Course Search

interior header

Education Search

Page 1 of 1
Title

* Safety and Performance Implications of Counterfeit Cables

How can you be certain that the cable you are installing in your ICT project has passed the necessary safety tests for code compliance? In this course, you will learn about ways in which unscrupulous manufacturers fraudulently market cable which has not been verified by a nationally recognized testi

Learn More

BICSI Connect

*Single Pair Cabling for the Internet of Things (IoT) and Intelligent Buildings

Balanced single-pair cabling has the advantage of small size, high density, and favorable economics to match the need for connecting large number of sensors, actuators, building automation systems and IoT devices that are becoming prevalent in smart buildings. This presentation covers generic balanc

Learn More

BICSI Connect

Remote Access, Virtualization, and Network Services

At the start of this course, you'll learn about cloud services, delivery methods, and security considerations, as well as networking services. You'll also explore cabling types, connectors, and standards.

Learn More

BICSI Connect

NFPA 1600 Disaster/Emergency Management

Over the past decade, emergency management and business continuity planning have been recognized as necessary to continued operational success in both the public and private sectors. Key to this was the development and widespread use of the National Fire Protection Association (NFPA) Standard on Dis

Learn More

BICSI Connect

NFPA 1600 Business Continuity Programs

Whether it is a natural disaster that sweeps through your city or a computer virus that destroys vital electronic information, businesses need to be able to recover their services and operations as soon as possible if such a disaster does occur. A Business Continuity Program involves planning the re

Learn More

BICSI Connect

Network Storage and Security

Because so much work is done electronically, businesses and governments generate vast amounts of information, most of which needs to be kept available and safe. Storage and security technologies have improved with the growth of data requirements. This course introduces the methods, concepts, and tec

Learn More

BICSI Connect

Page 1 of 1