🚀 Launch Special: $29/mo for life --d --h --m --s Claim Your Price →
Coming Soon
Expected availability announced soon

This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.

Notify me
Security Awareness Coming Soon

SA Remote Work Security

The Remote Work Security Awareness course teaches employees how to protect corporate data by securing home networks, using VPNs, safeguarding visual privacy, managing video‑conferencing risks, and securing devices at home or while traveling.

Who Should Take This

It is intended for full‑time remote staff, hybrid workers, and occasional telecommuters across all business functions who handle sensitive information. These learners typically have basic technical familiarity and need practical guidance to make secure decisions in non‑office environments, whether at home or on the road.

What's Included in AccelaStudy® AI

Adaptive Knowledge Graph
Practice Questions
Lesson Modules
Console Simulator Labs
Exam Tips & Strategy
20 Activity Formats

Course Outline

62 learning goals
1 Home Network Security
2 topics

Router and Wi-Fi security

  • Recognize the importance of changing default router admin credentials and why factory-default usernames and passwords make home networks vulnerable to attack.
  • Describe the difference between WPA2 and WPA3 encryption for home Wi-Fi and explain why WEP and open networks are unacceptable for remote work.
  • Explain the benefits of creating a separate Wi-Fi network or VLAN for work devices, isolating them from IoT devices, guest access, and family computers.
  • Identify the importance of keeping router firmware updated and how outdated firmware with known vulnerabilities can be exploited to intercept network traffic.
  • Describe the risks of using ISP-provided routers with default configurations and why employees should verify security settings when setting up a home office.
  • Explain how DNS-based security filtering at the router level can block connections to known malicious websites and provide an additional layer of protection for home networks.

Home network hygiene

  • Recognize the security risks of smart home devices (cameras, speakers, thermostats) on the same network as work devices and how compromised IoT devices can be attack vectors.
  • Describe safe practices for managing guest Wi-Fi access, including using separate passwords, enabling network isolation, and monitoring connected devices.
  • Explain why disabling remote management on home routers reduces the attack surface and prevents external access to network configuration.
  • Describe how to identify unknown or unauthorized devices connected to your home network and the steps to take if suspicious devices are discovered.
  • Recognize the security risks of Bluetooth-enabled devices in the home office and describe when Bluetooth should be disabled on work devices to prevent unauthorized pairing.
2 VPN and Secure Connectivity
2 topics

VPN usage and requirements

  • Recognize when the corporate VPN must be activated for remote work, including accessing internal systems, file shares, and intranet resources from home or public networks.
  • Describe how a VPN encrypts network traffic between your device and the corporate network and why this protection is essential on untrusted networks.
  • Explain the risks of split tunneling, where some traffic bypasses the VPN and travels directly over the local network without encryption or corporate security filtering.
  • Identify common VPN connection problems and the correct procedure for troubleshooting, including checking internet connectivity, restarting the VPN client, and contacting IT support.
  • Explain the benefits of always-on VPN configurations that automatically connect to the corporate network whenever the device is online, eliminating the risk of forgetting to activate VPN.
  • Describe the risks of using personal VPN services for work activities and explain why only the corporate VPN should be used for accessing business resources.

Alternative network security

  • Describe when using a mobile hotspot from your phone is more secure than connecting to hotel, airport, or co-working space Wi-Fi networks.
  • Explain the risks of captive portal Wi-Fi networks that require accepting terms or entering credentials on an unencrypted page before VPN can be established.
  • Analyze a remote work connectivity scenario to determine the safest network option considering available choices and the sensitivity of the work being performed.
  • Describe how evil twin Wi-Fi attacks work, where attackers create fake hotspots mimicking legitimate networks, and explain how to verify network authenticity before connecting.
3 Visual Privacy and Shoulder Surfing
2 topics

Screen privacy in public

  • Recognize the risk of shoulder surfing in coffee shops, airports, trains, and co-working spaces where others can read your screen or observe your typing.
  • Describe the use and effectiveness of privacy screen filters that restrict viewing angles and prevent bystanders from reading sensitive information on your display.
  • Identify seating positions and workspace arrangements in public spaces that minimize screen exposure and reduce the risk of visual data theft.
  • Explain why reducing screen brightness, using dark mode, and increasing font sizes sparingly can reduce screen readability from oblique angles.
  • Analyze a remote work scenario where an employee works with confidential data in a busy airport lounge and recommend visual privacy measures based on the environment.
  • Recognize the risks of security cameras in home offices or co-working spaces that may capture screen contents or keyboard inputs during remote work sessions.

Audio privacy

  • Recognize the risk of discussing confidential business matters on phone calls or video conferences in public places where conversations can be overheard.
  • Describe practices for maintaining audio confidentiality, including using headphones, moving to private areas, muting when not speaking, and postponing sensitive calls.
  • Explain the risks of smart speakers and always-on voice assistants in the room during confidential work calls and why they should be disabled or moved.
  • Analyze a scenario where an employee takes a confidential phone call in a hotel lobby and determine the information exposure risks and recommended alternative actions.
4 Video Conferencing and Screen Sharing
2 topics

Secure video conferencing

  • Recognize the security risks of video conferencing from home, including background exposure of personal items, documents on walls, and family member interruptions revealing personal details.
  • Describe secure video conferencing setup practices, including using virtual backgrounds, checking your background before joining, and positioning your camera appropriately.
  • Explain the risks of recording video meetings and why recordings must be stored in approved locations with appropriate access controls rather than personal devices.
  • Explain the risks of joining video meetings from personal devices that may not have corporate security software and proper endpoint protection installed.
  • Recognize the importance of verifying participant identity in video meetings, especially when discussing confidential information, and describe how to challenge unknown attendees.

