Course Outline
Introduction to Keyscan Access Control Systems
- Overview of hardware and software components.
- System architecture and communication protocols.
- Licensing and activation processes.
Installation and Initial Configuration
- Installing Keyscan Aurora software.
- System initialization and database setup.
- Connecting to Keyscan hardware.
User and Access Level Management
- Creating and managing user profiles.
- Configuring access levels and schedules.
- Assigning credentials (cards, fobs, mobile).
Door and Hardware Configuration
- Setting up doors, readers, and control panels.
- Configuring input/output devices.
- Advanced door options and security rules.
Monitoring and Event Management
- Real-time system monitoring.
- Event logging and reporting.
- Alarm handling and response procedures.
Integration and Advanced Features
- Integration with CCTV, alarms, and building management systems.
- Visitor management.
- Automation and custom workflows.
Troubleshooting and Maintenance
- Common issues and fixes.
- Database backup and restore.
- System updates and patches.
Summary and Next Steps
Requirements
- Understanding of fundamental access control principles.
- Experience with the installation or management of security systems.
- Familiarity with Windows operating systems.
Audience
- Security system administrators.
- IT professionals supporting access control solutions.
- Facilities and operations managers.
Testimonials (3)
The trainer's practical knowledge and his engaging anecdotes.
Mario Beckel - IABG mbH
Course - Identity and Access Management (IAM)
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
Defenitely the 90% HandsOn-Training and the Revisions of the Activities i had to do during the Training. The Traing was intense, due to i was the only member. But i learned a lot and Chris answered every single question i had. I would defenitly recommend this course.