BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Security.World - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Security.World
X-ORIGINAL-URL:https://security.world
X-WR-CALDESC:Events for Security.World
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20140309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20141102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20150308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20151101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20160313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20161106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20170312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20171105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20180311T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20181104T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20190310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20191103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20200114T100000
DTEND;TZID=America/Los_Angeles:20200114T110000
DTSTAMP:20260418T110837
CREATED:20200106T022318Z
LAST-MODIFIED:20200226T173747Z
UID:500137-1578996000-1578999600@security.world
SUMMARY:Security Convergence in the US\, Europe\, and India: Survey Results
DESCRIPTION:14 January 2020 10:00-11:00ET \nThe ASIS Foundation recently conducted a landmark study on the convergence of physical security\, cybersecurity\, and business continuity. Find out who is converging\, why\, and how. Learn the advantages and drawbacks of convergence\, as well as how factors such as organization size\, geography\, sector\, and culture weigh into the equation.
URL:https://security.world/event/security-convergence-in-the-us-europe-and-india-survey-results/
CATEGORIES:Online Course,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20191205T150000
DTEND;TZID=America/Los_Angeles:20191205T160000
DTSTAMP:20260418T110837
CREATED:20191109T013925Z
LAST-MODIFIED:20191109T013925Z
UID:498544-1575558000-1575561600@security.world
SUMMARY:Situational Awareness and Detecting Pre-Attack Indicator(s)
DESCRIPTION:Situational Awareness requires observation (seeing something)\, but it also requires an interpretation of what has been observed. This interpretation can then allow for the prediction of potential outcomes. The better the observer?s expertise on what has been observed\, the more effective the interpretation and prediction.
URL:https://security.world/event/situational-awareness-and-detecting-pre-attack-indicators/
CATEGORIES:Online Course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20191203T150000
DTEND;TZID=America/Los_Angeles:20191203T160000
DTSTAMP:20260418T110837
CREATED:20191109T014550Z
LAST-MODIFIED:20191109T014550Z
UID:498547-1575385200-1575388800@security.world
SUMMARY:The Importance of Risk Literacy in Security
DESCRIPTION:With the increased importance of finding efficiency in today?s complex and competitive business environment\, the use of a risk-based approach has found its way into nearly all vertical markets. This presentation will explore the positive and negative influences that the application of risk has had on the security industry\, while outlining common fallacies in the integration of risk with the security industry. Understand the importance that proper risk literacy has on aligning security programs to business objectives.
URL:https://security.world/event/the-importance-of-risk-literacy-in-security/
CATEGORIES:Online Course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20191119T150000
DTEND;TZID=America/Los_Angeles:20191119T160000
DTSTAMP:20260418T110837
CREATED:20191109T014736Z
LAST-MODIFIED:20191109T014736Z
UID:498548-1574175600-1574179200@security.world
SUMMARY:Hostile Surveillance Detection Training
DESCRIPTION:We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have a planning cycle which includes conducting hostile surveillance for weeks\, months and even years prior to an attack. This seminar will inform participants on the terrorist planning cycle\, what hostile surveillants look for\, how hostile surveillance is conducted and what preventive security counter measures can be taken to identify hostile surveillance and prevent attacks.
URL:https://security.world/event/hostile-surveillance-detection-training/
CATEGORIES:Online Course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20191113T150000
DTEND;TZID=America/Los_Angeles:20191113T160000
DTSTAMP:20260418T110837
CREATED:20191109T014354Z
LAST-MODIFIED:20191109T014354Z
UID:498546-1573657200-1573660800@security.world
SUMMARY:Leveraging IT for Security: The Evolution of Continuous Assurance\, Automation & Presence Control
DESCRIPTION:Opportunities to mitigate risks inside an organization abound using modernized security technology. While it requires a more comprehensive understanding of IT concepts\, learn about the history of the technology evolution in security and where it is headed. Discuss ways to strengthen the protection of the corporate security system in a changing office environment using continuous assurance and presence control for rapid alerting\, more effective resilience\, while leveraging established technology and security concepts.
URL:https://security.world/event/leveraging-it-for-security-the-evolution-of-continuous-assurance-automation-presence-control/
CATEGORIES:Online Course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20191112T150000
DTEND;TZID=America/Los_Angeles:20191112T160000
DTSTAMP:20260418T110837
CREATED:20191109T015049Z
LAST-MODIFIED:20191109T015049Z
UID:498549-1573570800-1573574400@security.world
SUMMARY:What?s the Big Deal About Recertification?
DESCRIPTION:As an ASIS-certified professional\, you?ve made a commitment to stay current in the field through continuing education activities ? as is required for all accredited certification programs. To maintain your certification\, you are required to recertify your designation every three years by completing 60 CPEs.
URL:https://security.world/event/whats-the-big-deal-about-recertification/
CATEGORIES:Online Course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20191107T150000
DTEND;TZID=America/Los_Angeles:20191107T160000
DTSTAMP:20260418T110837
CREATED:20191109T014212Z
LAST-MODIFIED:20191109T014212Z
UID:498545-1573138800-1573142400@security.world
SUMMARY:Pathway to Violence: Recognize and Identify
DESCRIPTION:How to recognize and identify potential threats in your workplace that precede an attack. This webinar references the Department of Homeland Security?s Pathway to Violence model and applies it to the workplace.
URL:https://security.world/event/pathway-to-violence-recognize-and-identify/
CATEGORIES:Online Course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20180524T193000
DTEND;TZID=America/Los_Angeles:20180524T203000
DTSTAMP:20260418T110837
CREATED:20180511T172337Z
LAST-MODIFIED:20180511T172337Z
UID:459612-1527190200-1527193800@security.world
SUMMARY:TRENDnet's New 2.5G Web Smart Switches
DESCRIPTION:Please join us as we discuss TRENDnet’s new Web Smart 2.5G switches.\nLearn about the technical benefits that 2.5G technology can bring to your network\, and see how they can be used in real world network solutions.\n 24\, 2018 7:30 PM – 8:30 PM IST
URL:https://security.world/event/trendnets-new-2-5g-web-smart-switches/
LOCATION:Webinar
CATEGORIES:Online Course,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160920
DTEND;VALUE=DATE:20160921
DTSTAMP:20260418T110837
CREATED:20160624T073949Z
LAST-MODIFIED:20160712T063924Z
UID:422619-1474329600-1474415999@security.world
SUMMARY:Sophos Advanced Endpoint Security Administrator Webinar
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/sophos-advanced-endpoint-security-administrator-webinar-3/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160913
DTEND;VALUE=DATE:20160914
DTSTAMP:20260418T110837
CREATED:20160624T073839Z
LAST-MODIFIED:20160712T063940Z
UID:422618-1473724800-1473811199@security.world
SUMMARY:Sophos Advanced UTM Administrator Webinar
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/sophos-advanced-utm-administrator-webinar-3/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160907
DTEND;VALUE=DATE:20160908
DTSTAMP:20260418T110837
CREATED:20160624T073725Z
LAST-MODIFIED:20160712T064402Z
UID:422617-1473206400-1473292799@security.world
SUMMARY:Getting Started with Sophos UTM - NA
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/getting-started-with-sophos-utm-na-2/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160823
DTEND;VALUE=DATE:20160824
DTSTAMP:20260418T110837
CREATED:20160624T073603Z
LAST-MODIFIED:20160712T063957Z
UID:422616-1471910400-1471996799@security.world
SUMMARY:Sophos Advanced Endpoint Security Administrator Webinar
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/sophos-advanced-endpoint-security-administrator-webinar-2/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160816
DTEND;VALUE=DATE:20160817
DTSTAMP:20260418T110837
CREATED:20160624T073446Z
LAST-MODIFIED:20160712T064011Z
UID:422615-1471305600-1471391999@security.world
SUMMARY:Sophos Advanced UTM Administrator Webinar
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/sophos-advanced-utm-administrator-webinar-2/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160810
DTEND;VALUE=DATE:20160811
DTSTAMP:20260418T110837
CREATED:20160624T073320Z
LAST-MODIFIED:20160712T064359Z
UID:422614-1470787200-1470873599@security.world
SUMMARY:Getting Started with Sophos UTM - NA
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/getting-started-with-sophos-utm-na/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160719
DTEND;VALUE=DATE:20160720
DTSTAMP:20260418T110837
CREATED:20160624T073154Z
LAST-MODIFIED:20160712T064043Z
UID:422613-1468886400-1468972799@security.world
SUMMARY:Sophos Advanced Endpoint Security Administrator Webinar
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/sophos-advanced-endpoint-security-administrator-webinar/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160712
DTEND;VALUE=DATE:20160713
DTSTAMP:20260418T110837
CREATED:20160624T073008Z
LAST-MODIFIED:20160712T064055Z
UID:422612-1468281600-1468367999@security.world
SUMMARY:Sophos Advanced UTM Administrator Webinar
DESCRIPTION:This webinar provides a administrator-level technical understanding of Sophos UTM\, through Sophos certified course material and live demonstration. \nThis course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. \nThis course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment\, focusing on system configuration and troubleshooting.
