Course Outline
Introduction to Keyscan Access Control Systems
- Overview of hardware and software components
- System architecture and communication protocols
- Licensing and activation
Installation and Initial Configuration
- Installing Keyscan Aurora software
- System initialization and database setup
- Connecting to Keyscan hardware
User and Access Level Management
- Creating and managing user profiles
- Configuring access levels and schedules
- Assigning credentials (cards, fobs, mobile)
Door and Hardware Configuration
- Setting up doors, readers, and control panels
- Configuring input/output devices
- Advanced door options and security rules
Monitoring and Event Management
- Real-time system monitoring
- Event logging and reporting
- Alarm handling and response procedures
Integration and Advanced Features
- Integration with CCTV, alarms, and building management systems
- Visitor management
- Automation and custom workflows
Troubleshooting and Maintenance
- Common issues and fixes
- Database backup and restore
- System updates and patches
Summary and Next Steps
Requirements
- An understanding of basic access control principles
- Experience with security system installation or management
- Familiarity with Windows operating systems
Audience
- Security system administrators
- IT professionals supporting access control solutions
- Facilities and operations managers
Testimonials (4)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Course - PKI: Implement and Manage
I genuinely enjoyed the great information and content.