Hybrid Working: Information Security
English
30-Day Money Back Guarantee
Full Lifetime Access
Self-Paced
Finish in
6 mins!
Finish in
6 mins!
Made for for
Employees
and
Supervisors
Employees
and
Supervisors
Certificate
of Completion
of Completion
Mobile -
Friendly
Access
Friendly
Access
What you'll learn
Define information security and hybrid working
Safely move devices between locations
Describe network and device security
Use strong passwords
Skills covered in this course
Description
Hybrid working allows employees to work both from home and the office. This presents new challenges for an organization’s information security.
In this course, we’ll discuss why information is more vulnerable with hybrid working. We’ll learn about some of the ways to keep information secure when moving between locations. Finally, we’ll talk about how to keep devices protected from remote attacks, including using strong passwords.
In this course, we’ll discuss why information is more vulnerable with hybrid working. We’ll learn about some of the ways to keep information secure when moving between locations. Finally, we’ll talk about how to keep devices protected from remote attacks, including using strong passwords.
Author
At Real Projects, we create award-winning eLearning designed to inspire, engage, and empower modern workforces. Our expertly crafted courses cover a wide range of topics, from cybersecurity and leadership to AI and workplace skills—all built to integrate seamlessly with any LMS or LXP. With a focus on innovation and continuous improvement, we deliver learning experiences that drive real performance and growth. Now available on Coggno, our ready-to-go eLearning library makes it easy for organizations to access high-quality, flexible, and impactful training for teams across every industry.
Hybrid Working: Information Security
In this course, we’ll discuss why information is more vulnerable with hybrid working. We’ll learn about some of the ways to keep information secure when moving between locations. Finally, we’ll talk about how to keep devices protected from remote attacks, including using strong passwords.