URL:https://security.world/event/sophos-advanced-utm-administrator-webinar/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2016/06/sophos-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150714
DTEND;VALUE=DATE:20150715
DTSTAMP:20260418T110837
CREATED:20150624T183655Z
LAST-MODIFIED:20150624T183700Z
UID:380011-1436832000-1436918399@security.world
SUMMARY:CPCP – Little Rock
DESCRIPTION:The
URL:https://security.world/event/cpcp-little-rock/
LOCATION:See Website for More Details
CATEGORIES:Online Course
ORGANIZER;CN="ADI Little Rock":MAILTO:https://www.regonline.com/register/dialogs/sendemail.aspx?EventId=1726336
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150617T020000
DTEND;TZID=America/Los_Angeles:20150617T020000
DTSTAMP:20260418T110837
CREATED:20150618T000107Z
LAST-MODIFIED:20150618T000109Z
UID:378591-1434506400-1434506400@security.world
SUMMARY:Timelock Servicing
DESCRIPTION:This course offers the student an exciting opportunity to learn the skills needed to generate an automotive key.
URL:https://security.world/event/timelock-servicing/
LOCATION:See Website for More Details
CATEGORIES:Online Course,Training
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/06/TimelockServicing.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150513
DTEND;VALUE=DATE:20150514
DTSTAMP:20260418T110837
CREATED:20150514T212844Z
LAST-MODIFIED:20150514T212848Z
UID:366319-1431475200-1431561599@security.world
SUMMARY:Geovision IP Camera Training Course
DESCRIPTION:We are going to introduce an innovative concept for your CCTV business. There are numerous security companies in South Africa and many of them offer their own CCTV products. Some of these companies are selling copy or counterfeit products. Some security companies may not realise that they are selling these products. In order to protect both our business partners and the public from copy and counterfeit products we would like to introduce Geovision Certified Integrator [GCI]. \nGCI stands for Geovision Certified Integrator. This is to improve our dealer?s technical skills and expertise. We feel that offering GCI certificates to out installers will improve the reputation of their company. The certificate will be proof that the holders will be able to provide customers with quality after sales service\, and for the public to verify the authenticity of Geovision hardware and software. \nTo become a dealer partner\, please fill in our dealer application and contact a sales representative at your nearest branch to assist you with registering and introducing our product ranges. Download a Dealer Application. \nOnce you have been registered as a dealer with us\, your next step will be to register your email address on our Online Dealer Shop\, Euroshop Online. On Euroshop Online\, you will be able to download all pricelists\, view all of our products\, their specs and their pricing. you will also be able to place your orders 24/7 where ever you are!.
URL:https://security.world/event/geovision-ip-camera-training-course/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/05/euro.jpg
ORGANIZER;CN="Eurobyte Technology":MAILTO:sales@eurobyte.co.za
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150513
DTEND;VALUE=DATE:20150514
DTSTAMP:20260418T110837
CREATED:20150514T212645Z
LAST-MODIFIED:20150514T212648Z
UID:366121-1431475200-1431561599@security.world
SUMMARY:Video System Technologies ? ONLINE
DESCRIPTION:This 14-hour course\, followed by a two-hour examination\, allows students to acquire the knowledge needed to successfully design and install a basic closed circuit television (CCTV) system.
