Apr 30, 2024  
Course/Program Inventory 
    
Course/Program Inventory

TCT 3041 - Security-Surveillance



Clock Hours: 58

Delivery Mode
on-ground

Prerequisites: STS Basic

Industry Certifications ETA: STS Security-Surveillance Endorsement

 (https://www.etai.org/comps/STS_SS_comps.html )

Course Description:
The BASIC Smart Technology System (STS) installation technician is proficient in the design of pre-wiring and wireless architectures in residential/light commercial for entertainment, internet of things, and telecommunications equipment interconnections.  This will include installation of network wiring for TV, satellite and antenna outlets, voice equipment outlets, audio and video, media streaming, and computer equipment in such a manner that all control and communication signals can be integrated at the home or business system controller and converged into one cogent local network bit stream, to either be used within the system or to be passed back and forth through the system gateway.  He/she will be proficient in the many protocols used over diverse media to communicate with and control an array of electronics systems, in addition to the skills required for low voltage wiring installation.  Prior CAT, DCI, DVE, FOI, FOT, FOT-OSP, TTT certification is highly recommended to be proficient in STS skills.  The Basic STS installation technician will work from telecommunications wireless and wiring plans, installing cable fittings and selecting the specified cabling for each technology and identifying wireless equipment requirements.  He/she will test, mark and document all cabling and will have the ability to troubleshoot and restore pre-existing cabling and wireless systems.  A Basic STS installation technician typically will also be qualified in one or more of three (3) endorsement specialty areas listed below.

 

Audio-Video, Computer Networking and Security-Surveillance

Student Learning Outcomes:
ETA  STS Security-Surveillance Endorsement (STS-SS)

Skills and Knowledge Competencies

Refer to the BASIC STS Competencies as the foundation for these S.S. endorsement competencies. Some of the content may be familiar in the other STS endorsements also.

 

1.0 Signals

  • Describe the types of signals used in telephone systems
    • Differentiate between POTS, Digital, and VOIP
      • Describe how an RJ-31x jack works
  • Describe audio signal types
    • Explain analog audio signals
    • Explain the different types of digital audio signals and PCM (Pulse Code Modulation)
      • MP3 (MPEG1 Audio Layer III)
      • AIFF (Audio Interchange File Format)
      • WAV (Waveform Audio File)
      • WMA (Windows Media Audio)
  • Describe video signal types
    • Identify the different analog video types
      • Composite (RCA jacks, yellow/red/white)
      • Component (RCA jacks, RGB along with Red/White, YPbPr)
      • S-video (Separate-Video, Y/C)
      • VGA (Video Graphics Array)
  • Identify digital video types
    • MPEG formats (Moving Picture Experts Group)
    • DVI (Digital Visual Interface), DVI-D (DVI-Digital only)
    • HDMI™ (High Definition Multimedia Interface)
    • 1080p Progressive megapixel resolution
    • AVI (Audio Video Interleaved)
    • WMV (Windows Media Video)
    • Describe data transmission types Analog versus Digital
    • Define Asynchronous and Synchronous data transmission
  • Explain data transmission modes
    • Simplex
    • Half-Duplex
    • Full-Duplex
  • Differentiate between Octal and Decimal numbering codes

 

2.0 Distribution Systems and Cabling

  • Briefly compare cabling system types and where each are preferred use
    • coaxial (Coax) cable with untwisted pair telecommunications cables
    • twisted pair (UTP, STP - see below) telecommunications cables with POF (plastic optical fiber)
  • Explain the termination process for POF and methods of testing
  • Explain where copper cabling is best utilized in security systems and precautions in termination
    • Explain copper cabling termination precautions
    • Explain how copper cabling systems can be protected against electrical surges
  • Cabling Systems
    • Describe the types of cabling used in security systems and their advantages
      • Differentiate between NEC Class 2 & 3 circuits
  • Indicate the types of cables used to transport audio/video
    • Identify analog audio cables
    • RCA plug cable
      • 1/8 inch mono and stereo cable
      • 1/4 inch mono and stereo cable
    • Identify digital audio cables
      • USB cable (Universal Serial Bus)
      • Firewire™ cable
      • Thunderbolt™ cable
    • List types of cables and which cable connector types they apply to
      • Indicate the types of cabling that can be used for data transmissions
      • Differentiate between Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP)
      • Explain the advantages of using Power over Ethernet (PoE) cabling
      • Identify the specific types of coaxial cable
      • Identify types of fiber optic cable
      • Identify the different types of cable wiring, jacks and standards for Ethernet networks
        • Explain the purpose and features of the RS-232, RS-485, RJ-45 standards
        • Identify RS-232, RS-485 & RJ-45 connectors
        • Explain the purpose of the cabling standards:
          • TIA-568.0-D 2015 Generic Telecommunications Cabling for Customer Premises (ALSO SEE TIA- 568-D.1, TIA-568-C.2, TIA-568-C.3, and the full TIA-568 SET)
          • ANSI/TIA-569-E-2019 Telecommunications Pathways and Spaces
          • ANSI/TIA-570-D Residential Telecommunications Infrastructure Standard
          • ANSI/TIA-758-C Customer-Owned Outside Plant Telecommunications Infrastructure Standard
  • Explain Power-Line Communications (PLC), Power-Line Networking (PLN) and Broadband-over-Power Lines (BPL) of the G.hn home network standard {ITU-T G.9960}
  • Discuss Power-Line Networking & its advantages over Ethernet & Home PNA (HPNA)
  • Explain OFDM (Orthogonal Frequency Division Multiplexing) used in ETSI’s HIPERLAN (High Performance Radio Local Area Networks)
  • Describe the RJ-31x jacks (8 position, 4 contact) and applications
  • Identify rules and techniques for pulling Cables through conduit
  • Differentiate between video and RF cables and indicate which types of wiring is used for different purposes
  • Explain the purpose and preferred locations for system distribution panels
    • Describe the use of signal distribution panels to interconnect cables
    • Explain how an alarm system control panel is used

 

3.0 Hardware Basics

  • Cameras: List the advantages and usage of each of the following:
    • wired and wireless security cameras
      • Bullet
      • Infrared
      • Dome
      • Pan-Tilt-Zoom (PTZ)
      • Panoramic
      • Door Bell
      • Motion detection
      • Hidden & IP
      • Miniature
    • cameras with biometric capabilities
      • Facial recognition
      • Retina scans
      • Personal speech recognition
    • camera lenses
      • Fixed/Standard
      • Varifocal
      • Wide angle
    • video coding formats
      • MPEG-1 (MPEG Phase 1)
      • MPEG-H including HEIF (High Efficiency Image File format)
      • HEVC (High Efficiency Video Coding), H.265, MPEG-H2
      • AVC (Advanced Video Coding), H.264, MPEG-4
    • mounts and enclosures
      • Compare different types of camera mounts
      • Explain optimum camera beam angles
      • Describe the usage of back-lighting
    • requirements for camera power supplies
    • Explain the basic operation of a Charge-Coupled Device (CCD) in a digital camera
  • Describe requirements for security system power supplies
    • Identify how to install UPS (Uninterruptible Power Supply) systems
    • Identify how to install RPS (Redundant Power Supply) systems
  • Diagram how batteries are incorporated in security systems and alarm circuits
    • Identify electronic components used in alarm circuits
  • Explain how use of PoE (Power over Ethernet) is advantageous for cameras
  • Describe each of the following wired and wireless sensors and their applications
    • Temperature
    • Smoke - Ionizing
    • Driveway
    • Window
    • Motion
      • Infrared Sensor
      • Ultrasonic Sensor
      • Microwave Sensor
    • Pressure
    • Water
    • Glass Breakage
    • Door locked/unlocked, open/closed
    • System armed/unarmed
    • Alarm siren/buzzer/claxon
    • Ground Fault Circuit Interrupter (GFCI) device
  • Explain how keypads are incorporated in security-surveillance systems
    • Base station
    • Key Fob
  • Identify how cell phones and tablets can be used in lieu of keypad activation/deactivation
  • Discuss purposes/locations for security lights in and around buildings
  • Explain the technology and applications for the following items:
    • Magnetic Switches
    • Micro-switches
    • Reed Switches
    • Pressure switch/mats
    • Trip Wire
    • End-Of-Line Resistor
    • Sprinkler System trigger
    • Panic Button
    • Proximity card reader can be incorporated into a security system
    • EEPROM chip
    • Foot Button

 

4.0 Recorders

  • Describe the use of HDVD - DVR (High Definition video disc-digital video recorder) units in security systems
    • Explain how an NVR (network video recorder) operates in the camera itself
  • Differentiate between the following:
    • Digital Video Disk recorder
    • Digital Video SSD (solid state disk or drive) recorder
    • Digital Video Cloud recording
  • Explain how SSD, CD and DVR Systems are utilized in alarm systems
  • Explain the relevance of event recording and evidence storage
  • Describe video surveillance equipment and applications
  • Explain how date-time generators are used and their purposes
  • Describe the purpose and methods of event recording

 

5.0 Additional Audio - Video

  • Explain video amplifier usage in security systems
  • Describe common types of monitors and displays
  • Explain how video signals can be provided to mobile devices
  • List types of enunciation devices used in security systems
  • Explain how quad- and other multi-scene displays are used
  • Describe voice monitoring equipment and applications

 

6.0 Wireless Technologies Review

  • Identify the wireless technologies available for security applications
    • 802.11x, Wi-Fi™ (wireless technology standards)
    • Li-Fi (Light Fidelity)
    • Explain the use of light-emitting diodes (LED) for data transmission
    • Describe how a photodiode receives and transmits data
    • Z-Wave® technology
    • Zigbee technology and other 802.15.4 technologies
    • Bluetooth SIG®, formerly 802.15.1 technology
  • Explain the advantages of wireless transmitters in security systems
  • Identify the different types of wireless technologies that can be used to connect security products to a smart home/building security system
  • Describe how wireless receivers may be incorporated in security systems

 

7.0 Computer Network Systems and Security

  • Explain how a security and/or surveillance system may incorporate computer network basics:
    • Describe the protocols TCP/IP, HTTPS (Hypertext Transfer Protocol Secure), etc.; where and how they are used in a small business or residential secure network system
    • Explain the basic principles of Internet security services, anti-SPAM, anti-VIRUS, Spyware, etc.
    • Explain WPA, WPA2 and WPA3 (Wi-Fi™ Protected Access)
    • Explain how to set up a smart hub to control components within a building
    • Describe how smart building technology systems use Z-Wave® and Zigbee radio frequencies to develop mesh networks
  • Explain how to draw a block diagram of a computer network and explain the basic uses
  • Explain how LANS - (Local Area Networks) - work
  • Describe types of bus applications used in building networks and their purposes
  • Explain the function of processors as utilized in security systems
  • Explain how security systems may link to a building’s network system
    • Describe how modems, switches, routers and access points are incorporated
  • Explain how Smart Home/Building-IoT (Internet of Tings) systems can be used for security
  • Describe the purpose and methods of providing entry delay for the network system
  • Explain the methods of providing secure access control
  • Explain Cyber Security threats
    • Describe the most common cyber threats to a physical security deployment
    • Describe the potential threats posed by IoT (Internet of Things) device deployment
    • Explain “insider threat” to a secure network
    • Explain how advanced persistent threats are orchestrated and affect a network
  • Describe device security
    • Describe the secure firmware updating procedures and their importance
    • Explain the provisioning of device access levels

8.0 Software

  • Discuss the advantages of using Windows®-based security system software
  • Identify commercial security software available for Internet and local network security
  • List types of storage methods for security data
    • In-House data storage
    • Secure Edge Network data storage
    • Cloud data storage
  • Explain how software and cell/tablet apps can implement security and access control
  • Identify how Audio/Video/Speech Recognition/Biometrics can be integrated into a security and/or surveillance system
    • Audio/Video data capture
    • Biometrics
      • Visual/facial recognition systems
      • Speech identification
      • Retinal scan systems
  • Describe how the Windows Media Center® system is utilized in a building control system
  • Explain how programming of security and/or surveillance systems is accomplished

 

9.0 System Design

  • Explain how to construct a needs assessment document for a building
  • List the steps in planning the security system when working with the builder and/or owner
  • Explain the sequences in implementation and shut down of a security system
  • Identify procedures for checking and evaluating alarm systems

 

10.0 Troubleshooting - Test Equipment

  • Explain common problems with system semiconductor components
  • Describe common methods of troubleshooting wiring in the system
    • Explain how to use a DMM (digital multi-meter) to check circuits
  • Explain the usage and precautions for using multimeters
  • Explain how to properly use a network analyzer

 

11.0 Documentation and Legal Issues

  • List the liabilities an installation firm has for positive operation of the security system, interfacing with law enforcement agencies, safety and protection of building property
  • Explain the legal and time problems with false alarms caused by system malfunctions
  • Explain the purpose and extent of customer orientation of system operation with availability of documentation
  • Discuss documenting codes and standards including
    • local AHJ (authority having jurisdiction)
    • NEC® (National Electrical Code®)
    • TIA® (Telecommunications Industry Association®)
    • NFPA® 72 (National Fire Protection Association Fire Alarm and Signaling Code)
    • UL985 (Underwriters Laboratories)
  • Explain how to secure documentation of a security-surveillance system