Effective End User Training

By: Brian Rhodes, Published on Apr 23, 2012

Properly coordinating end user training is a key consideration of successful projects. It is important to recognize that a world class system installed in a flawless manner can be perceived as second rate if the end user is not adequately instructed on its proper use. Future expansion of that system hinges on end user satisfaction, and the correlation between proper training and satisfaction cannot be understated. In this note, we address the importance of end user training done right.


The integrator should make sure that all users of the surveillance system are identified before training begins. The customer and the integrator should understand beforehand on who should be trained and to what degree.

Many integrators will keep on returning for additional and repeated training until the end users master the systems. However, adding several unplanned intervals to fit in overlooked personell is expensive.

Keys to Successful User Training

  • Consider separate training for different groups
  • Schedule training beforehand
  • Develop and circulate training agendas
  • Train using enduser's actual system
  • Keep things simple
  • Leave a cheatsheet behind

Consider separate training for different groups: If many different individuals or types of users need to be trained, consider breaking sessions apart into specific groups. For instance, managers, security guards and investigators will use the systems in different ways, often focusing on different aspects of the system.

Schedule training beforehand: Instead of rushing thorough a quick overview of functions, and training end users one or two at a time, schedule a formal training session with the enduser. Work with the enduser to schedule a dedicated time where users are not distracted with other work.

Develop and circulate training agendas: Printing a training agenda is important. Giving the end user a document listing training scope serves to tie everything together, but it also helps to prevent forgetting to train important functions. The agenda can be kept by the integrator as 'proof' that a certain function or feature was addressed, and used to keep notes by the enduser during the course of training.

Train using enduser's actual system: Where possible, train operators on system use of their specific system, not just a general demonstration system. End user trainees with learn key features and operations more quickly if they can 'see' how it applies to their own environment. Not only will interest be higher, but finer operation details stand a better chance of being remembered.

Keep things simple: Avoiding training sessions that cover too much ground is vitally important. Training sessions should be kept short, and should emphasize actual end-user operation of the system. Trying to cram too much technical detail into too short a period is a common pitfall of user training. Especially if end user operators are new or inexperienced operators, keeping the training agenda simple to just the fundamental features and functions is critically important.

Leave a cheatsheet behind: Even the best training will not guarantee all users remember every function. This is especially important for those who only use the surveillance system infrequently. Putting together a one page 'cheatsheet' with key functionality (like how to do a search, export video, etc.) can be very helpful. Make sure to customize it for the user's specific needs (e.g., if they are a bank, focus on searching for ATM transactions rather than generic instructions).


It is too easy to discount the importance of effective end user training, but if handled properly can lead to future sales and system expansion. Instead of rushing through an quick overview of operating a system, the integrator should take time to formulate an effective training plan. Not only will the training having more impact, the end user's increased satisfaction strengthens the integrator relationship.

Comments : PRO Members only. Login. or Join.

Related Reports on End Users

Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
Risk of Amazon Alexa Guard: No Battery Or Cell Backup on Jun 20, 2019
Amazon positions its Alexa Guard Service as a "smart home security system" and says it can help you "keep your home safe". However, the...
Axis Will Not Block Resellers on Jun 10, 2019
While Axis generally has strong favorability amongst integrators, the biggest complaint is their channel model, which results in smaller integrator...
Verkada Favorability Results 2019 on May 29, 2019
Verkada has taken the industry by storm with the fastest growing video surveillance sales organization ever and a half billion dollar valuation....
Aegis AI Gun Detection Video Analytics Startup on May 07, 2019
Gun detection analytic startups are increasing as the promise of AI and the threats of active shooters grow.  One company, Aegis AI, is being led...
Restaurant Security Manager Interview on May 06, 2019
Wright’s Gourmet House in Tampa, Florida has been around for over 50 years. During most of that time, there were no security measures in place. Now...
Ex-Integrator Now Growth Strategist Interviewed on Apr 24, 2019
For more than a decade, Scot MacTaggart was a security integrator (at PA-based PSX). In late 2018, he left the industry. He is now a Growth...
City Physical Security Manager Interview on Mar 14, 2019
This physical security pro is the Physical Security Manager for the City of Calgary. He is a criminologist by training with an ASIS CPP credential....
Prysm PSIM Profile on Mar 05, 2019
A decade ago, PSIM promised significant potential but has always suffered from significant problems. Now, a number of PSIMs have either gone out of...

Most Recent Industry Reports

History of Video Surveillance on Jul 19, 2019
The video surveillance market has changed significantly since 2000, going from VCRs to emerging into an AI cloud era.  The goal of this history...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
New GDPR Guidelines for Video Surveillance Examined on Jul 18, 2019
The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in annual revenue - Hikvision, Dahua, and Axis. Now, Anyvision plans to join...
HD Analog vs IP Guide on Jul 16, 2019
For years, HD resolution and single cable signal/power were IP camera advantages, with analog cameras limited to much lower resolution and...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
ZeroEyes Gun Detection Startup on Jul 16, 2019
A gun detection video analytics startup, ZeroEyes, is being led by a group of 6 former Navy SEALs, aiming to "save lives" by using AI to assist...
Motorola Acquires Watchguard, Adds to Vigilant And Avigilon on Jul 15, 2019
2 years ago, Motorola had no position nor relevancy to video surveillance. Now, they own major video surveillance, LPR and body camera providers...
Hikvision Global News Reports Directory on Jul 15, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact