Course Outline
Introduction to ProWatch for Government
- Overview of the system architecture and design
- Detailed breakdown of software and hardware components
- Licensing options and available editions for government use
Installation and Setup for Government
- Procedures for installing ProWatch server and client applications in a government environment
- Steps for database configuration and initialization to ensure secure and efficient operation
- Guidelines for network and hardware connectivity to support seamless integration with existing infrastructure
User and Access Management for Government
- Processes for creating and managing user accounts to enhance security and accountability
- Methods for configuring access permissions and schedules to align with organizational policies
- Procedures for badge and credential management to ensure compliance with government standards
Hardware and Door Configuration for Government
- Instructions for adding and configuring controllers and readers to support secure access control
- Guidance on configuring alarm points and outputs to enhance situational awareness
- Techniques for implementing advanced door logic to meet specific operational requirements
Monitoring and Incident Response for Government
- Features of live monitoring dashboards to support real-time oversight
- Procedures for handling and acknowledging alarms to ensure timely response
- Processes for incident reporting and escalation to maintain operational integrity
Integration Capabilities for Government
- Options for integrating with CCTV and video management systems to enhance security monitoring
- Methods for intrusion detection integration to provide comprehensive threat assessment
- Strategies for third-party application integration to support a unified security ecosystem
Maintenance and Troubleshooting for Government
- Best practices for database maintenance and backups to ensure data integrity and availability
- Techniques for system performance optimization to meet high operational demands
- Common issues and recommended resolutions to minimize downtime and maintain system reliability
Summary and Next Steps for Government
Requirements
- An understanding of enterprise security systems for government
- Experience with access control or building management systems
- Basic networking knowledge
Audience
- Security and access control administrators in government agencies
- IT and network professionals supporting security infrastructure for government entities
- Corporate security consultants working with government organizations
Testimonials (3)
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
Defenitely the 90% HandsOn-Training and the Revisions of the Activities i had to do during the Training. The Traing was intense, due to i was the only member. But i learned a lot and Chris answered every single question i had. I would defenitly recommend this course.
Sebastian - Artweger GmbH und Co KG
Course - Active Directory for Admins
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy