Storyboard Projects

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

Silicon Valley Data Centers

e-Learning Storyboard for Identity verification and Effective


communication skills course
Title: Identity Verification and Effective Communication skills
Author: Mussie Araya
Screen
Info
Introduction

Text
Welcome
to
Identity verification and
effective
communication
skills training.

[Unit name]
Version (// : /P )

Audio
Hi and welcome
to the Identity verification
and effective
communication
skills
training.
Click on the next button
to continue.

[Company Name] Confidential


Page 1

Graphics
A woman straight
character pose
gesturing to the right ,
expression talking

Programming
Notes
Remove the previous
buttons ,
Text color Title blue,
body black
font title 48 , font 32

Lesson #: [lesson title


322122628

Screen
Info
Name Slide

Text
Please, enter your name
and click on the start
button to start

Audio
Please, enter your name and
click the start button to
begin the tutorial

Graphics

A male character

Programming
Notes
Put a trigger box marked
START that takes the
learner to the first page.
A male character
gesturing left towards a
caption of the text

Name:

Remove the navigation


buttons from this page.
Use the insert reference
feature for the name box
An option to replay audio
for all slides with audio
with volume control and
mute options
White background with
black text for all slides
with few exceptions
Voice over should match
animation
Male voice
Both texts placed central

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 2

Lesson #: [lesson title


322122628

Screen
Info

Text

About us

About US

Background
Information
screen

We were Founded in
2005
We provide safe and
reliable service to our
clients.
Our goal is to secure
our tenants data
storage spaces and
prevent an
unauthorized access
You play a key role to
play in providing this
service.

Audio
Background Information
about Silicon Valley Data
Centers.
Since our birth in 2005,
silicon valley data centers
have been providing safe
and reliable service for
multiple companies in
silicon Valley. .

Graphics
Picture of building

Programming
Notes
Plain text on a quite
blue screen.
Picture appears and
stays. The text zooms
in one after another and
stays on the screen

we aspire to be the
leaders in providing safe
and reliable service to our
clients.
As a security officer you
play a key role in
accomplishing our goals.
This training is required to
equip you with the skills
that enable you to
challenge the challenges
you may face

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 3

Lesson #: [lesson title


322122628

Screen
Info
Title: Advance
organizer
(Thought
provoking
questions)

Text

Do you know who is


who at the site?
Who are the current
tenants using the data
center?
How do you know if a
person is really
authorized or not?

Audio

Graphics

You may need to think of


the following questions
throughout the tutorial.
Do you know who is who
at the site?
Who are the current
tenants using the data
center?

Programming
Notes
Bullet points for the
questions on the slide.
Animation: Grow and
stay

None .

Match the appearance


of text with the audio

How do you know if a


person is really authorized
or not?
Please note that these
and other questions are
important aspects of this
tutorial.

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 4

Lesson #: [lesson title


322122628

Screen
Info
Absorb
Activities
Introduction

Text
Communicate
effectively
Identify different
personnel by company
and access level
Differentiate between
authorized and
unauthorized access

[Unit name]
Version (// : /P )

Audio
In the next slides, you will
be presented with
information regarding the
current tenants, their
authorized times of
operations and their
access levels.
Although you are not
required to memorize all
the names at the moment
as names are constantly
updated, it is very
important to remember
company names,
associated buildings and
authorized hours of all
personnel in order to
perform your tasks
effectively

[Company Name] Confidential


Page 5

Graphics

Programming
Notes

None
Bullet points for the text
The picture appears
and disappears to be
followed by the text.
Text animation: Grows
and stays
Delay the appearance
of text to match with
audio

Lesson #: [lesson title


322122628

Screen
Info
Objectives:

Text

Audio

By the end of the


course you will be able
to

You may wonder what you


will be able to do after the
training.

Inquire information from


personnel

By the end of this course


you will be able to

Identify personnel

Inquire information about


different personnel by
asking for their names,
companies, and their
contact people.

Differentiate between
authorized and
unauthorized
personnel, access and
times.

Graphics
None

Programming
Notes
Use bullet points for the
text
Animation: appear from
right and stays.

Identify visitors by name,


company and access
levels.
Differentiate between
authorized and
unauthorized personnel,
access, and times.
Now click on the next
button to learn about the
current tenants and their
current personnel

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 6

Lesson #: [lesson title


322122628

Screen
Info
Data wave

Text

Data Wave
(Building A)
Access level A
Click on the building to
find out who works
there now.
Layer text
Michael Stan(Contact
person 1)

Audio
This is building A. The
current tenant of this
building is Data Wave.
Data Wave employees
have level A access
Click on the building to
learn the current
personnel who are
authorized in this building.
Remember Michael Stan
is the contact person for
Data Wave

Graphics
Building A

Programming
Notes
Title font 24 rest 20
Place logo on the
bottom right
Animation: Data Wave
appears first and stays
The list of names
appear in a layer when
the user clicks on the
building

Steven Walker
Amalia George
Amit Kumar
Katherina Henderson

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 7

Lesson #: [lesson title


322122628

Screen
Info

Text
DDPS
(Building B)

DDPS

Access level B
Layer text
Daniel Kelvin (Contact
person )
Jared Martinez
Reyes Philips

Audio
And this is building B,
DDPS. Is the tenant
company currently
occupying this building.
Click on the building to
learn more about the
current personnel who are
authorized in this building.

Graphics
Building B

Programming
Notes
Font size 20 for all text

The word DDPS


appears first and stays
The rest appear
together and stays

Remember Daniel Kelvin


is the contact person for
DDPS

Chris Christopher
Jonas Markos
Peter Gallagher

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 8

Lesson #: [lesson title


322122628

Screen
Info
SVDC

Text

SVDC Personnel
Engineers:
Access level 3
Layer text 1
Ricardo Baros
Gill Michaels
Dan Baldwin

Office personnel:
Access Level 1
Layer text 2

Audio
This building C. The main
Silicon Valley Data
Centers Building.
Remember that not every
one of the SDVC
employees have the same
access.
While engineers have
level three or grand
master access, office
personnel have only level
one access, and they are
not allowed to be
anywhere near tenant
spaces.

Graphics
Office tools and work
tools
Picture of building C

Programming
Notes
Use the two content
layout for this one for
engineers one for office
personnel. With the title
SVDC personnel; on
top of the two contents
or sub headings
Animation: tools appear
when engineers are
mentioned ,
Office equipment
appear when office
personnel is mentioned.
The shaded text should
appear in layers

Click on the tools to learn


the current personnel for
each category.

James shepherd
Ben McKinley
Andros Goldstein
Carolina Durham
Amal Jemal
Click on the tools
[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 9

Lesson #: [lesson title


322122628

Screen
Info

Text
Access levels

Access levels

Level One : SVDC


office employees
Text on icon: Allowed
here, Main gate,
Pedestrian gate, Lobby,
Break room
Level two : SVDC
Contractors

Audio
In this section you will be
introduced to the different
access levels. Each
access level defines
where a particular person
is authorized to be.
Click on the location icon
to learn the access levels
for each. Click away to
close.

Graphics
None

Programming
Notes
Font size title 44

The rest 24.


The normal text is what
appears on the slide
The text on icon is just
an instruction and does
not appear on any page
The highlighted text
appears on the location
icons when clicked.

Text on icon. Electrical


Rooms IT room
,Cooling Towers,
Level three: Engineers,
Security and
management.
Text on icon Grand
Master access All
Places including all
tenant space
Level A: Data Wave
icon text Main gate,
pedestrian gate,
building A , main lobby.
Level B: DDPS icon
text Main gate,
[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 10

Lesson #: [lesson title


322122628

Screen
Info
Authorized
hours

Text
Authorized Access
hours
SVDC security,
management, and
engineers: 24/7
SVDC office Personnel:
Mon-Fri 07:00am05:00pm
SVDC contractors:
Mon-Fri 07:00am
-06:00pm

Audio
The authorized hours
access defines during
which times a particular
person is authorized to be
in a particular building or
place.
It is important to memorize
who is authorized and
who is not based on the
time limits of their access.

Graphics
None

Programming
Notes
Font size for
Authorized access
hours 16
The names of
companies 14
The times 12
Use different color hues
for title, company and
times.

All Tenants: 24/7


Tenant contractors:
Mon-Fri 07:00am
-06:00

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 11

Lesson #: [lesson title


322122628

Screen
Info
Keep in mind

Text
Keep in mind.
Each personnel is
allowed in their
respective buildings
only.
Each personnel is
allowed to be on site
during their authorized
hours only

Audio
Pay attention to the
following important
information.

SVDC Office Personnel


are NOT allowed
anywhere near tenant
spaces.

SVDC Office Personnel


are not allowed anywhere
near tenant spaces.

[Unit name]
Version (// : /P )

Bullet points
Animation text flies
from right

Each personnel is allowed


to be on site during their
authorized hours only
Data Wave and DDPS
employees are allowed to
be only in building A and B
respectively.

No access is given to
guests. All guests must
be escorted at all times.

None

Programming
Notes

Each personnel is allowed


in their respective
buildings only.

Data Wave and DDPS


employees are allowed
to be only in building A
and B respectively.

Landscaping personnel
are restricted to the
parking lot and the
outside buildings only

Graphics

Landscaping personnel
are restricted to the
parking lot and the outside
buildings only
No access is given to
guests. All guests must be
escorted at all times.

[Company Name] Confidential


Page 12

Lesson #: [lesson title


322122628

Screen
Info
Knowledge
check

Text
Knowledge check 1
Click on the oval
shapes and see how
much you remember
SVDC engineers can
be on site:
Data Wave employees
are allowed to be only
in building:

[Unit name]
Version (// : /P )

Audio
Now lets have some fun
activity and see how much
of the information you can
remember

Graphics
Female character
cropped to the waist.
Expression neutral

Programming
Notes
Change expression to
happy if correct or
alarmed if wrong.

Read the questions and


click on the oval shapes to
indicate your choice
Proceed to the next slide
to learn a few more of the
important things you
should pay attention to.

[Company Name] Confidential


Page 13

Lesson #: [lesson title


322122628

Screen
Info
Important
notes to
remember

Text
Important points to
remember when
dealing with all
personnel
Mention you are
security
Be brief
Keep the list of names
by your side

Audio
When dealing with all
personnel. Remember

Graphics
None

Programming
Notes
Objects appear one at
a time and stays

To Mention that you are


SVDC Security officer and
ask for names
To Be brief and limit your
sentences to a maximum
of two.
To Make sure you have
the list of expected people
by your side when
speaking.
Proceed to the next slide
to learn a few of the
different question you may
need to ask.

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 14

Lesson #: [lesson title


322122628

Screen
Info

Text

Audio

Questioning

Examples of questions.

What to say?

Can I have your name


please?

Here is a list of question


that you may find yourself
asking when dealing with
clients, visitors and
guests.

Who are you here to


see?
Is he/she expecting
you?

Graphics
None

Programming
Notes
Only five questions per
slide
Use a new slide for the
second set of questions

Remember these are only


suggestions and not the
only ways of asking /

Do you have an
appointment?
More ways of asking
questions
Who is your contact
person?
Does he know you are
here?
What company do you
represent ?
Have you ever been
here before?
Is this your first time
here?

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 15

Lesson #: [lesson title


322122628

Screen
Info
Never do the
following

Text
Ask people a leading
question that makes it
easy for them to say
yes. Examples of such
questions might be as
follows
Are you James?
Didnt you work here
last week?

Audio
Now see the kind of
questions that you should
never ask when trying to
verify identity.. One is a
leading question that
makes it easy for the
person to say yes. Such
questions may look like .

Graphics
None

Programming
Notes
Use animations and
introduce content
separately.

Are you James?


Didnt you work here last
week?

Give access to guests


without properly
verifying authorization.
If you cant verify, let
the person wait.

Note that they can easily


say to these questions
and you might give access
to the wrong person
Another thing you should
never do is give access to
people without properly
verifying their
authorization. It is better to
keep the person waiting
than give him or her
unauthorized access that
could have dire
consequences.
Remember that tenants
try to test you from time to

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 16

Lesson #: [lesson title


322122628

Screen
Info
How to verify
identity

Text

Audio

Verifying identity (title


)

Alright. Now lets see how


you can verify identity.

A person holding a
paper (graphics 1)

Using the list (sub


title 1)

You can verify identity in


two ways. One is using
the list. Check if the name
of the person is in the list
of expected guests. You
should also check the
expected time of arrival
with the actual time of
arrival.

A person on the phone


(graphics 2)

Check the list


Check the time
Checking with the
contact person (sub
title 2)
Call the contact
Give or deny access

Another way of verifying is


by Checking with the
contact person
Call the contact persons
and ask them if they are
expecting guest. Finally
decide to give or deny
access based on your
findings. .

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 17

Graphics

Programming
Notes
Font size for title 16
Sub titles 14
The rest 12
Use the side by side
template with the title
on top
Graphics 1 appears
and dissolves for the
first sub title ( using the
list)
Graphic 2 appears and
dissolves for the
second sub title 2
( using the list)
Both graphics to be
replaced by the text
that stays

Lesson #: [lesson title


322122628

Screen
Info

Text
Exercises

Practice
exercise
Transition
slide.

Practice activities (D0


and connect Exercises
)
This is not a graded
exercise and you can
practice as much as
you want
The purpose of this
exercise is to help
cement your mastery of
the different names of
companies, access
levels and authorized
hours .

Practice 1

It is Sunday morning.
Who should not be on
site?
Michael Stan , Carolina
Durham, Jonas
Markos

[Unit name]
Version (// : /P )

Audio
Okay, now lets see if you
can remember what you
have been learning so far.

Graphics

Programming
Notes

None

Continue trigger button


that leads to the
practice question slides

3 characters with
names in oval shapes

Use the characters as


controls with feedback

Remember this is just a


practice exercise, and you
can practice as much as
you need to.
The main purpose of this
exercise is to help your
mastery of the different
names of people and
companies, access levels
and time of authorized
access.
Click the next button to
continue.

Based on their access


level, who should not be
on site on a Sunday
morning?
Click on the oval shapes
to indicate your choice

[Company Name] Confidential


Page 18

Lesson #: [lesson title


322122628

Screen
Info
Practice 2

Activity 3

Text

Audio

Graphics

Programming
Notes

In which building do
you think DDPS
employee Jonas
Markos is likely to be
in? (Click on the oval
shapes to indicate the
building)

In which building do you


think DDPS employee
Jonas Markos is likely to
be in? (Click on the oval
shapes to indicate the
building)

Buildings A, B, C

Use the oval shapes as


controls with feedback

Match the access levels


to the right personnel

Drag and drop the tiles to


match the access levels to
the right personnel

None

If correct. That is
correct.

Level A

Engineers

Level B
Office

SVDC

Level 1

DDPS

Level 2

Data Wave

Level 3

SVDC

If wrong, Oops! That


does not look right. Try
again.

Contractors

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 19

Lesson #: [lesson title


322122628

Screen
Info
Activity 4

Text
Match the authorized
hours with the right
personnel
Column A

Audio

Graphics

Drag and drop the tiles to


match the authorized
hours with the right
personnel

None

Which of these people do


you think has access to
the IT room? Indicate
your choice by clicking on
the character

Three characters

Programming
Notes
If right. That is correct!
If wrong. Oops! That
does not look right.
Please, try again.

Data Wave employees


SVDC officer Personnel
Land scaping workers
Column B
24/7
Mon Fri 7am 5 pm
Week ends
Activity 5

Click on the one who


has access to the IT
room?

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 20

Layers with feedback

Lesson #: [lesson title


322122628

Screen
Info
Activity 6
Scenario
based

Text

Audio

Graphics

Carolina of SVDC
office approaches you
in a hurry and told you
she is going to miss her
flight because she had
left her passport in the
DDPS office where she
was invited for lunch
earlier today. She asks
you if you could give
her access so that she
could quickly grab her
staff and leave.

Carolina of SVDC office


approaches you in a hurry
and told you she is going
to miss her flight because
she had left her passport
in the DDPS office where
she was invited for lunch
earlier today. She asks
you if you could give her
access so that she could
quickly grab her staff and
leave.

Thumbs up and thumbs


down images. (my
documents )

What would you do?


