Effective End User Training

By: Brian Rhodes, Published on Apr 23, 2012

Properly coordinating end user training is a key consideration of successful projects. It is important to recognize that a world class system installed in a flawless manner can be perceived as second rate if the end user is not adequately instructed on its proper use. Future expansion of that system hinges on end user satisfaction, and the correlation between proper training and satisfaction cannot be understated. In this note, we address the importance of end user training done right.

Overview

The integrator should make sure that all users of the surveillance system are identified before training begins. The customer and the integrator should understand beforehand on who should be trained and to what degree.

Many integrators will keep on returning for additional and repeated training  until the end users master the systems. However, adding several unplanned intervals to fit in overlooked personell is expensive.

Keys to Successful User Training

  • Consider separate training for different groups
  • Schedule training beforehand
  • Develop and circulate training agendas
  • Train using enduser's actual system
  • Keep things simple
  • Leave a cheatsheet behind

Consider separate training for different groups: If many different individuals or types of users need to be trained, consider breaking sessions apart into specific groups. For instance, managers, security guards and investigators will use the systems in different ways, often focusing on different aspects of the system. 

Schedule training beforehand: Instead of rushing thorough a quick overview of functions, and training end users one or two at a time,  schedule a formal training session with the enduser. Work with the enduser to schedule a dedicated time where users are not distracted with other work.

Develop and circulate training agendas: Printing a training agenda is important. Giving the end user a document listing training scope serves to tie everything together, but it also helps to prevent forgetting to train important functions. The agenda can be kept by the integrator as 'proof' that a certain function or feature was addressed, and used to keep notes by the enduser during the course of training.

Train using enduser's actual system: Where possible, train operators on system use of their specific system, not just a general demonstration system. End user trainees with learn key features and operations more quickly if they can 'see' how it applies to their own environment. Not only will interest be higher, but finer operation details stand a better chance of being remembered.

Keep things simple: Avoiding training sessions that cover too much ground is vitally important. Training sessions should be kept short, and should emphasize actual end-user operation of the system. Trying to cram too much technical detail into too short  a period is a common pitfall of user training. Especially if end user operators are new or inexperienced operators, keeping the training agenda simple to just the fundamental features and functions is critically important.

Leave a cheatsheet behind: Even the best training will not guarantee all users remember every function. This is especially important for those who only use the surveillance system infrequently. Putting together a one page 'cheatsheet' with key functionality (like how to do a search, export video, etc.) can be very helpful. Make sure to customize it for the user's specific needs (e.g., if they are a bank, focus on searching for ATM transactions rather than generic instructions).

Conclusion

It is too easy to discount the importance of effective end user training, but if handled properly can lead to future sales and system expansion. Instead of rushing through an quick overview of operating a system, the integrator should take time to formulate an effective training plan. Not only will the training having more impact, the end user's increased satisfaction strengthens the integrator relationship.

Comments : PRO Members only. Login. or Join.

Related Reports on End Users

Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
Risk of Amazon Alexa Guard: No Battery Or Cell Backup on Jun 20, 2019
Amazon positions its Alexa Guard Service as a "smart home security system" and says it can help you "keep your home safe". However, the...
Axis Will Not Block Resellers on Jun 10, 2019
While Axis generally has strong favorability amongst integrators, the biggest complaint is their channel model, which results in smaller integrator...
Verkada Favorability Results 2019 on May 29, 2019
Verkada has taken the industry by storm with the fastest growing video surveillance sales organization ever and a half billion dollar valuation....
Aegis AI Gun Detection Video Analytics Startup on May 07, 2019
Gun detection analytic startups are increasing as the promise of AI and the threats of active shooters grow. One company, Aegis AI, is being led...
Restaurant Security Manager Interview on May 06, 2019
Wright’s Gourmet House in Tampa, Florida has been around for over 50 years. During most of that time, there were no security measures in place. Now...
Ex-Integrator Now Growth Strategist Interviewed on Apr 24, 2019
For more than a decade, Scot MacTaggart was a security integrator (at PA-based PSX). In late 2018, he left the industry. He is now a Growth...
City Physical Security Manager Interview on Mar 14, 2019
This physical security pro is the Physical Security Manager for the City of Calgary. He is a criminologist by training with an ASIS CPP credential....
Prysm PSIM Profile on Mar 05, 2019
A decade ago, PSIM promised significant potential but has always suffered from significant problems. Now, a number of PSIMs have either gone out of...

Most Recent Industry Reports

ONVIF Suspends Huawei on Sep 20, 2019
Huawei has been 'suspended', and effectively expelled, from ONVIF so long as US sanctions remain on the mega Chinese manufacturer. Inside this...
Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Axis Perimeter Defender Improves, Yet Worse Than Dahua and Wyze on Sep 19, 2019
While Axis Perimeter Defender analytics improved from our 2018 testing, the market has improved much faster, with much less expensive offerings...
Directory of 68 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Uniview Prime Series 4K Camera Tested on Sep 18, 2019
Is the new Uniview 'Prime' better than the more expensive existing Uniview 'Pro'? In August, IPVM tested Uniview 4K 'Pro' but members advocated...
US Army Base To Buy Banned Honeywell Surveillance on Sep 17, 2019
The U.S. Army's Fort Gordon, home to their Cyber Center of Excellence, has issued a solicitation to purchase Honeywell products that are US...
Vivotek "Neural Network-Powered Detection Engine" Analytics Tested on Sep 17, 2019
Vivotek has released "a neural network-powered detection engine", named Smart Motion Detection, claiming that "swaying vegetation, vehicles passing...
Schmode is Back, Aims To Turn Boulder AI Into Giant on Sep 16, 2019
One of the most influential and controversial executives in the past decade is back. Bryan Schmode ascended and drove the hypergrowth of Avigilon...
Manufacturers Unhappy With Weak ASIS GSX 2019 And 2020 Shift on Sep 16, 2019
Manufacturers were generally unhappy with ASIS GSX, both for weak 2019 booth traffic and a scheduling shift for the 2020 show, according to a new...