Bold Communications has introduced a new training seminar for technical and operational practitioners seeking to develop their understanding of monitoring and control systems for safety and security.

The Bold seminar is free to attend, accredited by the Chartered Institution of Building Services Engineers (CIBSE), and is eligible for CPD credits. Explaining in detail what a monitoring system does, the different types of communications and monitored technologies, how high-level integration can achieve savings and add value, the sessions will focus on new developments in the sector and issues to be considered when specifying a system.

Efficient equipment management

Attendance at the course, which can be run at your place of work as a ‘lunch and learn’ session, minimises the loss of work time while providing direct access to specialists with significant experience in the sector.

These complimentary seminars, which last for one hour, can be arranged at a time and place to suit your convenience and are aimed largely at consultants and end users. At the conclusion of the seminar, for which CPD points can be credited, those attending will have a greater understanding of how monitoring equipment can be managed together for efficiency and security.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...