Effective End User Training

Author: Brian Rhodes, Published on Apr 23, 2012

Properly coordinating end user training is a key consideration of successful projects. It is important to recognize that a world class system installed in a flawless manner can be perceived as second rate if the end user is not adequately instructed on its proper use. Future expansion of that system hinges on end user satisfaction, and the correlation between proper training and satisfaction cannot be understated. In this note, we address the importance of end user training done right.

Overview

The integrator should make sure that all users of the surveillance system are identified before training begins. The customer and the integrator should understand beforehand on who should be trained and to what degree.

Many integrators will keep on returning for additional and repeated training  until the end users master the systems. However, adding several unplanned intervals to fit in overlooked personell is expensive.

Keys to Successful User Training

  • Consider separate training for different groups
  • Schedule training beforehand
  • Develop and circulate training agendas
  • Train using enduser's actual system
  • Keep things simple
  • Leave a cheatsheet behind

Consider separate training for different groups: If many different individuals or types of users need to be trained, consider breaking sessions apart into specific groups. For instance, managers, security guards and investigators will use the systems in different ways, often focusing on different aspects of the system. 

Schedule training beforehand: Instead of rushing thorough a quick overview of functions, and training end users one or two at a time,  schedule a formal training session with the enduser. Work with the enduser to schedule a dedicated time where users are not distracted with other work.

Develop and circulate training agendas: Printing a training agenda is important. Giving the end user a document listing training scope serves to tie everything together, but it also helps to prevent forgetting to train important functions. The agenda can be kept by the integrator as 'proof' that a certain function or feature was addressed, and used to keep notes by the enduser during the course of training.

Train using enduser's actual system: Where possible, train operators on system use of their specific system, not just a general demonstration system. End user trainees with learn key features and operations more quickly if they can 'see' how it applies to their own environment. Not only will interest be higher, but finer operation details stand a better chance of being remembered.

Keep things simple: Avoiding training sessions that cover too much ground is vitally important. Training sessions should be kept short, and should emphasize actual end-user operation of the system. Trying to cram too much technical detail into too short  a period is a common pitfall of user training. Especially if end user operators are new or inexperienced operators, keeping the training agenda simple to just the fundamental features and functions is critically important.

Leave a cheatsheet behind: Even the best training will not guarantee all users remember every function. This is especially important for those who only use the surveillance system infrequently. Putting together a one page 'cheatsheet' with key functionality (like how to do a search, export video, etc.) can be very helpful. Make sure to customize it for the user's specific needs (e.g., if they are a bank, focus on searching for ATM transactions rather than generic instructions).

Conclusion

It is too easy to discount the importance of effective end user training, but if handled properly can lead to future sales and system expansion. Instead of rushing through an quick overview of operating a system, the integrator should take time to formulate an effective training plan. Not only will the training having more impact, the end user's increased satisfaction strengthens the integrator relationship.

Comments : PRO Members only. Login. or Join.

Related Reports on End Users

Anixter Acquires 'PSIM Platform Inner Range - "Heart of Our Technology Differentiation" on Apr 30, 2018
Anixter Security has made a bold move, acquiring what it calls a PSIM platform as part of a $150 million deal, with Anixter's CEO Bob...
Key Control For Access Control Tutorial on Apr 16, 2018
End users spend thousands on advanced systems to keep themselves secure, but regularly neglect one of the lest expensive yet most important aspects...
GDPR For Video Surveillance Guide on Apr 12, 2018
The European Union’s General Data Protection Regulation (GDPR) comes into force on May 25, but there is much confusion and no clear guidelines on...
VMS New Developments Spring 2018 (Avigilon, Exacqvision, Genetec, Hikvision, Milestone, Network Optix) on Apr 04, 2018
What's new with VMS software? In this report, we examine new features and releases for Spring 2018 to track different areas of potential...
Brivo 'Buy Now' Online Campaign on Mar 26, 2018
Brivo has a new marketing campaign running across the web: Are you ready to buy access control now? Brivo tells IPVM this is a new campaign,...
If You Have 4 Cameras, You Can Throw Them Away, If You Have 400, They Throw You Away on Jan 19, 2018
Do users care about anything but price? Do user care about cybersecurity? Do users care about trusting their supplier? These have become...
Anixter End User Sales Troubles on Oct 23, 2017
End user sales have and continue to be a major problem for Anixter's physical security business. Every year, according to various Anixter people,...
Buy From B&H, Ship Direct From ADI on Oct 16, 2017
B&H, one of the largest online sellers of video surveillance equipment to end users, regularly purchases their video surveillance equipment...
Hikvision USA Hires VP of Business Development on Jul 05, 2017
Hikvision USA is expanding again, this time in its drive to move up market to larger integrators and end users. In this note, we analyze...
ADI's 'Elves' Selling Direct on Amazon on May 15, 2017
Buy from Amazon, get delivery from ADI. What? Recently, we bought a part from Amazon and the shipment came from ADI. We dug into the...

Most Recent Industry Reports

Software Only VMS vs NVR Appliances on May 23, 2018
Should you buy your own PC/server and load VMS software on it or get a turnkey appliance (both hardware and software, e.g., NVR, Hybrid DVR) from a...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact