Categories
Information Technology
Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.
- Template
Comprehensive CCTV System Audit Checklist
This comprehensive CCTV system audit checklist helps councils and facility teams assess the effectiveness and compliance of surveillance systems. Review system overview, security of equipment, monitoring and usability, and compatibility with platforms. Verify legal obligations including signage and footage retention. Capture NVR and DVR details, camera inventory and locations, and note operational status. Evaluate integration potential, networking back to the administration center, and estimated costs. Conclude on fitness for purpose and next steps.
by Allan Wilson, from the CommunityDownloads: 20+Get - Template
Evidence of Work Completed Audit Template
Use this TFSNZ Evidence of Work Completed audit template to record proof that a task or project has been finished. Capture customer or project lead, job number, date, preparer, work location, comments, and attach clear photos covering all areas completed. Ideal for ICT and field service teams to support handover, quality assurance, and client sign off. This checklist helps standardize documentation across jobs and provides a reliable record for compliance, billing, and warranty purposes.
by Rowan Hill, from the CommunityDownloads: 20+Get - Template
Gap IT Cab Rewire Project Scope and Audit
Use this IT cabinet rewire checklist to plan, execute, and audit cabling work in network racks. Capture before and after photos, confirm router activity lights, run and record ping tests for each device, verify C13 C14 and UK PDUs, confirm UPS and wall power paths, document rack shelf placement and device repositioning, complete repatching, and validate cabling and labeling. Add feedback on securing the cabinet and record additional notes. The result is a clear scope of work, change record, and handover documentation for stakeholders.
by Shujaat Khan, from the CommunityDownloads: 20+Get - Template
GDPR Data Breach Reporting Checklist
This GDPR data breaches checklist helps teams identify and respond to personal data incidents. Capture the department and representative, document breach details and real examples, determine who to notify, and meet the 72 hour reporting requirement. Record the information to include in a report, clarify roles and escalation paths, and understand potential fines. Use this as a training and audit aid to reinforce GDPR awareness and compliance across the organization.
by Connor Barnett, from the CommunityDownloads: 20+Get - Template
Computer Maintenance Checklist
This Computer Maintenance Checklist helps IT professionals and managers keep computers running reliably. It covers hardware care such as cleaning peripherals, organizing and inspecting cables, and flagging parts for repair or replacement. Software tasks include operating system updates, clearing browser files, and managing startup programs. Security steps guide teams to update antivirus, run full scans, and use anti malware tools. General upkeep includes disk cleanup, defragmentation, emptying the recycle bin, uninstalling unused programs, and system reboot. The checklist also provides space for comments, recommendations, and sign off to document each maintenance session.
by Abdallah Ndiaye, from the CommunityDownloads: 20+Get - Template
Site Plant Check Template
This site plant check template supports routine walk arounds of a data center. It guides operators to confirm the operations office is in a workable state and that BMS and PMS show no unknown alarms. It covers LV and HV switch rooms, carrier rooms, CRAC and CRAH cooling equipment, Vesda fire detection, AHU and humidifiers, UV filter rooms, water booster sets, generator switchgear and generator rooms, UPS rooms and battery rooms, cooling galleries, and data halls. The checklist prompts for alarm status, leaks, environmental abnormalities such as smell or noise, cabinet locks, housekeeping standards, and final sign off after returning systems to normal monitoring.
by Virtus ICT, from the CommunityDownloads: 20+Get - Template
Hodnocení projektu a instalace
Praktická šablona pro hodnocení projektu a instalace AV/ICT včetně kontroly přípravy (PIP, PD2), průběhu realizace a kvality montáže. Pokrývá projekci, interaktivní tabule, řídicí systém, audio, teleprezenci a videokonference, kamery a vizualizéry, digital signage, připojná místa, kabeláž a rack, silnoproud, firemní standardy na pracovišti a BOZP. Obsahuje sekce pro práci subdodavatelů, zpětnou vazbu klienta a návrhy na zlepšení. Po dokončení zahrnuje dokumentaci skutečného stavu (PD3), systémový test, předávací protokol, nastavení vzdálené správy a fotodokumentaci. Vhodné pro týmy ICT a AV integrátory.
by Tomas Volf, from the CommunityDownloads: 20+Get - Template
Supervisión de Servicio de Sistemas
Lista de verificación en español para la supervisión del servicio de sistemas en tienda. Cubre equipos de comunicación, cómputo y videovigilancia, así como calidad de energía. Incluye comprobaciones de limpieza y orden del cableado, operación de UPS y protectores, mediciones de voltaje entre 110 y 120, y validación de tierra física entre 0 y 5 ohms, con evidencia fotográfica. Añade tareas para actualizar inventarios de activos y accesorios (routers, servidores, miniprinter térmica, escáner, cajón de dinero, CCTV, UPS, monitores, switches y más) y registrar la calificación de la tienda y el estado del rack.
by Victor Ramirez, from the CommunityDownloads: 20+Get - Template
Cyber Security Checklist for IT Teams
This cyber security checklist helps IT teams assess and record the status of key security controls across people, physical facilities, accounts and passwords, and sensitive data protection. It covers laptop and workstation security, access control, visitor management, screen locking, encryption, data retention, disposal of media, and PCI and privacy practices. It also guides disaster recovery and business continuity planning, incident communication, and regular training and awareness. Use it to audit compliance with policies and standards, identify gaps, and strengthen your organization’s security posture.
by Omar Sherif, from the CommunityDownloads: 20+Get - Template
Cyber Safety Checklist for End Users
Use this cyber safety checklist to train end users on essential security habits. Topics include recognizing phishing and scams, creating strong passwords and using MFA, safe browsing and handling pop ups, identifying secure sites with HTTPS and lock icons, understanding cookies, protecting devices with antivirus and firewalls, keeping systems updated, using VPN on untrusted networks, choosing safer online payment methods, and avoiding risks on public Wi Fi. Help reduce incidents and build a culture of cyber awareness.
by chanchal jha, from the CommunityDownloads: 20+Get - Template
Network Equipment Room Assessment Checklist
This Network Equipment Room assessment checklist guides technicians through a thorough review of NER conditions and adjacent telecom, UPS, and fire life safety rooms. It covers room security and access controls, perimeter integrity and fire stopping, environmental checks for temperature, humidity, leaks, and lighting, and verification of cooling systems. It includes audits of fire protection, UPS backup power and alarms, equipment stability and seismic bracing, storage compliance, and housekeeping. Detailed sections evaluate racks and cabinets, grounding and bonding, wall fields, cabling practices, and documentation of a complete room drawing with dimensions, equipment locations, and safety systems. The process emphasizes photo evidence, remediation notes, and final sign off.
by Daniel Mohs, from the CommunityDownloads: 20+Get - Template
Access Control Service Report
Use this access control service report template to document inspections and maintenance of doors, locks, readers, exit devices and safety hardware. Record door condition, lock type, reader in and out, request to exit, emergency door release, safety beams and e-stop. Verify door operation, closer performance, mounting security and card validation. Capture power supply details including voltage, current, battery size, quantity and dates, and perform charge and load tests. Log controller models such as Gallagher, Tecom and Concept, check supply voltage, hardware mounting and terminations. Add failed items, results, technician comments and sign-off to maintain secure, compliant sites.
by Daniel McSweeney, from the CommunityDownloads: 20+Get - Template
Dynamic Field for PL V3.1
This public template demonstrates dynamic fields in SafetyCulture, including nested sections, smart fields, drawings, and conditional items. Use it to prototype question logic, test data capture behavior, and understand how dynamic components behave across a full inspection workflow. Ideal for learning and designing flexible checklists.
by Aleksandr Chistiakov, from the CommunityDownloads: 20+Get - Template
Auditoria Interna ISO 27001:2022
Este checklist de Auditoria Interna ISO 27001:2022 ajuda a avaliar a conformidade do Sistema de Gestão de Segurança da Informação. Abrange contexto da organização, liderança, planejamento, apoio, operação, avaliação de desempenho e melhoria, além dos controles do Anexo A, como gestão de acesso, identidade, incidentes, fornecedores, nuvem, criptografia, vulnerabilidades, continuidade de negócios e privacidade. Use-o para registrar constatações, não conformidades, pontos de preocupação e oportunidades de melhoria, evidências documentadas e acompanhar ações corretivas durante todo o ciclo de auditoria.
