About the program

In order to help them in organizing their management and communication (internal and external) processes, modern companies use a set of tools (hardware and software), some of which are general and may be used in all kinds of companies, and some are specific i.e. related to the work field of the company in question.

The training aims to introduce participants to the most important tools that modern companies need in their daily working cycle and to train them to install, configure and monitor these tools.

Curriculum

The training duration: 30 hours divided into 5 modules

1- Telephone exchanges (PBX)

A private branch exchange (PBX) is a private telephone network used within a company or organization. It operates the company/organization’s internal telephone network and manages the routing and advanced calling features for inbound and outbound calls.

The objective of this module is to install a PBX system and to configure different types of operations and services it offered.

  1. The principle of operation of telephone exchanges, their uses, applications and development
  2. Types of switches found in the market and a comparison between them
  3. Planning a telephone network inside a building/establishment
  4. Identifying the types of telephone (Analog & Digital) and VoIP, the differences between them and the way to communicate them with practical application
  5. Identifying the types of trunks (analog, IP) lines and the way to connect them to the PBX
  6. Settings and programming a PBX (date, time, numbering rules and internal phone numbers, night mode, service queues, external line dial restrictions, ringing groups, programming of soft keys, speed dial, recording a welcome message, auto-responder options
  7. PBX programming and reports

2- Security alarm systems

The training aims at teaching how to install a professional security system for home or business. It also provides the ability to control the security system remotely from mobile devices (phone, tablet), or computers.

  1. Fundamental concepts of security
  2. Introduction to intruder alarms and detector types and uses
  3. Alarm system functions
  4. Perimeter and interior detection, output devices
  5. Installation of burglar alarm components

3- Electronic access control

Electronic access control (EAC) is the technology used to provide and deny physical or virtual access to a physical or virtual space. That space can be the building itself, the main distribution frame (MDF), or an executive suite. EAC includes technology from the traditional magnetic stripe card to the latest in biometrics.

  1. Understand the fundamental elements that make up an Access Control System
  2. Fit the principal components of a stand-alone system and networked systems
  3. Connect and program a card, keypad and proximity stand-alone system
  4. Effectively connect up, test and fault-find system elements

4- Attendance management systems

Managing the attendance of employees is one of the significant responsibilities in HR operations. Attendance management system (AMS) keeps track of the employees’ hours within a given establishment/organization. It allows to document the arrival and departure times of the employees. Modern attendance management systems use online software specifically designed to record the attendance of an employee in real-time, manage leaves, and generate multiple reports.

  1. Introduce attendance and absence management and its importance for the operation of an organization
  2. Traditional/manual attendance management systems versus modern/automated ones
  3. Components of a software-based AMS
  4. How to choose the best suitable AMS for a given establishment/organization?

5- Surveillance systems

Surveillance using CCTV cameras is common in many areas around the world. For example, in recent years, the use of body-worn video cameras has been introduced as a new form of surveillance.

In industrial facilities also, CCTV equipment can be used to monitor operational parts of a central control room, for example when the environment is not suitable for humans, CCTV systems may operate continuously or only as needed to monitor a specific event using DVRs and recording for potentially many years, with a variety of quality and performance options and additional features (such as motion detection and email alerts).

  1. Learn the basic concepts of the field of surveillance cameras
  2. Learn how to conduct a technical and engineering inspection
  3. Study how to design networks for cameras
  4. Identify all types of surveillance cameras (internal, external, hidden, and mobile)
  5. Install and setup of cameras (indoor, outdoor, hidden, and mobile)
  6. Introduction to closed circuit TV