Categories
Information Technology
Browse Information Technology (IT) templates and training courses to support cybersecurity awareness, responsible Artificial Intelligence (AI) use, and hardware and software maintenance. Help your teams stay compliant, manage IT risks, and keep systems running reliably across the workplace.
Browse Information Technology
638 results- Template
Rough Project Scope Template
This Rough Project Scope template helps AV/IT teams quickly define and communicate project intent. Document client and project details, request dates, target completion, estimated and not-to-exceed budgets, and key stakeholders with roles and contact information. Capture on-site contacts and collaboration or huddle space requirements, including group sizes and room usage. Use the structured fields to outline objectives, deliverables, milestones, schedule expectations, constraints, and assumptions so all parties share a clear understanding from kickoff. Ideal for standardizing scoping across AV/IT projects and aligning stakeholders before detailed planning.
by Nicholas Lambert, from the CommunityDownloads: 10+Get - Template
NVR Change Checklist
This NVR change checklist guides engineers through upgrading or replacing a CCTV recording system. Record contract, client, site and location details, complete a dynamic risk assessment, and verify supporting systems. Capture cabinet photographs before and after, and document existing DVR type, number of cameras, PTZ units, and any faults. Specify the new NVR model, serial number, IP address, connected switch IP and port, and serials of interfaces such as ET901. Confirm operational status post install, test to CSC, and note any 240v multiblocks. List redundant equipment removed, attach the WEEE return label, add additional site notes, and obtain engineer and customer signatures for sign off.
by Scott Macaulay, from the CommunityDownloads: 10+Get - Template
VX820 Install Sign Off VX680 to VX820 Upgrade
This installation sign off checklist supports upgrading VX680 payment terminals to the VX820. Record site details along with PTIDs and serial numbers for new and deinstalled PEDs. Document any new PDQ or EPOS switch installations and capture photos of the finished install, connections, and receipts. Confirm all PEDs display READY and complete end to end transaction and refund tests. Note issues for escalation, indicate device collection or storage, and collect engineer and manager sign off.
by IT Dev Team, from the CommunityDownloads: 10+Get - Course
Obrana ljudskih prava u doba umjetne inteligencije
Bilo da ste koristili društvene mreže, aplikaciju za navigaciju ili filter za slike, šanse su da je umjetna inteligencija (u daljnjem tekstu korištenja Al) utjecala na vas. Ne samo na vas- umjetna inteligencija utječe na ljudska prava širom svijeta i ovaj tečaj će vas informirati i naučiti kako su vaša prava izložena Al i kako možete biti osnaženi da branite ta prava. UNESCO i UNITAR su zajedno pokrenuli novi, kratki online edukativni tečaj o umjetnoj inteligenciji i ljudskim pravima za mlade u dobi od 16 do 24 godine. Stručnjaci rastavljaju kompleksne koncepte o umjetnoj inteligenciji u izravne aktivnosti izgrađene oko naše dnevne interakcije s tehnologijom. Tečaj se fokusira na to kako su sloboda izražavanja, pravo na privatnost i pravo na jednakost pod utjecajem umjetne inteligencije.
by UNESCOGet9 LessonsDownloads: 0 - Course
Az emberi jogok védelme a mesterséges intelligencia korában
Akár közösségi médiát, akár navigációs alkalmazást vagy képszűrőt használtál, valószínűleg a mesterséges intelligencia (AL) hatással volt rád. Nemcsak rád - az AI világszerte hatással van az emberi jogokra. Ez a tanfolyam információt és felvilágosítást nyújt arról, hogy a mesterséges intelligencia (AL) milyen hatással van a jogaidra és hogyan tudod azokat érvényesíteni. Az UNESCO és az UNITAR közösen elindított egy új, rövid online tanfolyamot a 16 és 24 év közötti fiatalok számára az AI és a emberi jogok témakörében. A szakértők a mesterséges intelligenciával kapcsolatos összetett fogalmakat a mindennapi technológiai interakcióink köré épülő, egyszerű tevékenységekre bontják le. A kurzus arra összpontosít, hogy az AI hogyan befolyásolja a véleménynyilvánítás szabadságát, a magánélethez és az egyenlőséghez való jogot.
by UNESCOGet9 LessonsDownloads: 0 - Course
Mbrojtja e të Drejtave të Njeriut në Epokën e Inteligjencës Artificiale
Pavarësisht nëse keni përdorur apo jo median sociale, një aplikacion navigimi ose një filtër fotografish, me shumë mundësi inteligjenca artificiale (IA) ka ndikuar tek ju. Nuk jeni vetëm ju - IA po ndikon te të drejtat e njeriut në mbarë botën, dhe ky kurs do t'ju informojë dhe edukojë se si të drejtat tuaja ndikohen nga IA, dhe se si mund të fuqizoheni për t'i mbrojtur këto të drejta. UNESCO dhe UNITAR kanë filluar një kurs online të ri, të shkurtër mbi IA dhe të Drejtat e Njeriut për të rinjtë e moshës nga 16 deri në 24 vjeç. Ekspertët zbërthejnë konceptet komplekse rreth IA në aktivitete të drejtpërdrejta të bazuara në ndërveprimet tona të përditshme teknologjike. Kursi përqëndrohet në mënyrën se si liria e shprehjes, e drejta për privatësi dhe e drejta për barazi ndikohen nga përdorimi IA.
by UNESCOGet9 LessonsDownloads: 0 - Course
Las redes sociales en mi negocio
En este curso vas a aprender cuáles son los tipos de redes sociales y cómo darles el mejor uso posible para sacarles provecho en mi negocio.
by MoveUpGet5 LessonsDownloads: 0 - Course
Защита на правата на човека в ерата на изкуствения интелект
Изкуственият интелект (ИИ) влияе върху правата на човека по целия свят, включително и вашите. Този кратък онлайн курс, създаден от ЮНЕСКО и UNITAR, ще ви запознае с начина, по който ИИ засяга свободата на словото, правото на личен живот и равенството. Чрез прости и практични упражнения, базирани на ежедневните технологии, експерти ще обяснят сложните концепции, свързани с ИИ. Курсът е предназначен за младежи между 16 и 24 години и има за цел да ви даде знания и умения да защитавате вашите права в дигиталната ера.
by UNESCOGet9 LessonsDownloads: 0 - Course
Zaštita ljudskih prava u doba vještačke inteligencije
Bez obzira da li ste koristili društvene mreže, aplikaciju za navigaciju ili filter za fotografije, velika je mogućnost da je vještačka inteligencija (VI) uticala na vas. Ona nije uticala samo na vas, već i na osobe i ljudska prava širom svijeta, a ovaj kurs vam može pomoći da se informišete i edukujete o tome na koji način vještačka inteligencija utiče na vaša prava i na koji način vi možete da štitite svoja prava. UNESKO i UNITAR su zajedno pokrenuli novi, kratki onlajn edukativni kurs o vještačkoj inteligenciji i ljudskim pravima za mlade od 16 do 24. godine. Stručnjaci razlažu složene koncepte o vještačkoj inteligenciji u praktične aktivnosti zasnovana na našim stvakodnevnim tehnološkim interakcijama. Kurs se fokusira na to kako VI utičete na slobodu izražavanja, pravo na privatnost i pravo na jednakost.
by UNESCOGet9 LessonsDownloads: 0 - Course
Inimõiguste kaitse tehisintellekti ajastul
Olenemata sellest, kas oled kasutanud sotsiaalmeediat, kaardirakendust või pildifiltrit, on tõenäoline, et tehisintellekt (AI) on sind mõjutanud. See pole ainult sina – tehisintellekt mõjutab inimõigusi kogu maailmas ning see kursus õpetab sulle, kuidas tehisintellekt sinu õigusi mõjutab ja annab teadmisi, kuidas neid õigusi kaitsta. UNESCO ja UNITAR käivitasid ühiselt uue, 16–24-aastastele noortele mõeldud AI ja inimõiguste teemalise lühikese veebipõhise õppekursuse. Eksperdid esitlevad tehisintellekti käsitlevad keerulised mõisted näidetena meie igapäevasest suhtlusest tehnoloogiaga. Kursusel keskendutakse sellele, kuidas tehisintellekti kasutamine mõjutab sõnavabadust, õigust eraelu puutumatusele ja õigust võrdsusele.
by UNESCOGet9 LessonsDownloads: 0 - Template
Comodato de accesorios con firma digital
Formaliza la entrega y recepción de accesorios de TI con un formato de comodato listo para firma digital. Registra tipo de equipo (mouse, monitor, mochila, módem, teclado y otros), marca, modelo, número de serie e IMEI, así como evidencias fotográficas. Incluye acta de entrega-recepción, políticas de uso, datos del usuario, áreas y unidad de negocio, y firmas de usuario y técnico. Ideal para control de activos, trazabilidad y cumplimiento interno.