by Fernando Manuel Cabral Fonseca, from the CommunityDownloads: 20+Get - Course
Yapay Zeka Çağında İnsan Haklarını Savunmak
Sosyal medya, navigasyon uygulaması veya fotoğraf filtresi kullanırken yapay zekanın sizi etkilemiş olması mümkündür. Yapay zekadan etkilenen sadece siz değilsiniz - Yapay zeka aynı zamanda insan haklarını da dünya çapında etkiliyor ve bu kurs, haklarınızın yapay zekadan nasıl etkilendiği ve bu hakları korumak için nasıl yetkilendirilebileceğiniz konusunda sizi bilgilendirecek ve eğitecektir. UNESCO ve UNITAR ortaklığıyla, 16 ila 24 yaş arası gençler için Yapay Zeka ve İnsan Hakları üzerine yeni, kısa bir online öğrenme kursu düzenlendi. Uzmanlar, yapay zeka hakkındaki karmaşık kavramları, günlük teknolojik etkileşimlerimiz etrafında oluşturulan basit faaliyetlere ayırır. Kurs, yapay zeka kullanılarak ifade özgürlüğünün, mahremiyet ve eşitlik hakkının nasıl etkilendiğine odaklanacaktır.
by UNESCOGet9 LessonsDownloads: 10+ - Course
Obrona praw człowieka w dobie sztucznej inteligencji
Jeśli korzystałeś_aś z mediów społecznościowych, nawigacji czy filtrów do zdjęć, istnieje prawdopodobieństwo, że sztuczna inteligencja (AI) wpłynęła na Ciebie. Co więcej, nie chodzi tylko o Ciebie - sztuczna inteligencja ma wpływ na prawa człowieka na całym świecie, a dzięki temu kursowi dowiesz i nauczysz się, w jaki sposób sztuczna inteligencja wpływa na Twoje prawa i jak możesz je chronić. UNESCO i UNITAR wspólnie uruchomiły nowy, krótki kurs edukacyjny online na temat sztucznej inteligencji i praw człowieka dla młodzieży w wieku od 16 do 24 lat. Eksperci dzielą złożone koncepcje dotyczące sztucznej inteligencji na proste działania oparte na naszych codziennych interakcjach z technologiami. Kurs koncentruje się na tym, jak sztuczna inteligencja wpływa na wolność słowa, prawo do prywatności i prawo do równości.
by UNESCOGet9 LessonsDownloads: 10+ - Course
在人工智能时代捍卫人权
无论你是否使用过社交媒体, 导航应用程序或是图片过滤器, 人工智能 (AI) 都很有可能影响到你. 不仅仅是你, 人工智能正在影响全世界的人权. 本课程将给予你关于人工智能的基本知识, 让你了解你的人权如何受其影响, 以及如何赋予你保护这些权利的能力. 联合国教科文组织 (UNESCO) 和联合国训练研究所 (UNITAR) 携手为16至24岁的青年们推出了一个新的关于人工智能和人权的在线学习小课程. 专家们将关于人工智能的复杂概念分解为围绕我们日常技术互动的课程活动. 该课程侧重于使用人工智能会如何影响言论自由, 隐私权和平等权.
by UNESCOGet9 LessonsDownloads: 10+ - Course
Захист прав людини в епоху штучного інтелекту
Незалежно від того, чи користувалися ви соціальними мережами, навігаційним додатком або фільтром для фото, Штучний Інтелект (ШІ) міг вплинути на вас. Цей короткий онлайн-курс від ЮНЕСКО та ЮНІТАР для молоді 16-24 років пояснює, як ШІ впливає на свободу слова, право на приватність і рівність. Експерти простими прикладами, заснованими на щоденних технологічних взаємодіях, розкривають складні концепти ШІ. Курс дає знання та інструменти, щоб захистити ваші права у цифровому світі.
by UNESCOGet9 LessonsDownloads: 10+ - Template
Formulario de encuesta y análisis de necesidades
Utilice esta plantilla en español para realizar una encuesta y análisis de necesidades de salas AV y espacios de reunión. Registre el tipo de sala (junta, formación, auditorio, aula), condiciones de paredes, techo y suelo, dimensiones y planos. Documente preferencias de visualización, fuentes de video, requisitos de videoconferencia (CÓDEC, compartición de contenido), sistemas de audio y micrófonos, así como puertos y conectividad (HDMI, VGA, inalámbrico). Incluye campos para componentes existentes, listas de materiales y notas de instalación, ayudando a equipos de TI/AV a planificar e integrar soluciones de forma fiable.
by SafetyCultureDownloads: 10+Get - Template
Computer Equipment Security Checklist - Loss Prevention Standards
Certain items of computer equipment are generally considered theft-attractive and are essential to the operations of most businesses. This document provides guidance to organisations on issues to consider when implementing security arrangements for this type of equipment. Aviva is one of the largest UK insurance brands and a leading savings and retirement business with more than 320 years of heritage. Aviva Risk Management Solutions helps you to look at risks that arise in your place of work and put into action customised measures to control them.
by Aviva UKDownloads: 10+Get - Course
Odbrana ljudskih prava u doba vještačke inteligencije
Bilo da ste koristili društvene mreže, navigaciju ili filter za fotografije, velike su šanse da je umjetna inteligencija (AI) utjecala na vas. Nije samo do Vas – AI utiče na ljudska prava širom svijeta, a ovaj kurs će vas informisati i obrazovati o tome kako vještačka inteligencija utiče na vaša prava i kako možete da štitite ta prava. UNESCO i UNITAR zajednički su pokrenuli novi, kratki online kurs učenja o AI i ljudskim pravima za mlade od 16 do 24 godine. Stručnjaci razlažu složene koncepte o AI u direktne aktivnosti izgrađene na našim svakodnevnim tehnološkim interakcijama. Kurs se fokusira na uticaje AI na slobodu izražavanja, pravo na privatnost i pravo na jednakost.
by UNESCOGet9 LessonsDownloads: 10+ - Course
Defensant els drets humans a l'era de la intelligència artificial
Tant si has utilitzat xarxes socials, una aplicació de navegació o un filtre d'imatge, és probable que la intelligència artificial (IA) t' hagi afectat. No ets només tu- la IA està afectant els drets humans a tot el món, i aquest curs t'informarà i et formarà sobre com la IA afecta els teus drets i com pots empoderar-te per protegir aquests drets. La UNESCO i UNITAR han creat conjuntament un nou curs d'aprenentatge en línia sobre IA i els drets humans per a joves de 16 a 24 anys. Els experts desglossen conceptes complexos sobre la IA en activitats senzilles construïdes al voltant de les nostres interaccions tecnològiques diàries. El curs se centra en com la IA afecta la llibertat d'expressió, el dret a la privadesa i el dret a la igualtat.
by UNESCOGet9 LessonsDownloads: 10+ - Template
Liste de contrôle de la gestion des incidents
Ce modèle de gestion des incidents guide chaque étape d’une réponse organisée: préparation et réponse à la menace, détection et évaluation, activation de l’équipe et du centre de crise, définition des priorités et objectifs de reprise, mise en œuvre du plan, audit et conformité. Il couvre les fonctions clés (communication, santé et sécurité, installations, finance, RH, assurance, TI, juridique, achats, dossiers, sécurité et transport) et le suivi post-incident.
by SafetyCultureDownloads: 10+Get - Template
Sensors Site Audit Template
Plan sensor installations with this site audit template. Document power availability, Ethernet or cellular connectivity, mobile dead spots, signal strength and distances to gateways. Capture photos of proposed locations and obstacles, and record operating temperature ranges for each asset. Use the results to scope a fit-for-purpose IoT solution and receive an accurate quote.
by SafetyCultureDownloads: 10+Get