Screen sharing awareness

  • Recognize the risks of screen sharing, including accidentally exposing desktop notifications, open tabs, bookmarks, personal messages, and other application windows.
  • Describe safe screen sharing practices, including sharing specific application windows instead of the full desktop, closing unnecessary applications, and disabling notifications.
  • Explain why sharing screens with browser tabs open can expose password managers, email contents, and other sensitive information to meeting participants.
  • Analyze a screen sharing incident where sensitive information was accidentally exposed and determine the correct reporting and mitigation steps.
5 Physical Device Security at Home and Travel
2 topics

Device security at home

  • Recognize the importance of securing work devices at home, including locking screens when stepping away, even with family members present.
  • Describe the risks of allowing family members, especially children, to use work devices for personal activities, including accidental file deletion, malware installation, and data exposure.
  • Explain why work devices should be stored securely when not in use, including during home maintenance visits, house parties, and when hosting guests.
  • Identify the proper storage and handling of external storage devices, USB drives, and backup media containing corporate data at home.
  • Describe the procedure for reporting a lost or stolen work device including immediate notification to IT security, remote wipe initiation, and password changes for accessed accounts.
  • Explain why full disk encryption must be enabled on all work devices used at home and how encryption protects data if the device is stolen.

Device security during travel

  • Recognize the increased risk of device theft during travel and identify vulnerable situations, including airports, hotels, conference venues, and public transport.
  • Describe safe device handling practices during travel, including using hotel safes, never leaving devices in checked luggage, and keeping devices in sight at security checkpoints.
  • Explain the security risks of border crossing device inspections and the organization's policy on travel with encrypted devices containing sensitive data.
  • Analyze a travel scenario to determine which devices and data should be brought, what precautions to take, and what to do if a device is lost or stolen during the trip.
  • Describe the risks of using public USB charging stations (juice jacking) and explain why employees should use personal chargers or USB data blockers when traveling.
6 Printing and Document Handling
2 topics

Home printing security

  • Recognize the risks of printing sensitive documents at home, including unsecured printer queues, documents left in output trays, and family member access to printed materials.
  • Describe the organization's policies on printing sensitive documents at home, including which classification levels may be printed and retention requirements.
  • Explain proper disposal methods for printed sensitive documents at home, including cross-cut shredding, and the risks of putting confidential papers in household recycling.
  • Recognize the security risks of cloud-connected home printers that store print jobs and may be accessible from the internet without proper configuration.
  • Describe why sensitive documents should be printed only when absolutely necessary while working remotely and how digital workflows reduce the risk of physical data exposure.

Co-working and shared space security

  • Recognize the unique security challenges of co-working spaces, including shared printers, communal Wi-Fi, unlocked conference rooms, and proximity to unknown individuals.
  • Describe safe practices for using shared printers in co-working spaces, including picking up prints immediately, verifying no sensitive documents are left behind, and avoiding shared USB ports.
  • Explain the importance of using cable locks, locking screens, and taking devices when leaving your workspace in a co-working environment, even briefly.
  • Synthesize remote work security best practices into a comprehensive daily routine covering network security, physical device safety, visual privacy, and document handling.
  • Analyze a co-working space scenario to identify security risks related to shared networks, visible screens, unattended devices, and overhead conversations, and recommend mitigations.
  • Synthesize a travel security checklist covering device preparation, network security, physical device safety, and data handling procedures for business trips.

Scope

Included Topics

  • Remote work security awareness for general corporate employees, covering home network security, router configuration basics, and Wi-Fi password hygiene.
  • VPN usage requirements, split tunneling risks, and always-on VPN benefits for remote workers.
  • Shoulder surfing prevention in public spaces, screen privacy filters, and awareness of surroundings when working outside the office.
  • Secure video conferencing practices, screen sharing awareness, and protecting sensitive content during remote meetings.
  • Physical security of work devices at home and during travel, including secure storage, family member access prevention, and hotel room security.
  • Secure printing practices when working from home, handling printed sensitive documents, and proper disposal outside the office.
  • Co-working space and shared office security, including network isolation, screen visibility, and device unattended protocols.
  • Practical scenario-driven training focused on secure remote work decisions employees face daily.

Not Covered

  • Enterprise VPN server configuration, tunnel protocol selection, or remote access gateway administration.
  • Home network penetration testing, advanced router firmware configuration, or network intrusion detection deployment.
  • Remote desktop infrastructure design, VDI deployment, or terminal server administration.
  • Corporate endpoint management deployment, MDM policy creation, or zero trust network access architecture.
  • Ergonomic workspace design, mental health considerations, or remote work productivity optimization.

SA Remote Work Security is coming soon

Adaptive learning that maps your knowledge and closes your gaps.

Create Free Account to Be Notified