URL:https://security.world/event/video-system-technologies-online/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/05/ea1.jpg
ORGANIZER;CN="Electronic Security Association":MAILTO:nts@esaweb.org.
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150506
DTEND;VALUE=DATE:20150507
DTSTAMP:20260418T110837
CREATED:20150506T164621Z
LAST-MODIFIED:20160608T020749Z
UID:364408-1430870400-1430956799@security.world
SUMMARY:Understanding Electronic Security Systems
DESCRIPTION:This seven-hour course teaches students the basic elements of the electronic security field including sensors\, control panels and communications\, with an emphasis on the need for an adequate site survey. The course stresses the importance of false alarm prevention and explores the interactions between electronic life safety/security professionals\, law enforcement and fire prevention officials. \nThis is an online training course available 24/7
URL:https://security.world/event/understanding-electronic-security-systems-2/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/05/esa.jpg
ORGANIZER;CN="Electronic Security Association":MAILTO:nts@esaweb.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150429
DTEND;VALUE=DATE:20150430
DTSTAMP:20260418T110837
CREATED:20150430T143516Z
LAST-MODIFIED:20150430T143522Z
UID:362848-1430265600-1430351999@security.world
SUMMARY:Biometric Technology – Online Training Course
DESCRIPTION:You will understand the latest Biometric technology including the definition\, terminologies used\, parameters and basic features.\nYou will learn the principle\, process\, hardware used and issues for the different biometric methods like finger\, facial\, iris\, voice\, hand and retina.\nYou will get to know the different biometric applications. \nThis is an online course available 24/7.
URL:https://security.world/event/biometric-technology-online-training-course/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/04/ase.jpg
ORGANIZER;CN="1st Academy of Security Science Education &amp%3B Training (P) Ltd.":MAILTO: info@1stasset.org 
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150429
DTEND;VALUE=DATE:20150430
DTSTAMP:20260418T110837
CREATED:20150430T143511Z
LAST-MODIFIED:20150430T143516Z
UID:362845-1430265600-1430351999@security.world
SUMMARY:Understanding Electronic Security Systems.
DESCRIPTION:This seven-hour course teaches students the basic elements of the electronic security field including sensors\, control panels and communications\, with an emphasis on the need for an adequate site survey. The course stresses the importance of false alarm prevention and explores the interactions between electronic life safety/security professionals\, law enforcement and fire prevention officials. \nThe course is delivered using a presentation style that is built off the exact same content covered in our instructor led course.
URL:https://security.world/event/understanding-electronic-security-systems/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/04/esa3.jpg
ORGANIZER;CN="Electronic Security Association":MAILTO:nts@esaweb.org.
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150425
DTEND;VALUE=DATE:20150426
DTSTAMP:20260418T110837
CREATED:20150425T171424Z
LAST-MODIFIED:20150425T171429Z
UID:361319-1429920000-1430006399@security.world
SUMMARY:Biometric Technology ? Demystified Online Training Course
DESCRIPTION:You will understand the latest Biometric technology including the definition\, terminologies used\, parameters and basic features.You will learn the principle\, process\, hardware used and issues for the different biometric methods like finger\, facial\, iris\, voice\, hand and retina.You will get to know the different biometric applications. \nThis is an online training course available 24/7.
URL:https://security.world/event/biometric-technology-demystified-online-training-course-2/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/04/aloa3.jpg
ORGANIZER;CN="ASSOCIATED LOCKSMITHS of AMERICA":MAILTO:david@aloa.org 
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150421
DTEND;VALUE=DATE:20150422
DTSTAMP:20260418T110837
CREATED:20150421T160519Z
LAST-MODIFIED:20150421T160525Z
UID:359735-1429574400-1429660799@security.world
SUMMARY:Certified Alarm Technician Level I
DESCRIPTION:The Certified Alarm Technician Level One course is the industry standard for learning all facets of the alarm industry. \nThis course presents an overview of the theory\, installation and maintenance of alarm systems\, basic electricity\, standards\, perimeter detection\, space detection\, fire systems\, control panels\, communications\, CCTV\, job planning\, and false alarm prevention. \nBy the end of this course\, students will have an understanding of the industry and their role within it\, understand the importance of codes and standards and how to locate them and apply them\, be able to define basic installation procedures\, and compare the underlying technology behind the various security system tools and equipment. \nThis is an online training course available 24/7.