by Jose Maria Chavez, from the CommunityDownloads: 0Get - Template
AV karbantartási jegyzőkönyv
Karbantartási jegyzőkönyv terem AV rendszerekhez, amely lépésről lépésre vezeti a funkcionális teszteket és a karbantartási feladatokat. Tartalmazza a teremazonosítást, a vezérlés teljes tesztjét, videokonferencia teszthívást, hangszintek beállítását, kamerák és megjelenítők ellenőrzését, firmware verziók rögzítését. Rögzíthetők az elvégzett munkák, például kijelzők tisztítása, ventilátoros eszközök portalanítása, kábelcsere, kábelcímkék pótlása, firmware frissítés, projektorizzó üzemidő. Fényképek csatolása és jóváhagyás, aláírás is biztosított.
by Bálint Ipcsics, from the CommunityDownloads: 0Get - Template
Server Room Daily Check
Use this server room daily check template to standardize morning inspections across IT operations. Verify ambient room temperature, review server health, confirm daily database backups, and check primary and backup storage. Inspect CCTV NVR and cameras, network equipment such as Mikrotik, and connectivity from providers like Astinet, Biznet, and Indihome. This checklist helps teams document issues early, ensure redundancy is in place, and keep critical infrastructure online with fewer incidents and less unplanned downtime.
by wilanda MIS, from the CommunityDownloads: 0Get - Template
Meeting Room Inventory Form
Document AV and IT assets for meeting rooms with this inventory form. Capture displays, projectors, flat panels, interactive boards, and whiteboards. Record table connections for power, HDMI, VGA with audio, USB, and network. Log wireless presentation devices, source devices such as Microsoft Teams Rooms, video bars, speakers, microphones, DSP settings, and control processors. Include room scheduler checks, accessories like keyboards and remotes, firmware and IP details, and configuration backups. Add audit notes, photos, and drawings to maintain reliable, supportable rooms.
by Aaron Engel, from the CommunityDownloads: 0Get - Template
Enerprice Risikotabelle
Diese Vorlage Enerprice Risikotabelle unterstuetzt Teams bei der strukturierten Risikoanalyse. Sie erfasst Geschaeftsbereich, Datum und Durchfuehrung sowie pro Risiko: Beschreibung, Eintrittswahrscheinlichkeit, Ausmass des Schadens, Multiplikation (Eintritt x Schaden) und Empfehlungen. Nutzen Sie die Tabelle, um Risiken transparent zu dokumentieren, zu priorisieren und passende Massnahmen abzuleiten. Ideal fuer Audits, Business-Continuity und laufendes Risikomanagement.
by René Baggenstos, from the CommunityDownloads: 0Get - Template
Assessment Informatiebeveiliging ISO 27001
Deze Assessment Informatiebeveiliging ISO 27001 checklist helpt organisaties hun informatiebeveiliging te beoordelen en te verbeteren. De inhoud volgt de belangrijkste ISO 27001 thema's: beveiligingsbeleid en governance, organisatie van informatiebeveiliging, beheer van bedrijfsmiddelen en classificatie, personeel en bewustwording, fysieke en omgevingsbeveiliging, operationele processen, back-ups en netwerkbeveiliging, behandeling van media en informatie-uitwisseling, e-commerce beveiliging, logging en monitoring, toegangsbeheer op netwerk-, systeem- en applicatieniveau, gebruik van mobiele apparatuur en telewerken, ontwikkeling en onderhoud van systemen inclusief cryptografie, beheer van technische kwetsbaarheden, incidentmanagement, bedrijfscontinuiteit en naleving en audits. Gebruik deze checklist om gaps te identificeren en praktische verbeteracties te plannen.
by Peter Terpstra, from the CommunityDownloads: 0Get - Template
Challenges with Traditional RFID Systems
Traditional RFID deployments often depend on proprietary databases and fragmented partnerships across hardware, software, and chip vendors, making them complex and expensive to implement. This page outlines those shortcomings and introduces SimTraxx, an integrated end to end RFID solution that consolidates all components into a single platform. By unifying hardware, software, and chips, SimTraxx simplifies deployment, enhances functionality, and delivers lower total cost compared to typical legacy RFID setups. Use this resource to understand the trade offs and benefits of moving from traditional RFID stacks to a unified platform.
