Categories
Information Technology
Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.
- Template
Auditoria de TI para Infraestructura y Redes
Esta plantilla de auditoria de TI ayuda a evaluar la infraestructura y los sistemas en tienda. Revise firewall, routers ADSL, access points, switches, antenas y 3G; compruebe estabilidad con pruebas de ping y latencia; verifique conectividad para servicios y POS; y audite equipos de punto de venta, rendimiento de Windows, antivirus, proteccion electrica y puesta a tierra. Ideal para estandarizar inspecciones y mejorar disponibilidad, rendimiento y seguridad de la red.
by Victor Ramirez, from the CommunityDownloads: 30+Get - Template
Auditoria Interna ISO 27701
Modelo de auditoria interna ISO IEC 27701 2019 para avaliar o Sistema de Gestao de Privacidade da Informacao. O checklist cobre contexto, lideranca, planejamento, apoio, operacao, avaliacao de desempenho e melhoria, alem de diretrizes de privacidade baseadas na ISO IEC 27002. Inclui controles para acesso, criptografia, seguranca fisica, operacoes, comunicacoes e aquisicao e desenvolvimento de sistemas. Aborda incidentes de seguranca, continuidade de negocio e compliance legal. Traz secoes especificas para controladores e operadores de dados pessoais, incluindo consentimento, registros, privacy by design e transferencia de dados, com anexos A e B para verificacao detalhada.
by Rafaella Araújo Silva, from the CommunityDownloads: 30+Get - Template
Vendor Risk Assessment Template
Use this template to evaluate potential vendors across organizational standards, company information, security and data privacy, technology viability and roadmap, product demonstrations, system performance and usability, disaster recovery, fees, and overall risk. Capture references, partnerships, project understanding, and requirements fit. Standardize scoring, compare candidates, record recommendations, and sign off with the officer in charge.
by Joseph Mensah, from the CommunityDownloads: 30+Get - Template
ADPE Computer and Data Processing Safety Checklist
This checklist supports safe operation of office and shop computer and automatic data processing equipment. It helps teams verify ESD protection for sensitive devices, adequate cooling airflow, clean and unobstructed areas, proper cable routing, and safe use of power taps. It includes requirements for raised floor maintenance and cleaning, prohibition or controlled allowance of food and drinks, storage restrictions above ceilings and subfloor spaces, emergency lighting and exit signage, and posting of floor loading capacities. Guidance also covers battery disposal via the environmental management office and regular inspection of fans, filters, and heat sinks by qualified personnel.
by Trevor McMartin, from the CommunityDownloads: 30+Get - Template
Elecomm Ltd ICT Site Survey Checklist
Capture all details required for an ICT installation with this site survey checklist. Record cabinet locations, sizes and heights, fiber types and connectors, access equipment needs, cable run lengths, and containment requirements. Document electrical boards, spare ways, breaker details, and certificate photos. Add photos of cable routes and access point locations, list materials, estimate labor, and note site restrictions and permits. Finish with client and engineer sign off to confirm scope and readiness.
by James Hegarty, from the CommunityDownloads: 30+Get - Template
SAP B1 Project Kickoff Template
Use this SAP Business One project kickoff template to align client and implementation teams. Define project sponsors, process owners, and champions, outline ERP concepts, and plan each implementation phase: discovery, data gathering, blueprint, configuration, UAT, training, data migration, parallel run, go live, and post go live support. Adaptable for ERP projects to keep stakeholders accountable and milestones on track.
by Sailesh Khawani, from the CommunityDownloads: 30+Get - Template
Access Control Audit Checklist
Use this access control audit checklist to assess and document controls that limit access to information and processing facilities. It covers access control policy, user registration and de-registration, user access provisioning and reviews, management of privileged access and secret authentication information, password quality, secure log-on procedures, information access restrictions, use of privileged utilities, access to program source code, and removal or adjustment of access rights on termination or role change. Ideal for IT and security teams aligning with ISO 27001 style controls. Customize this template to fit your organization and jurisdiction.
by Gray Millen, from the CommunityDownloads: 30+Get - Template
Audio Visual Preventative Maintenance Report
This Audio Visual Preventative Maintenance Report is a comprehensive checklist for assessing and maintaining AV rooms and equipment. It covers single and dual displays, touch panels, video walls, LED walls, and projectors, including resolution, aspect ratio, color, alignment, and focus checks. It guides technicians to capture model and serial numbers, warranty status, and whether devices are still in production. The template includes structured sections for client-facing cabling (HDMI, USB-A/C, DisplayPort, VGA, audio, Ethernet, power), infrastructure cabling faults, and verification of video and audio sources (PCs, laptops, wireless, TVs, cameras, table and ceiling mics, soundbars, speakerphones, handheld/lapel). It also inventories core equipment such as HDMI switchers/matrices, TX/RX, audio DSPs, control processors, control panels, and rack locations, with prompts to document faults, fixes applied, permanence of fixes, and required replacements, supported by photos.
by Tom Sinclair, from the CommunityDownloads: 30+Get - Template
CCTV Technical Survey Report Template
This CCTV technical survey report template helps technicians evaluate and document the condition and performance of surveillance systems on site. It covers DVR and NVR details including make, location, channel capacity, and channels in use. Inspectors can record camera counts and types, verify operational status, focus and alignment, PTZ and motion detection functions, and note any obstructions. The checklist includes wiring and cabling integrity, image quality, connectors, and power supply replacements. Control equipment checks address monitors, HDMI or VGA cabling, power switches, and cleanliness, along with accurate time and date settings and UPS needs. The form supports observations, recommendations, photo capture, and customer and inspector sign-offs.
by Infonochori nochori, from the CommunityDownloads: 30+Get - Template
Immedia Preventative Maintenance Report
This preventative maintenance report template by Immedia is designed for AV and IT environments. Inspect projectors and record lamp hours, clean and reset filters, verify display alignment and signal quality, and run end-to-end tests on all audio and video inputs and destinations. Validate teleconferencing and video conferencing performance, document rack and enclosure condition, clean and ensure airflow, and capture room-wide photos. Note issues, damaged equipment, and maintenance actions during scheduled or unscheduled visits. Ideal for standardizing AV system upkeep and documenting service quality.
by Eric Lind, from the CommunityDownloads: 30+Get - Template
RAV System Commissioning Checklist V5
This RAV System Commissioning Checklist helps AV and ICT teams validate end-to-end performance of control, user interface, network, room automation, video, audio, and conferencing systems. Record models, configurations, and test outcomes aligned to Infocomm standards, attach images, and document rack, cabling, labeling, and ventilation checks. Verify microphones, sources, displays, projectors, screens, and DSP settings, then complete client training confirmation and final sign-off. Ideal for standardized QA across enterprise AV deployments.
by Matt Edgcumbe, from the CommunityDownloads: 30+Get - Template
Boots Comms Cabinet Survey (ECR v4)
This site survey template is designed for Boots Opticians locations to plan and document comms cabinet and network requirements for an ECR v4 rollout. Record store details, pre-screen and test room equipment (e.g., Henson visual fields, OCT, CL units), and note RAM needs for connected PCs. Capture how many data points and spare network ports are required, label extra port locations, and add photos. Document comms room location, available switch ports, distance from the opticians area, and floor differences to ensure a smooth installation.
by Hasnain Najafi, from the CommunityDownloads: 30+Get - Template
Computer Equipment Security Checklist
This checklist helps organizations protect theft attractive computer equipment and safeguard critical data. It guides risk assessment, password and access controls, antivirus and internet use policies, and user awareness. It covers asset registers, regular backups with secure off site copies, and maintaining an IT business continuity plan. Physical measures include secure server room locations, glazing protection, restricted access, auto closing doors, and alarms with CCTV and access control. It also includes property marking, entrapment devices, management of change, training, and regular reviews.
by SafetyCultureDownloads: 20+Get - Template
Special Category Data Checklist
To comply with the legal requirements for processing special category data, the UK ICO provided this checklist, converted into a SafetyCulture digital template.
by SafetyCultureDownloads: 20+Get - Template
Data Cabling Checklist for Aviva Loss Prevention
This data cabling checklist aligns with the Aviva Loss Prevention Standard for property risk control. It helps teams verify drawings for cable layouts and routes, separate power and data cabling, and ensure all penetrations through fire compartment walls are correctly fire stopped. It covers removal of redundant cabling, cable management within a management of change process, creation of fire breaks in risers and voids, and cleanliness and housekeeping of void areas. The checklist also prompts checks for addressable fire detection in all relevant compartments and considers business interruption risks from critical cabling routes. Use it to document inspections and strengthen compliance and property protection.
by SafetyCultureDownloads: 20+Get - Course
Applying Digital Rights in Online Communities
Do the members of your online community have rights? Digital technology provides new means to exercise human rights in digital spaces. In this course, you will learn how to build and maintain accessible, safe and inclusive online communities by practicing key digital rights and enforcing community standards.
by Search For Common Ground EMEAGet15 LessonsDownloads: 20+ - Template
Checkliste für die Überprüfung der Cybersicherheit
Eine Cybersicherheits-Checkliste hilft bei der Bewertung und Erfassung des Status der Cybersicherheitskontrollen innerhalb der Organisation. Sie wird von IT-Fachleuten verwendet, um den Arbeitsplatz zu sichern und Bedrohungen zu verhindern, die den Betrieb beeinträchtigen könnten.
by SafetyCultureDownloads: 20+Get - Course
Practising Healthy Communication in Online Communities
Do the members of your online community often disagree and bully each other? Hate and negativity can harm the well-being and health of an online community. In this course, digital community stewards will learn to foster positive interactions and respectful discourse to counter online hate in digital groups.
by Search For Common Ground EMEAGet15 LessonsDownloads: 20+ - Template
Liste de contrôle cybersécurité
Une liste de contrôle de cybersécurité permet d'évaluer et d'enregistrer le statut des contrôles de cybersécurité au sein de l'organisation. Elle est utilisée par les professionnels de l'informatique pour sécuriser le lieu de travail et prévenir toute menace qui pourrait survenir et entraver les opérations.
by SafetyCultureDownloads: 20+Get - Course
Fact-Checking False Information in Online Communities
Can you differentiate an edited image from a real one? As a digital community steward, your ability to identify and report false information is important for the authenticity of your online community. In this course, you will deepen your knowledge about fact-checking essentials, digital tools of verification, and flagging false information.
by Search For Common Ground EMEAGet11 LessonsDownloads: 20+ - Course
La difesa dei diritti umani nell'era dell'intelligenza artificiale
Sia che tu abbia utilizzato i social media, un'applicazione di navigazione o un filtro per immagini, è probabile che l'Intelligenza Artificiale (IA) abbia avuto un impatto su di te. Non riguarda solamente te: l'IA sta avendo un impatto sui diritti umani di tutto il mondo, e questo corso ti informerà e ti educherà su come i diritti umani sono segnati dall'IA e su come puoi essere autorizzato a salvaguardare questi diritti. UNESCO E UNITAR insieme hanno lanciato una novita', un breve corso online di apprendimento sull'IA sui Diritti Umani per giovani di età tra i 16 e i 24 anni. Gli esperti scompongono concetti complessi sull'IA in attività semplici costruite attorno alle nostre interazioni tecnologiche quotidiane. Il corso si focalizzerà su come la libertà di espressione, il diritto alla privacy e il diritto all'uguaglianza sono influenzati dall'IA.
by UNESCOGet9 LessonsDownloads: 20+ - Template
Checkliste für die Computerwartung
Die Computerwartung wird von IT-Fachleuten und Managern durchgeführt, um den kontinuierlichen und optimalen Betriebszustand von Computern zu gewährleisten. Verwenden Sie diese digitalisierten Checklisten für die Computerwartung, um zu prüfen, ob die Hardware des Computers gereinigt, repariert oder ausgetauscht werden muss und ob die Software und die Sicherheitsfunktionen aktualisiert sind und funktionieren.
by SafetyCultureDownloads: 20+Get - Template
Liste de contrôle ISO 27001
Cette liste de contrôle peut être utilisée pour évaluer l'état de préparation de l'organisation à la certification ISO 27001. Elle permet de découvrir les lacunes des processus et d'examiner le SMSI de votre organisation sur la base de la norme ISO 27001:2013.
by SafetyCultureDownloads: 20+Get - Course
Building Safe Online Communities
How safe is your online community from internal and external threats? Feeling safe is a prerequisite for participating in online communities. In this course, you will learn about safety risks and challenges digital community stewards need to mitigate by encouraging better digital security practices among group members.
by Search For Common Ground EMEAGet16 LessonsDownloads: 20+
