CCTV Security Training Course
Closed Circuit Television (CCTV) is a TV system that uses video cameras to transmit signals within a network primarily used for surveillance and security monitoring.
This instructor-led, live training (online or onsite) is aimed at security managers who wish to learn basic to intermediate-level CCTV security surveillance and management skills.
By the end of this training, participants will be able to:
- Familiarize the types of CCTV systems and know their benefits and features.
- Understand cabling and CCTV systems setup requirements.
- Install, configure, and manage CCTV systems.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
- Overview of a CCTV system
- Types of CCTV systems
- Analog vs. IP CCTV systems
System Installation
- Camera hardware installation
- Site plan
- Cabling
- Installing cameras
Set-up and Configuration
- Configuring video recorder
- Setting up CCTV system for remote viewing
- POE switch-powered cameras
- Backing up system recordings
IP CCTV
- IP CCTV features
- video resolution and video compression
- bit rate and frame per second
- WDR vs. BLC
- POE class
- CCTV camera lens types
- IP and IK ratings
Recorder Management and Configuration
- Understanding Network Video Recorder (NVR)
- NVR hard disk or RAID storage
- Calculating storage and bandwidth requirements
- NVR installation walkthrough
- Continuous and scheduled recording
- Motion detection
- Video playback and review
- User account management
Cables and Adapters
- Optical and data cables
- Maximum cable distances
- BNC
- Passive and active balun
- Power source
- Centralized power distribution unit
Troubleshooting
Summary and Next Steps
Requirements
- Basic network cabling and troubleshooting knowledge
- Understanding of LAN and WAN
Audience
- Security managers
Need help picking the right course?
CCTV Security Training Course - Booking
CCTV Security Training Course - Enquiry
CCTV Security - Consultancy Enquiry
Testimonials (1)
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
Upcoming Courses
Related Courses
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.
Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.
The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.
Goal:
The ultimate goal is to pass your CISA examination first time.
Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
Cybersecurity Fundamentals
28 HoursDescription:
Cybersecurity skills are in high demand, as threats continue to plague enterprises around the world. An overwhelming majority of professionals surveyed by ISACA recognise this and plan to work in a position that requires cybersecurity knowledge.
To fill this gap, ISACA has developed the Cybersecurity Fundamentals Certificate, which provides education and verification of skills in this area.
Objectives:
With cybersecurity threats continuing to rise and the shortage of appropriately-equipped security professionals growing worldwide, ISACA's Cybersecurity Fundamentals Certificate programme is the perfect way to quickly train entry-level employees and ensure they have the skills and knowledge they need to successfully operate in the Cyber arena.
Target Audience:
The certificate program is also one of the best ways to gain foundational knowledge in cybersecurity and begin to build your skills and knowledge in this crucial area.
Public Key Infrastructure
21 HoursBuilding up information security according to ISO 27005
21 HoursThis course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
DevOps Security: Creating a DevOps Security Strategy
7 HoursIn this instructor-led, live course in the UK, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
NB-IoT for Developers
7 HoursIn this instructor-led, live training in the UK, participants will learn about the various aspects of NB-IoT (also known as LTE Cat NB1) as they develop and deploy a sample NB-IoT based application.
By the end of this training, participants will be able to:
- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
Network Penetration Testing
35 HoursThis class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Computer Room Security and Maintenance
14 HoursNetwork security begins at the physical level. In this instructor-led, live training in the UK, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
By the end of this training, participants will be able to:
- Assess their organization's security risk, as it relates to computer server rooms.
- Set up control and monitoring systems to restrict physical access to infrastructure.
- Design access policies for different members.
- Effectively communicate security policies with team members.
Security Policy Management
35 HoursThis instructor-led, live training in the UK (online or onsite) is aimed at IT administrators, security coordinators, and compliance managers who wish to identify, evaluate, and implement security policy management methods for their organization.
By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets.
BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
28 HoursWho is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Note: This is the four day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.
BCS Foundation Certificate in Information Security Management Principles (CISMP)
21 HoursWho is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
Anyone who is involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
- How the management of information risk will bring about significant business benefits.
- How to explain and make full use of information risk management terminology.
- How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
- The principles of controls and risk treatment.
- How to present the results in a format which will form the basis of a risk treatment plan.
- The use of information classification schemes.
Open Data Risk Analysis and Management
21 HoursThis instructor-led, live training in the UK (online or onsite) focuses on analyzing the risks of Open Data while reducing vulnerability to disaster or data loss.
By the end of this training, participants will be able to:
- Understand the concepts and benefits of Open Data.
- Identify the different types of data.
- Understand the risks of Open Data and how to mitigate them.
- Learn how to manage Open Data risks and create a contingency plan.
- Implement Open Data risk mitigation strategies to reduce disaster risk.
Open Authentication (OAuth)
7 HoursThis instructor-led, live training in the UK (online or onsite) is aimed at developers and anyone who wishes to learn and use OAuth to provide applications with secure delegated access.
By the end of this training, participants will be able to:
- Learn the fundamentals of OAuth.
- Understand the native applications and their unique security issues when using OAuth.
- Learn and understand the common extensions to the OAuth protocols.
- Integrate with any OAuth authorization server.
Honeywell Security System
14 HoursThis instructor-led, live training in the UK (online or onsite) is aimed at service technicians, system admins, or anyone who wishes to learn proper installation, usage, and management of the Honeywell security system.
By the end of this training, participants will be able to:
- Learn the concepts of the Honeywell security systems and components.
- Properly install and maintain a Honeywell security system.
- Utilize the Honeywell maintenance tools and management suite to control a security system.