by suruthi ait, from the CommunityDownloads: 0Get - Template
Black Box Group Product Audit Report (INS)
This Product Audit Report INS template helps engineers assess installed products and systems. Record site details, engineer and audit date, installation type, and address. Capture deviations and observations with references, allocate points, evaluate workmanship, and calculate totals to produce a grade. Document corrective and improvement actions, including authority, dates, and report numbers where required. The form includes sections for auditor and auditee signatures and authority sign off, plus fields to confirm when significant actions are closed. Ideal for quality assurance and compliance checks during IT and communications installations.
by Daniel Bracken, from the CommunityDownloads: 0Get - Template
ING Dundrum Large Room Serial Number Log
This template supports head office upgrade works at ING Dundrum, enabling installers to capture room details, installation dates, and responsible technicians. Track serial numbers, MAC addresses, and LAN port numbers for displays, Rally cameras, RoomMate, Tap, Extron TX and RX, mic pods, and hubs. Use it to standardize asset records for large room types and attach photos for verification and audit readiness.
by Ciaran Mehlhorn, from the CommunityDownloads: 0Get - Template
Échantillon - Audit IT
Ce modèle d’audit IT en français aide à évaluer vos postes de travail et serveurs: système d’exploitation, mises à jour, antivirus, version d’Office, espace disque, centralisation des données, ainsi que sauvegardes, plan de backup, RAID, Exchange (rétention), et sécurité Firewall/VPN. Utilisez-le pour identifier les éléments à corriger ou améliorer, standardiser vos contrôles et documenter vos constatations lors des audits informatiques.
by Herve KOUROUSSOU SENEDONO, from the CommunityDownloads: 0Get - Template
Comms Room Inspection Checklist
This Comms Room inspection checklist helps IT and facilities teams assess server and network rooms. Verify air conditioning placement above cabinets, capture photos showing racks and AC units, and document site details to support audits. Use it to safeguard equipment, improve cooling compliance, and maintain uptime across IT infrastructure.
by stephen phillips, from the CommunityDownloads: 0Get - Template
Access Review - Privileged Users
This privileged access review template helps IT and security teams systematically evaluate elevated accounts across the organization. Use it to compile all human and service accounts, document current permission sets, and assess credential management practices. Validate the need for privilege per role, identify inactive or over-privileged accounts, and confirm separation of duties. Conduct technical and business validation, then plan remediation actions such as de-provisioning, permission adjustments, user training, and credential rotation.
by Austin Songer, from the CommunityDownloads: 0Get - Template
Managed Services Prospect Walk-through Checklist
Use this IT managed services prospect walk-through to collect a complete picture of a client's environment. Capture location details, hypervisor and server specs, shared storage, patch status, and email platforms. Record Microsoft 365 usage, licensing, backups, and workstation inventories. Assess network infrastructure including switches, firewalls, wireless, VPN and remote access. Note ISP bandwidth, antivirus, line-of-business apps, SQL versions, and general observations to scope MSP onboarding and ongoing support.
by Tim Nepus, from the CommunityDownloads: 0Get - Template
A1 End of Day Report for ULC Work
Use this A1 End of Day Report EODR to capture a complete summary of ULC site work. Record engineer name, location, work completed, tasks left, ground level works, materials missing, access or parking notes, and reasons for delay. Include walk away photos to show the site is safe and secure, note times the site was locked and unlocked, log good call or close call observations, and attach pictures and partial HOP. Ideal for ICT field teams to standardize daily handover.
by Mohsin Mehmood, from the CommunityDownloads: 0Get
IT safety & quality resources teams can access on- and off-site
Discover information technology courses and checklists in SafetyCulture’s Content Library, a centralized online resource where you can browse and access a variety of ready-made instructional and inspection materials. These digital resources give you quicker access to the information you need, right when you need it.
Efficiency through digital resources
Digital access means teams can pull in the right resource at the moment it’s needed. That reduces delays, supports better decision-making, and helps teams stay aligned as systems change.
Explore how your teams can apply Content Library resources:
Stay on top of current trends with courses on cybersecurity, AI, and Microsoft Excel.
Monitor security and equipment well-being with maintenance checklists.
Prevent further escalations with incident report forms.
Everything in this library is ready to use and fully digital, so you can adapt it to your workflow and share it across your team. And when you use these resources within the SafetyCulture platform, you unlock even more value—streamlined inspections, real-time insights, and a stronger safety and quality culture on every site.
