Register Access Control Course Fall 2016

Author: Brian Rhodes, Published on Oct 06, 2016

Register now Fall 2016 Access Control Course.

IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the system, we look at the whole picture - design, operation, maintenance and how all parts of an access system work together.

What the IPVM Access Fundamentals Course Covers

In 12 sessions, we examine the following topics in-depth:

(1) Credential Basics

We start with the most common, but frequently misunderstand access component, teaching you the tradeoffs of iClass vs 125kHz Prox vs 13.56 Mhz vs Smartcards vs DESFire.

(2) Advanced Credentials

In this session, we build on the first class digging deeper into multi-factor authentication, credential vulnerabilities (e.g. the unencrypted but popular 125 kHz cards), and emerging technologies including mobile, BLE and NFC.

(3) Readers

We then teach you how to select readers, explaining Wiegand vs. OSDP, and contrasting the different types, shapes, and technologies behind readers including vulnerabilities and weaknesses like 'prox card snooping', identity spoofing, and keypad PIN 'tells'.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

(4) Controllers

Moving onto controllers, we explain how they coordinate activities at openings, breaking down the differences between IP, hardwired, standalone, proprietary or 'open'. You learn the major controller vendors, their tradeoffs and (in)compatibility.

(5) Management Software

Here you learn the five core elements of access software: 1) Live View, 2) Door Management, 3) Cardholder Management, 4) Reporting and 5) Access Levels & Schedules.

(6) System Operation

Then we pull together the entire system, teaching where decisions are made and key vulnerabilities exist such as tailgating and passback. You learn how to counter those vulnerabilities through door-prop alarms, forced-door events, using multiple credentials, and video surveillance integration.

(7) Life Safety Codes & Building Codes

We teach globally applicable access specific safety laws, including the International Building Code (IBC) and NFPA 101 and NFPA 72. Regardless of where you are located, you will learn which codes apply, who to contact locally for clarity, and how to improve security while keeping people safe at the same time.

(8) Doors, Openings, & Locks

You need to know door hardware to do electronic access control systems. We teach you the core function of doors, frames, opening types, and the electrified hardware options to keep each type locked securely, regardless if they are hollow metal, solid wood, or glass doors. You will learn the security benefits of revolving doors, turnstiles, mantraps, electric locks, and exit devices.

(9) Electric Strikes

Strikes are a core component of access control systems. You learn the strengths, weaknesses, and applications that characterize this lock type. We cover how to choose the 'right strike' for your opening, how to avoid expensive installation mistakes, and where avoiding use of strikes can prevent big problems.

(10) Maglocks

Many simply hate maglocks but you need to know how and when to use them. Often misunderstood, misused, and maybe even illegal, we teach the entire scope of electromagnet lock use in access, including bond ratings, voltage, operation and action types.

(11) Networking & Cabling

You learn the role of cabling types in connecting access devices (e.g., 6 vs 4 vs 2 conductor), and why 'wireless' is different than 'wifi'. You will also learn how overlooked concepts like cabling shielding, drain wire use, and bonding/grounding are critical.

(12) Access System Design

In our capstone session, we pull everything together, describing how to select and use different access components and principles together for the best possible result in writing a specification, designing a new system, or just optimizing the one already in use. We teach you what to look for during the 'job walk', and how best to customize the design for your specific needs.

Who Should and Should NOT Take this Course

Even if you have lots of hands on experience with access control and manufacturer training, you should take this course. It teaches access more broadly and in depth than what regular field work or product specific training provides.

However, if you have no experience with access control, you should not take this course unless you can commit to spending 10 to 15 hours per week studying. We have had many people take this course without experience and do very well, but only if they dedicate sufficient time to studying. You cannot pass this course simply by reading a few hours the night before the exam.

Course Calendar

The Access course will meet live online, starting October 11th, 12 times over 6 weeks (Tuesday and Thursday for 1 hour from 11am ET to 12pm Noon ET).

Here is the schedule / calendar:

Classes Recorded

Additionally, all classes are recorded so you can watch on-demand on-line anytime.

Certification

At the end of classes, you will take a comprehensive final exam. If you pass, you will become IPMVU Access Control certified (see list of IPVM Certified Professionals)

Register Now

The member's price is $299. This covers classes, personal help and certification:

1 report cite this report:

Access Control Book 2016 Released on Apr 18, 2016
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, with 100+ new pages for...
Comments (3): PRO Members only. Login. or Join.

Related Reports

Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Free Online NFPA, IBC, and ADA Codes and Standards on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Selecting Wood Drill Bits For Installers on Nov 29, 2016
Running cables through studs is common for roughing in residential and some older commercial installs. To do this, you will need to drill holes in...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...
Cut Install Time 50% Claims Magdaddy on Nov 21, 2016
Modern commercial buildings frequently use open web steel joists that makes running cabling very challenging. Cables need to be run near to but not...
Massively Strong Maglock (Securitron) on Nov 16, 2016
One of the market's strongest maglocks has a twist: the 4,000 pounds claimed bond power is not purely magnetic. Securitron's hybrid MM15 maglock...
Access Control Markups 2016 on Nov 09, 2016
  Access control markups have remained solid, according to new IPVM integrator survey results. Response Breakdowns We asked...
Favorite Access Control Credentials 2016 on Nov 07, 2016
When it comes to the most popular way to unlock an access controlled door, which credential type holds the favored spot among integrators? The...
Axis Releases Access Credentials - Insecure But Convenient on Nov 02, 2016
Axis continues to build out their own end-to-end 'solution'. The company recently announced a series of credential cards, but instead of a...
Bidding Divisions (08, 26, 27, 28) For Security Systems Guide on Oct 27, 2016
Navigating the world of system specifications and bidding work can be complex and confusing, but a standard format exists, and understanding it...

Most Recent Industry Reports

Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...
XiongMai Master Password List Emailed By Chinese Spammer on Dec 05, 2016
XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites. After pledging to recall cameras...
Hikvision Cloud Security Vulnerability Uncovered on Dec 05, 2016
A security researcher uncovered a critical vulnerability in Hikvision's global cloud servers. This vulnerability allowed an attacker to remotely...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Pelco Favorability Results on Dec 02, 2016
This is the first in a series of studies of manufacturer favorability. 100+ integrators rated and explained their views of each manufacturer. We...
Hikvision CEO Declares 'We Do Not Cut Rates" on Dec 02, 2016
Hikvision has led another press trip to China, and this time Hikvision's CEO is sharing insights into their competitive strategy, including...
Network Security Audit App (March Networks) Examined on Dec 01, 2016
Verifying one's video surveillance devices are locked down against common cybersecurity vulnerabilities is increasing important, as hacks using...
FLIR Acquires Drone Manufacturer For $134M on Dec 01, 2016
FLIR has acquired Prox Dynamics, a Norwegian maker of small military-grade drones, for $134M.  FLIR president Andy Teich provided additional...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact