Learning From Certification

Differentiating the new, integrated security market

With the universal migration toward IP-based security systems and the increased demand for higher-level systems integration, the security industry is seeing a major shift in the roles of its professionals. This is having a big impact on skill requirements within the industry. We recently spoke with Greg Willmarth, the director of learning & performance for Milestone Systems, to discuss how these market advancements are impacting the company’s approach to learning, certification and on-the-job performance assurance.

Q. The security industry is in the middle of a transformation. As a technology provider, how is the shift in core knowledge needs impacting your training efforts? A. Well, there is a big shift happening, and like many manufacturers and technology developers in this industry, we’re constantly working to provide our customers with the knowledge and skills they need to succeed. Early in 2016, we began rolling out a completely new training and certification program, with the goal of increasing the level of on-the-job expertise in designing and implementing solutions.

As more integrators enter the IP video market, often with limited IT experience, we see a growing need to help ensure that they have the skills to successfully perform in the field. After all, a certification is a promise to customers that the certified individual has the necessary level of proven expertise for successful system design, installation and configuration. Our reputation, as well as the integrator’s, is on the line. To best deliver on this promise, we began creating new training tools from the ground up in three different areas: eLearning modules, instructor-led workshops, and certification assessments. We focused on elevating the on-the-job performance of our partners, as well as globally growing the number of people with proven expertise in the design and implementation of IP VMS solutions.

Q. You mention global partners, who are independent integrators and installers; how do you reach them? A. To jump-start channel expertise with our products, especially our business-ready solutions, we began developing an extensive eLearning program. The goal of these short, on-demand, self-paced modules is to provide learners with a basic level of knowledge and skill in designing, installing, configuring, or using our products. With the goal to support job performance, each module focuses on the key tasks and steps that need to be completed. As opposed to passive training videos, these interactive eLearning modules make it easy to navigate to the exact job task desired and get hands-on practice completing the steps through interactive simulations.We offer an ever-increasing number of eLearning courses for integrators and reseller partners, as well as end-user customers.

Q. How is this shift affecting classroom courses? A. With the same goal, we have redesigned our instructor-led classes to better prepare learners to perform on the job. First, we worked to clearly understand what knowledge and skills are truly necessary, so we performed a detailed job competency analysis. We identified exactly which competencies are required to successfully design, install, and configure video surveillance solutions from moderate to high complexity. We then looked at who performed these different tasks in the field, and quickly realized that the people responsible for designing the solution were often different from those who installed and configured the system on site. It became apparent that we needed separate classes for design and technical installation to better serve the various needs of these different audiences.

Finally, we wanted to make the classes even more hands-on than our previous training. We created new learning experiences that are more “learning-while-doing” practical workshops than traditionally structured “presentation-of-information” classes. In the technical workshops, learners practice going through the tasks and steps required to perform an actual installation based on realistic customer scenarios and specifications. To help bridge the learning from the classroom to the field, learners follow detailed job aids that walk them through each step of the installation. After the workshop, they can use the job aids in the field during live installations.

Q. You speak about training to specifically increase on-the-job performance; how does this impact certification programs? A. We need to make sure that our certifications represent real value to our customers and the market, and we take this very seriously. We engaged an outside expert to help redesign our certification strategy to make our assessments similar to those in the IT industry, with better measures of on-the-job performance ability.

The first step was to separate our certification assessments from our training classes. After all, training and certification are two different things. Training is where knowledge and skills are developed. Certifications are proof that an individual has achieved the required levels of knowledge and skill. We eliminated the certification requirement of attending training, stopped administering the certification assessment as part of our workshops, and moved our certification assessments online. At the same time, we significantly improved the quality of the assessments. We increased the number of questions, added simulation and scenario question types, and implemented question randomization and the use of question pools.

As a result, our new certification assessments are more challenging, so achieving certification is truly an achievement. Many people need to take the assessments several times before passing, even after taking one of our workshops. Other people, who have yet to gain the needed expertise, simply do not pass, which is appropriate.

This article originally appeared in the March 2017 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3