Indicate your decision
by clicking the thumbs
up to give or thumbs
down to deny request.

[Unit name]
Version (// : /P )

Programming
Notes
Layers for feedback

What would you do?


Indicate your decision by
clicking the thumbs up to
give or thumbs down to
deny request.

[Company Name] Confidential


Page 21

Lesson #: [lesson title


322122628

Screen
Info

Text
What would you like to
do ?

Transition slide

Take test
Go Back to training

Audio
Good job. You have done
well to reach here. Click
on Take test to take the
test or click on go back to
training if you would like to
go over the slides again.

Graphics
None

Programming
Notes
Two trigger boxes
marked Take Test and
Go Back to Training
If take test: lead to
test questions
If return to training go
to first page or the start
screen.
No need to re-enter the
name

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 22

Lesson #: [lesson title


322122628

Screen
Info
Test Intro

Text
This is the last
part of the
training. You
need to score a
100% to get a
passing grade. If
you think you
need more
training, please
return to the
notes.
If you feel you
are ready, click
on the start
button to start
the test
questions.

Audio
This is the last part of the
training. You need to
score a 100% to get a
passing grade. If you think
you need more training,
please return to the notes.

Graphics

Programming
Notes
Disable retake quiz

None

Allow review quiz

If you feel you are ready,


click on the start button to
start the test questions.
You can take the test only
one time.

You can take the


test only one
time.

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 23

Lesson #: [lesson title


322122628

Screen
Info
Test question
1

Text
You should give access
to people only if they

Audio
None

Graphics
None

Programming
Notes
The correct answer is
C.

a. claim to be of
high authority

No feedback for this


scene

b. they call you by


name

The test questions


appear in a new scene

c. are authorized.
Only if you identify him /
her as authorized

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 24

Lesson #: [lesson title


322122628

Screen
Info
Test question 2

Text
Match the personnel
type on the left to the
correct access level on
the right

Audio
None

Graphics
None

Programming
Notes
Select from drop down
menu questions
Correct answers for
questions 1-5 are A to E
respectively. Mix up the
order

Column A
1. SVDC office
personnel
2. SVDC
contractors
3. SVDC engineers
4. Data Wave
employees
5. DSSP
Colum B
A, Level 1
B, Level 2
C, Level 3
D, Level A
E, Level B

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 25

Lesson #: [lesson title


322122628

Screen
Info
Test question 3

Text
Match the following
names of people to
their respective
companies

Audio
None

Graphics
None

Programming
Notes
Drag and drop
questions
The answers for 1, 2, 3
are a. b. c. respectively.

Column 1

Mix up the order

1.DSSP

No need to use
numbers or letters

2. Data Wave
3. SVDC Officer
Column 2
a. Building A
b. Building B
c. Building C

[Unit name]
Version (// : /P )

[Company Name] Confidential


Page 26

Lesson #: [lesson title


322122628

Screen
Info
Test question 4

Text
Which of the following
is NOT the right way of
acquiring information

Audio
None

Graphics
None

Programming
Notes
Bold is the correct
answer.
No feedback for this
questions

Are you expected?


. Do you have an
appointment?
.
Are you Michael
Stan?

Test question 5

These employees claim


they forget their badge
and ask you to let them
into the building below.
Who would you give
access to? Indicate
your choice by clicking
on the names below
the characters.

[Unit name]
Version (// : /P )

None

Three characters
Building A .

[Company Name] Confidential


Page 27

Use the thumbs as


buttons

Lesson #: [lesson title


322122628

Screen
Info
Results slide

Text
Congratulations!! You
have passed the
course
Or
Your results show you
need to take the
training again .please,
click back to training
to retake the course

[Unit name]
Version (// : /P )

Audio
Passed layer.
Congratulations. You have
successfully completed
the course. Click exit to
close the program
Or

Graphics
None

Programming
Notes
If result is Pass show
Exit button
If result is fail show go
back to training button
Allow review quiz
Do not allow retry quiz

Failed layer
Your results show you
need to take the training
again. Please, click go
back to training to retake
the course.

[Company Name] Confidential


Page 28

Lesson #: [lesson title


322122628

You might also like