CAD Resources



As-Built Drawings
The Galaxy Control Systems engineering team has put together a series of As-Built drawings to assist our integrators with site proposals, commissioning, and/or site planning. These drawings are available for use by qualified GCS surveyors, consultants, or technicians.

635 Series Board Only

CAD drawings of the individual 635 component boards. These are basic outline/major components only – and are best suited for tasks like wiring diagrams. They are available in bitmap and dxf format.

TinyCAD is a program for drawing electrical circuit diagrams commonly known as schematic drawings. It supports standard and custom symbol libraries.

System Galaxy ARCAT Specification


Needing some LU/HSW credits? As an authorized AIA provider, Galaxy offers on-site, instructor led sessions centering around Access Control, Security, Incident Command & Emergency Planning.

Future courses will be listed as they are available.

For More Information, Contact:

Scott Baldwin
Galaxy Control AIA Administrator
Access101-The Basics


Electronic Access Control (EAC) is a swiftly evolving component in the Security puzzle. In order to recognize the benefits of new technologies, one needs to have the basic understanding of access control architecture, components & functionality. This course will be an introduction to electronic access control touching on all major facets of an access control system. Starting with a ‘typical’ application, all required components will be identified and described.

Learning Objectives:

  • Identify & understand the operation of door/portal components.
  • Understand how integrated systems can save time & increase functionality.
  • Evaluate project requirements & determine system topology applying examples in this course.
  • Describe which credentials are most effective and secure.

Intro into Emergency Planning/Incident Command


Encompassing much more than just physical space, an introduction into Incident Command/Emergency Planning will give the attendee the broad overview of major components & resources.

Learning Objectives:

  • Participants will be able to refine existing security protocols by assigning degrees of resource typing usage when assisting clients to identify and leverage assets.
  • Participants will be able to apply established operational ICS/NIMS protocols by clearly communicating the ICS/NIMS hierarchy when assisting clients with Emergency Operations Plan development.
  • Participants will be able to assess risks in any environment by identifying all stakeholders when assisting clients to evaluate risk mitigation policies.
  • Participants will be able to demonstrate Incident Command Structure (ICS) and National Incident Management System requirements (NIMS) by providing the client with specific examples, guidelines and exercises.

Access Control in the Cloud


The internet is everywhere. As the availability of ‘reliable’ connectivity increases, so does the opportunity for product and services to take advantage of the internet as a resource. Also known as ’The Cloud’, or ‘Cloud Computing’, it offers programs & services that are de-centralized and maintained by cloud service providers. This course identifies and defines in general terms the basics of the cloud in everyday life and applies those terms specifically to cloud-based/Hosted physical access control.

Learning Objectives:

  • Attendees will understand what the ‘Cloud’ in its basic form is. Using everyday examples, the cloud will be demystified, and terms defined allowing the attendee to identify their own personal experiences in the ‘cloud’ for a relatable comparison to the course topic.
  • Attendees will learn common industry terms/definitions that apply to cloud based access control. Utilizing these terms, the attendee will discover the differences (both physically & functionally) of cloud-based hosted solutions vs. traditional on-premise. The course will demonstrate the importance of meeting the facility’s needs to gain a greater adoption and compliance of the access system by administrators & users, resulting in a more secure environment.
  • The attendee will get a better understanding of the security concerns of cloud-based systems. Identify the important features to look for when evaluating in-cloud access control solutions, and how those features protect the integrity of the access control system from outside threats. Attendees will understand how the ‘hardening’ of systems against the risk of outside threats is critical for system security, as well as, business continuity
  • Applying information learned in this course, the attendee will be shown how to recognize opportunities for in-cloud hosting vs. on-premise systems. Benefits (LEEDS/power consumption/ hot-redundancy/etc.) will be defined and used in real-world examples to help determine the best access control model to use. Identifying and applying the correct model will help the end-user meet their security requirements of protecting their employees and property, while taking full advantage of the benefits & features that are important to them.