that is offensive and derogatory. Jokes, slurs, name-calling, and insults that intend to be demeaning and abusive are forms of verbal harassment.

  2. Physical Harassment

    Unwanted touching, lewd gestures, and making sexually suggestive gestures are forms of physical harassment. Harassment becomes physical when the victim is touched appropriately.

  3. Non-Verbal Harassment

    Examples of non-verbal harassment include physical conduct such as blocking or cornering a person or staring or winking at them. Display of sexually suggestive printed material is also a form of such harassment.