Online Courses Cybersecurity Compliance General Cybersecurity Training Hybrid Working: Information Security

Hybrid Working: Information Security

Created by: Real Projects
5.0 271 views Prime
English
30-Day Money Back Guarantee
Full Lifetime Access
Self-Paced
Finish in
6 mins!
Made for for
Employees
and
Supervisors
Certificate
of Completion
Mobile -
Friendly
Access

What you'll learn

Define information security and hybrid working
Safely move devices between locations
Describe network and device security
Use strong passwords

Description

Hybrid working allows employees to work both from home and the office. This presents new challenges for an organization’s information security.

In this course, we’ll discuss why information is more vulnerable with hybrid working. We’ll learn about some of the ways to keep information secure when moving between locations. Finally, we’ll talk about how to keep devices protected from remote attacks, including using strong passwords.

Author

Real Projects

204 Courses

At Real Projects, we create award-winning eLearning designed to inspire, engage, and empower modern workforces. Our expertly crafted courses cover a wide range of topics, from cybersecurity and leadership to AI and workplace skills—all built to integrate seamlessly with any LMS or LXP. With a focus on innovation and continuous improvement, we deliver learning experiences that drive real performance and growth. Now available on Coggno, our ready-to-go eLearning library makes it easy for organizations to access high-quality, flexible, and impactful training for teams across every industry.

Hybrid Working: Information Security

Hybrid Working: Information Security
Hybrid Working: Information Security
Hybrid working allows employees to work both from home and the office. This presents new challenges for an organization’s information security.

In this course, we’ll discuss why information is more vulnerable with hybrid working. We’ll learn about some of the ways to keep information secure when moving between locations. Finally, we’ll talk about how to keep devices protected from remote attacks, including using strong passwords.

Courses Handpicked for you