Categories
Information Technology
Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.
- Template
Monthly Health and Safety Building Inspection
This comprehensive workplace safety inspection document outlines mandatory requirements and guidelines for conducting thorough workplace safety assessments. It covers essential areas including documentation compliance, exit safety, fire protection, hazardous materials handling, and equipment maintenance. The checklist is designed to meet legislative requirements with monthly inspection frequencies and includes detailed sections for general interior spaces, location-specific areas, and exterior facilities. The document provides structured guidance for health and safety committees and management to ensure all workplace areas are properly inspected and maintained according to safety standards. It includes specific requirements for documentation, reporting, and follow-up actions, ensuring a complete safety management system that protects employees and maintains regulatory compliance.
by Nigel Harrison, from the CommunityDownloads: 50+Get - Template
Vindex Systems CCTV Handover Document - VIN.Q.304
Installation Evidence, System information, Functional Camera, Image and Archiving Checks
by Adam Baxter, from the CommunityDownloads: 50+Get - Template
DAILY IT CHECK LIST
A detailed IT operations checklist that outlines essential daily tasks for maintaining data center and IT infrastructure. The document covers four main areas: Physical checks of the data center environment, Systems monitoring including backup verification and server status checks, Guest Technology oversight including WLAN and IPTV systems, and Security protocols including system updates and DHCP management. The checklist ensures comprehensive monitoring of critical IT operations, from temperature control to user experience metrics, while maintaining proper documentation and issue tracking. It serves as a systematic approach to daily IT operations management, ensuring all crucial systems are monitored, maintained, and issues are promptly addressed.
by Terrence Peiris, from the CommunityDownloads: 50+Get - Template
Fire Inspection Checklist for FM200 Compliance
Use this fire inspection checklist to assess server rooms with FM200 fire suppression. It covers signage, access and egress, electrical equipment and switches, ventilation and temperature, emergency equipment checks, and general facility conditions. Verify firefighting equipment service dates, first aid access, and clear paths. Record site details, room dimensions and voids, wall types, and fire stopping, then capture findings and sign off to maintain compliance and readiness.
by Dave Wessels, from the CommunityDownloads: 50+Get - Template
VDI Upgrade Model 2 sign off V3
This template will help you install a VDI unit at a Marston's Model 2 outlet. To be used in conjunction with the process documentation.
by ross clarke, from the CommunityDownloads: 50+Get - Template
Cyber Security Checklist by Mitti
A cyber security checklist helps assess and record the status of cyber security controls within the organization. It is used by IT professionals to secure the workplace and prevent any threats that may take place and hinder operations.
by Megan Duckworth, from the CommunityDownloads: 50+Get - Course
Defending Human Rights in the Age of Artificial Intelligence (Screen Reader Accessible Course)
Whether you've used social media, a navigation app or a picture filter, chances are that Artificial Intelligence (AI) has impacted you. It's not just you - AI is impacting human rights worldwide, and this course will inform and educate you on how your rights are affected by AI, and how you can be empowered to guard these rights.
by UNESCOGet9 LessonsDownloads: 40+ - Template
Audit informatique - modèle vierge prêt à l'emploi
Ce modèle d'audit informatique vierge permet d'évaluer l'infrastructure et les postes: serveurs (AD, DNS, DHCP, applicatifs, données), machines virtuelles, pare-feu, VPN, sauvegardes, onduleurs, configuration réseau et sécurité. Il inclut des sections pour l'inventaire matériel et logiciel, la capacité disque, la mémoire, l'antivirus, ainsi que le suivi des PC (nom DNS, OS, date d'installation). Utilisez-le pour préparer, conduire et documenter vos inspections IT de manière rigoureuse et standardisée.
by Denis Pierard, from the CommunityDownloads: 40+Get - Template
Viz Room Functional Verification Procedure
Use this Viz Room FVP procedure to complete a full functional verification of visualization rooms. Inspect the room scheduler, docking station routing and network, IPTV controls, Windows PCs, cameras, integrated audio and video conferencing, 3D stereo if equipped, displays and projectors, and the touch panel. Record any failures, open a ticket in the correct system, note the ticket number, and alert the technical team. Confirm image and audio quality and ensure all controls, layouts, and directories operate correctly before sign off.
by Candace Turk, from the CommunityDownloads: 40+Get - Template
DSI Room Checkout Test Report v2
This DSI room checkout test report v2 helps teams verify installed devices and locations meet specification in courtroom environments. Inspect audio and video equipment, confirm microphones, speakers, monitors, and inputs, test control touch panels and labeling, document resolutions and IP details, archive rack settings, capture photos, and record misc information to close out installations.
by Mark Conaway, from the CommunityDownloads: 40+Get - Template
Information Security Room Audit Checklist
Use this Information Security Room Audit checklist to evaluate physical and procedural controls in rooms that handle confidential information. Inspect access control types (keys, codes, RFID), CCTV coverage, intrusion and fire alarms, window and door security, secure storage locations (filing cabinets, steel cupboards, drawers), and key management. Verify unattended computers are locked, screens are clear of sensitive data, portable devices are secured, and bins are free of confidential materials. Record findings, risks, and corrective actions.
by Neil Parkin, from the CommunityDownloads: 40+Get - Template
Checklist de Auditoría en TI
Esta plantilla de Auditoría en TI ayuda a evaluar infraestructuras y equipos críticos en puntos de venta y oficinas. Incluye verificación de comunicaciones (firewall, routers, switches, redes inalámbricas), continuidad y alta disponibilidad, organización de cableado, telefonía y periféricos (scanner, pin pad, cajón de dinero, impresoras), videovigilancia (CCTV, cámaras y monitores), estructura y racks de telecomunicaciones, calidad de energía y respaldo (no-break/UPS, tierra física, voltajes), así como equipos de cómputo y servidores. Permite registrar condiciones de limpieza, operación, seguridad, aterrizado, latencia y cumplimiento, identificando hallazgos y asignando acciones para mejorar la confiabilidad y la seguridad tecnológica.
by Mario Armando Rodriguez, from the CommunityDownloads: 40+Get - Template
Cybersecurity Health Check
Use this cybersecurity health check to evaluate your organization's readiness across people, processes, technology, and data protection. Review policies, roles, incident response, business continuity and disaster recovery, asset inventory, BYOD, patching and vulnerability scanning, threat monitoring, antivirus, backups, access controls, and privacy practices. Identify gaps, prioritize remediation, and track improvements over time.
by Mohamad Fazil, from the CommunityDownloads: 40+Get - Template
UPS Inspection Audit Checklist
This UPS inspection audit template helps teams verify the condition and documentation of uninterruptible power supplies before re-energisation. Record the UPS ID and serial number, capture clear photos of the Eaton rating plate, front sections with covers removed, ISBM section, and each UPM module. Confirm panels and identification labels, document any issues, and ensure all required quality checks are completed. The workflow concludes with sign-off by responsible representatives to support safety, compliance, and reliable data center operations.
by Rene Kooijvander, from the CommunityDownloads: 40+Get
