Length : 8 Weeks
CEU Credits : 3.5
Course Hours : Online Course - Refer to Syllabus
Dates: September 14, 2020 to November 13, 2020
Make sure to use HOUS2020 for $200 discount
|ISA’s CyberU online instructor-led training course offers the benefit of a high-quality ISA training course with the added advantage of studying at your own pace in the office, at home or while traveling.|
This online course utilizes online training modules, additional text materials, online evaluations, and email discussions. Students will have access via email to an instructor and have an opportunity to participate in live Q&A sessions with the instructor and other class participants. The course focuses on the engineering requirements for the specification, design, analysis, and justification of safety instrumented systems for the process industries. Students will learn how to determine safety integrity levels and evaluate whether proposed or existing systems meet the performance requirements.
This CyberU course runs for seven (7) weeks. You will have access to seven online modules for a web/audio session. Each module takes approximately 60 minutes. Your course syllabus will guide you through the course modules, provide assignments, and the schedule for live Q & A sessions.
Certificate Program (if available) A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. Your course registration includes your registration for the exam.
You will be able to:
- Define safety instrumented system.
- Discuss how regulations have resulted through lessons learned from high profile process industry accidents.
- Determine which ANSI/ISA, AIChE, and IEC guidelines and standards are relevant in industry.
- Identify the Scope of ISA 61511
- Discuss strategies for the management of functional safety
- Identify the stages of the safety design life cycle.
- Identify available safety layers for an IACS
- Discuss the importance of “defense in depth” concept
- Identify how SISs are used to reduce risk.
- Categorize risk using a PHA
- Determine SIL using qualitative methods
- Determine performance requirements for each SIL
- Conduct a LOPA
- Discuss LOPA methodology
- Develop guidelines for LOPA
- Determine risk tolerance
- Identify resources for cyber security in an IACS
- Identify failure modes and the risks involved with each
- Identify hardware modeling techniques (SIL verification.)
- Explain the impact of redundancy on failure rates.
- Demonstrate the use of fault tolerance tables.
- Develop an SRS
- Explain the pros and cons of relay logic systems
- Explain the pros and cons of microprocessor systems (PLC)
- Discuss the pros and cons of pneumatic systems
- Identify typical field devices in an IACS
- Discuss impact of field devices on system performance
- Explain Center for Internet Security (CIS) Benchmarks
- Explain pros and cons of using certification vs prior use devices.
- Explain the FAT process.
- Explain installation and commissioning process.
- Explain the validation process
- Identify priorities of the operation and maintenance phase.
- Identify safety requirements for MOC
- Identify documents to maintain for SRS
You will cover:
|· Module 1: Background, Scope, Management Issues, The Life Cycle|
|· Module 2: Hazard and Risk Assessment, Selecting SILs|
|· Module 3: Layer of Protection Analysis (LOPA) and Cybersecurity|
|· Module 4: Reliability and Modeling Issues|
|· Module 5: SRS and Logic Solver Technologies|
|· Module 6: Field Devices, Certification, Miscellaneous Design Issues|
|· Module 7: FAT and Beyond|