URL:https://security.world/event/certified-alarm-technician-level-i/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/04/ESA.jpg
ORGANIZER;CN="Electronic Security Association":MAILTO:nts@esaweb.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150421
DTEND;VALUE=DATE:20150422
DTSTAMP:20260418T110837
CREATED:20150421T160457Z
LAST-MODIFIED:20150421T160503Z
UID:359724-1429574400-1429660799@security.world
SUMMARY:Access Control Systems
DESCRIPTION:Self paced online training with interactive audiovisual content including animations and hands on experience\, Pre test and a Post-test. You can also collaborate with other students through discussion forums and maintain e-mail contact with instructors. \nThis is an online training course available 24/7. \n 
URL:https://security.world/event/access-control-systems/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/04/aloa1.jpg
ORGANIZER;CN="ASSOCIATED LOCKSMITHS of AMERICA":MAILTO:david@aloa.org 
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150418
DTEND;VALUE=DATE:20150419
DTSTAMP:20260418T110837
CREATED:20150420T181109Z
LAST-MODIFIED:20150420T181116Z
UID:358746-1429315200-1429401599@security.world
SUMMARY:CCTV+Digital Video Course
DESCRIPTION:You will learn the key concepts used in CCTV and digital video like lighting\, picture formation\, bandwidth calculation\, camera synchronization etc.\nYou learn the latest technologies used in CCTV like video analytics\, understanding HD\, latest video compression techniques and products like megapixel cameras\nYou will understand the principle\, types\, features\, how to choose\, install and trouble shoot for each CCTV component like cameras\, lenses\, switchers\, transmission systems\, monitors\, CCTV accessories and recording systems.\nYou will get a step-by-step understanding of the CCTV installation process including mounting of equipment\, cabling\, testing & commissioning and maintenance. \nYou will understand the CCTV system design process including CCTV survey and various CCTV applications. \nThis is an online training course available 24/7
URL:https://security.world/event/cctvdigital-video-course/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/04/aloa.jpg
ORGANIZER;CN="ASSOCIATED LOCKSMITHS of AMERICA":MAILTO:david@aloa.org 
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150418
DTEND;VALUE=DATE:20150419
DTSTAMP:20260418T110837
CREATED:20150420T181104Z
LAST-MODIFIED:20150420T181109Z
UID:358743-1429315200-1429401599@security.world
SUMMARY:Samsung Network 101 Training
DESCRIPTION:Samsung Techwin Training gives you the opportunity to attend online courses anywhere in the world at any time. Stay updated on Samsung Techwin product portfolio\, services and solutions. To take the courses below\, you will be guided to register once\, after registrations you are able to use your login credentials to take any courses available.
URL:https://security.world/event/samsung-network-101-training/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/04/SAM.png
ORGANIZER;CN="Samsung Techwin Training":MAILTO:STA.training@samsung.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150418
DTEND;VALUE=DATE:20150419
DTSTAMP:20260418T110837
CREATED:20150420T181058Z
LAST-MODIFIED:20150420T181104Z
UID:358740-1429315200-1429401599@security.world
SUMMARY:Security and Access Control Course
DESCRIPTION:This comprehensive course covers key principles of security detection and protection systems in detail\, including wiring\, contacts and sensors\, components\, fire and safety protection devices\, control options and user interfaces. Access control methods presented include doors and gates\, along with locking mechanisms\, control options and user interfaces. \nThe steps for design and installation are covered with discussion of programming\, testing\, and troubleshooting for both security and access control projects. The course is divided into twelve content sections ? each section ends with a quiz\, and a comprehensive test at the end of the course allows students to demonstrate their newfound knowledge of security and access control systems. \nAfter completion of this course\, students are prepared for hands on\, product specific training in a training center or on a job site. \nThis is an online training course available 24/7. \n 
URL:https://security.world/event/security-and-access-control-course/
CATEGORIES:Online Course
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/04/bed.jpg
ORGANIZER;CN="Bedrock Learning":MAILTO: info@bedrocklearning.com 
END:VEVENT
END:VCALENDAR