There are unique security issues related with working remotely when connected to a corporate environment using public Internet connections. Many of the security vulnerabilities are not well known, nor are the techniques on how to secure such a work environment common knowledge.

This course discusses these security issues in detail, as well as best practices related to working remotely in public locations.

Learning Objectives
  • Explore why working remotely in public locations like hotels, coffee shops, etc presents a different set of security challenges to working in secure office locations. 
  • Identify the precise security vulnerabilities with working from remote locations
  • Discover and learn the best practices for working remotely
Last updated/reviewed: March 18, 2024
25 Reviews (118 ratings)

Reviews

Anonymous Author
The course was good as an introduction to computer security, but I didn't find it helpful in regards to the title (working remotely from public network connections). Basically, the recommendation is "don't". I was expecting more advice in an hour.

5
Anonymous Author
Very informative course and contains helpful ideas to make your information more secure. The explanation of terms was very good and the summary after each lesson was also useful.

5
Member's Profile
Great course. The instructor has explained the technology behind each possible threat or attack especially in a remote working environment. Kudos!!!

5
Anonymous Author
It was like a review as the slides are a little outdated. The information could have been a little more current than 2014.

5
Anonymous Author
Very interesting course and has some key points to be mindful of especially while working in todays virtual world.

4
Member's Profile
Good information but a bit dated, 2014 was the date on the slide but much of the information is still valid

5
Anonymous Author
Interesting and refreshing course. Nothing surprised me. This will be beneficial to performance auditors.

5
Anonymous Author
Excellent course for learning and applying security measures in remote access work situations.

5
Anonymous Author
Program materials were relevant and contributed to the achievement of the learning objectives

5
Member's Profile
This was a good course. Would recommend anyone needing CISA CPE to take this course.

4
Anonymous Author
This course provides an understanding of remote access security concerns and answers.

5
Anonymous Author
Great course on understanding Remote Work in this day. Was a bit hard to follow.

5
Anonymous Author
This was a great course that was presented well. I would recommend it to others.

4
Member's Profile
good refresher on relevant topic --expected a deeper dive into the topic though

5
Anonymous Author
Thanks, great training with updated samples and explanation, thanks.

5
Anonymous Author
A very good basic course in remote computing and best practices.

5
Anonymous Author
Good course that met objectives. Well structured and presented.

4
Member's Profile
Very interesting course, and a good overview.........

4
Member's Profile
Great recap and overview of some IT security risks.

5
Member's Profile
good general information

Anonymous Author
Kinda hard to follow.

5
Anonymous Author
good refresher

4
Member's Profile
great course

5
Member's Profile
Good

5
Member's Profile
Good

Prerequisites
Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to IT Security Issues When Working Remotely From Public Network Connections9:57
Security Issues When Working Remotely
  Related Technology Explained 9:22
  Attack Vectors, Tools and Applications10:04
  Email Spoofing 12:00
  BYOD (Bring Your Own Device) for Managers 4:26
  Methods To Secure Remote Work Sessions 4:40
CONCLUSION
  Course Summary 2:43
Continuous Play
  IT Security Issues When Working Remotely From Public Network Connections53:15
SUPPORTING MATERIALS
  Slides: IT Security Issues When Working Remotely From Public Network ConnectionsPDF
  IT Security Issues When Working Remotely From Public Network Connections Glossary/IndexPDF
REVIEW and TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam