BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200901T080000
DTEND;TZID=America/Chicago:20201024T170000
DTSTAMP:20260407T155158
CREATED:20200821T004727Z
LAST-MODIFIED:20200821T004913Z
UID:10000047-1598947200-1603558800@www.houstonisa.org
SUMMARY:ES10E Applying Instrumentation in Hazardous Classified Locations E-Course
DESCRIPTION:Location: Online  \nDescription: This self-paced\, online course provides a systematic approach to specifying and implementing instrumentation in hazardous locations.  Related standards from National Fire Protection Association (NFPA)\, National Electrical Manufacturers Association (NEMA)\, International Electrotechnical Commission (IEC)\, American Petroleum Institute (API)\, and ISA are discussed. \nCertificate Program (if available) A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \n  \nMake sure to use HOUS2020 for $200 discount\n  \nYou will be able to:   \n\nIdentify process and environmental factors that determine classification\nDescribe and use procedures for electrical classification\nUse applicable standards to develop classification drawings for gases\, dusts\, and fibers\nDescribe the basic principles of protection\nSelect explosion proof apparatus for specific applications\nDetermine when and why explosion seals should be used\nSpecify the use of intrinsically safe and nonincendive systems\nSelect the appropriate protective techniques for different hazards\nSelect alternative protective techniques for reduced cost\nSpecify devices\, design methods and safe construction approaches per National Electrical Code NFPA 70\nPrepare electrical maintenance plans in these classified areas per National Electric Recommended Practice NFPA 70B\nPerform safe operation in these classified areas per National Electric Standard for Work Place Safety NFPA 70E\n\nYou will cover:  \n\n\n\n·         Pre-Exam: Students are asked to take the pre-exam\, which includes questions related to the subject matter areas. Answers will be provided to assess their knowledge\, prior to beginning the course material. \n·         Module 1: Introduction & Location Classification Standards\n\n\n·         Module 2: Class I Division & Zone Classification\n\n\n·         Module 3: Class I Zone (Alternative) & Class II Division Classifications\n\n\n·         Module 4: Class II Division & Zone Classification for Dusts\n\n\n·         Module 5: Protection Technique Standards & Enclosure Types\n\n\n·         Module 6: Explosion Proof Enclosures \n\n\n·         Module 7: Intrinsic Safety\n\n\n·         Module 8: Non-incendive Systems \n·         Module 9: Pressurization & Purging \n·         Module 10: Other Types of Protection \n·         Module 11: Maintenance Considerations \n·         Final Examination
URL:https://www.houstonisa.org/event/es10e-applying-instrumentation-in-hazardous-classified-locations-e-course/
LOCATION:TX
CATEGORIES:Training,Ansi-ISA95
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200901T080000
DTEND;TZID=America/Chicago:20201024T170000
DTSTAMP:20260407T155158
CREATED:20200821T005452Z
LAST-MODIFIED:20200821T010827Z
UID:10000082-1598947200-1603558800@www.houstonisa.org
SUMMARY:ES10E Applying Instrumentation in Hazardous Classified Locations (September) E-Course
DESCRIPTION:About this course: ISA’s online instructor-assisted training courses offer the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home\, or while traveling. \nThis online course utilizes pre-recorded training modules\, additional video/simulation modules\, as well as e-mail and live discussions. Students will have access via email to an instructor throughout the course\, as well as a listserve to communicate with other students in the class. \nThis online\, self-paced course runs for eight (8) weeks. You will have access to 11 online modules\, each taking approximately 60 minutes. Your course syllabus will guide you through the course modules and provide assignments and opportunities to interact with the instructor and other course participants. \nMake sure to use HOUS2020 for $200 discount\nDates/Length: September\, 8 weeks \nDescription: This self-paced\, online course provides a systematic approach to specifying and implementing instrumentation in hazardous locations. Related standards from National Fire Protection Association (NFPA)\, National Electrical Manufacturers Association (NEMA)\, International Electrotechnical Commission (IEC)\, American Petroleum Institute (API)\, and ISA are discussed.
URL:https://www.houstonisa.org/event/es10e-applying-instrumentation-in-hazardous-classified-locations-september-e-course/
LOCATION:TX
CATEGORIES:Training,Ansi-ISA95
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200903
DTEND;VALUE=DATE:20201201
DTSTAMP:20260407T155158
CREATED:20200903T161033Z
LAST-MODIFIED:20200911T212155Z
UID:10000088-1599091200-1606780799@www.houstonisa.org
SUMMARY:IC32E Using the ISA/IEC 62443 Standard to Secure Your Control Systems E-Course
DESCRIPTION:Course Hours: Online Course – Refer to Syllabus\nCertification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course.Part of the ISA/IEC 62443 Cybersecurity Certificate Program\nYour course registration includes your registration for the exam.\n\n\n\n\nISA’s CyberU online instructor-led training courses offer the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home\, or while traveling. \nThis online course utilizes online training modules\, additional text materials\, online evaluations\, and e-mail discussions. Students will have access via email to an instructor and an opportunity to participate in live Q&A sessions with the instructor and other class participants. \nThis CyberU course runs for eight (8) weeks. You will have access to twelve online modules for the web/audio sessions. Each module is between 20 to 60 minutes. Your course syllabus will guide you through the course modules and provide assignments and the schedule for the live Q&A sessions. \n  \nMake sure to use HOUS2020 for $200 discount\n  \nDescription\n  \nA detailed look at how the ISA/IEC 62443 (formerly ISA 99) Standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.  The course explores the move to using open standards such as Ethernet\, TCP/IP\, and web technologies in SCADA and process control networks that has begun to expose these systems to the same cyber-attacks that have wreaked so much havoc on global government and corporate information systems. \n  \nYou will be able to:\n\nDiscuss the need and importance for control system security\nLearn about current principles and best practices\nUnderstand the structure and content of the ISA 99 / IEC 62443 series of documents\nDiscuss the principles behind the creating an effective long term program security\nLearn the basics of risk analysis\, industrial networking and network security\nUnderstand the concepts of defense in depth and zones and conduits\nLearn how to apply key risk mitigation techniques such as anti-virus\, patch management\, firewalls and virtual private networks\nLearn how secure software development strategies can make systems inherently more secure\nLearn what is being done to validate or verify the security of systems\n\n  \nYou will cover:\n  \nModule 1: Using the ISA/IEC 62443 Standards to Secure Your Control Systems\nProvides a basic introduction to control system cyber security and the ISA/IEC 62443 standards.  Discussion of trends\, regulations\, industry standards and best practices\, common myths\, the ISA 99 committee\, and the structure of the ISA 62443 standard.  Topics include:  Self-assessment of your Control Systems Security knowledge\, Trends in control system cybersecurity\, Potential Impacts\, Five common myths regarding IACS Security\, Regulations and Standards\, ISA99 committee work. \nModule 2: Terminology\, Concepts\, Models and Metrics\nCovers the material in ISA 62443-1-1 (published as ISA-99.00.01:2007) that forms the basis for the ISA 62443 series of standards.  Topics include: Difference between IT and IACS\, Security Objectives\, Defense-in-Depth\, Risk Assessment\, Policies\, Zones & Conduits\, Security Levels and the Security Lifecycle Models \nModule 3: Threats and Vulnerabilities\nProvides a basic introduction to networking with a focus on the application of Ethernet in the industrial environment.  Topics include: Types of networks\, OSI reference model\, Network Devices\, Network Protocols\, Network Tools built into Operating Systems. \nModule 4: Industrial Networking Basics L1-L3\nBuilds on the previous module and covers networking with a focus on the upper layers of the OSI reference model\, problems with the OSI model\, network discovery\, and security auditing tools in the industrial environment.  Topics include: Encapsulating data\, OSI reference model\, Network Devices\, Network Protocols. \nModule 5: Network Security Basics 101\nProvides a basic introduction to network security.  Topics include: Security Appliances\, Network Segmentation\, Encryption\, Secure Protocols and Intrusion Detection.  Topics include:  Why address security? Firewalls\, Network Segmentation Architectures\, Encryption\, Intrusion Detection\, Monitoring Network Traffic. \nModule 6: Industrial Protocols\nCovers at a high level the structure and application of common industrial protocols such as MODBUS\, PROFIBUS\, OPC and CIP (EtherNet/IP).  Topics include:  What is a protocol?  Multitude of Industrial Protocols\, Ports in use. \nModule 7: Establishing an Industrial Automation and Control Systems Security Program\nCovers the material in ISA 62443-2-1 (published as ISA-99.02.01:2009) that specifies the elements and requirements of an IACS Cyber Security Management System (CSMS).  Topics include: Six top level activities\, Common pitfalls\, Risk Analysis\, Security Policy\, Organization and Awareness\, Personnel security\, Physical & Environmental Security\, Network Segmentation\, Access Control\, Change Management\, Patch and Anti-virus management\, Information management\, Incident Response and Disaster Recover Planning\, Compliance Monitoring\, and Program Maintenance. \nModule 8: Security Risk Assessment and System Design\nCovers Security Level definitions and Foundational Requirements that establish a basis for the requirements in scoping an IACS assessment\, establishing zones & conduits\, analyzing the security risk for each zone\, assigning a security level target to each zone and verifying the design satisfies the security level target.  Topics include:  Definitions\, Risk Equation\, Cyber Risk Reduction Factor\, Basic Security analysis tools\, Identification of Zones and Conduits. \nModule 9: Intro to the IACS Cybersecurity Lifecycle\nShort jaunt into the Assess\, Develop & Implement and Maintain phases of the IACS Cybersecurity Lifecycle.  These phases are covered more in depth in ISA’s IC33\, IC34 & IC37 courses.  Topics include:  Cyber Security Life Cycle diagram\, Phases\, Continuous processes. \nModule 10: Security Program Requirements for IACS Service Providers\nCreating a secure product out of the box is only a small piece of the security puzzle.  Asset Owners\, Integrators and Suppliers all have a role.  This module covers how IEC 62443-2-4 specifies requirements IACS service providers can offer to the asset owner during integration and maintenance activities of an Automation Solution.  Topics include:  IACS Patching\, Asset Owner Requirements\, Product Supplier/Service Provider Requirements\, Malicious Code Protection. \nModule 11: Developing Secure Products and Systems\nOverview of component tier Product Development Requirements and Technical Security Requirements for IACS that are Product supplier centric.  Topics include:  Component tier standards ISA-62443-4-1 & ISA-62443-4-2\, Primary & Secondary goals\, ISA 62443 relationships\, ISA Security Compliance Institute (ISCI)\, ISASecure™. \nModule 12: Evolving Security Standards and Practices\nStandards are voluntary documents unless there is a requirement to use them.  In this module\, we look at the continuously evolving industrial security regulatory landscape.  The only constant is change!  Topics include:  Normative and Informative elements\, NIST Cyber Security Framework\, ISA-62443-2-1 requirement to monitor and evaluate applicable legislation relevant to cyber security\, Standards Development Organizations (SDOs). \nCourse Materials (PDF format):\n\nIC32E v2.0 Course Syllabus\nIC32E v2.0 Noteset Volume I with sections on Course Presentation slides from course modules\, Instructional Surveys/Answers and Additional Resources\nIC32E v2.0 Noteset Volume II with the following three publications\nANSI / ISA 99.00.01-2007 / IEC 62443-1-1: Security for Industrial Automation and Control Systems Part 1: Terminology\, Concepts\, and Models (Approved 29 October 2007)\nANSI / ISA 99.00.02-2009 / IEC 62443-2-1: Security for Industrial Automation and Control Systems Part 2: Establishing an Industrial Automation and Control System Security Program\nISA-62443.03.03 / IEC 62443-3-3: Security for Industrial Automation and Control Systems: System Security Requirements and Security Assurance Levels\nTextbook: Industrial Automation by Ronald L. Krutz (Second Edition)\n\n  \nFeatures of ISA CyberU online course:\nOnline Pre-recorded Course Modules\nYour instructor has pre-recorded each course module so that you can access the course presentations on your schedule. Each module is a web/audio session that takes approximately 20 – 60 minutes. \nAsk the Expert\nInteract with your expert instructor via email throughout the course and through scheduled live Q&A sessions. You can expect a reply to your email within 24 hours. This email address is active during the entire course duration. \nThe Q&A sessions provide an opportunity for you and your classmates to speak one-on-one with the instructor. You will have an opportunity to ask any questions you may have about the course material and interact with your fellow classmates. \nClass Discussions\nYou will be invited to subscribe to a course listserve that includes course participants. You can use this listserve to post questions and share experience relevant to the course with other class members. \nCourse Assignments and Exams\n\nTake the course pre-test before you begin studying the course material to get a better understanding of areas that you will want to focus on more during the course.\nHomework assignments for all modules will be indicated on the syllabus. The homework assignments are designed to help expand your understanding of the course material.\nComplete the final exam for the course in order to receive Continuing Education Units (CEU) credit. The final exam will be taken and scored online. You must receive at least 80% on the course exam to receive CEU credit. (Note this exam is not the ISA/IEC 62443 Cybersecurity Fundamentals Specialist Exam)
URL:https://www.houstonisa.org/event/ic32e-using-the-isa-iec-62443-standard-to-secure-your-control-systems-september-october-e-course/
LOCATION:TX
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200903T080000
DTEND;TZID=America/Chicago:20200930T170000
DTSTAMP:20260407T155158
CREATED:20200903T161026Z
LAST-MODIFIED:20200903T161026Z
UID:10000085-1599120000-1601485200@www.houstonisa.org
SUMMARY:IC32M  Using the ISA/IEC 62443 Standard to Secure Your Control Systems M-Course
DESCRIPTION:Dates: Self-paced \nLength:  : 12 Modules of Varying Length \nCEU Credits:  1.0 \nLocation: Online \nDescription: This is a self-paced\, online course consisting of 12 modules which take a detailed look at how the ISA/IEC 62443 (formerly ISA 99) Standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. The course explores the move to using open standards such as Ethernet\, TCP/IP\, and web technologies in SCADA and process control networks that has begun to expose these systems to the same cyber-attacks that have wreaked so much havoc on global government and corporate information systems \n  \nMake sure to use HOUS2020 for $200 discount!\n  \nCertificate Program (if available) Part of the ISA/IEC 62443 Cybersecurity Certificate Program. After successfully completing all twelve modules\, students may take the exam for ISA/IEC 62443 Cybersecurity Fundamentals Specialist. Exam fee is included with course purchase. \nYou will be able to:   \n\nDiscuss the principles behind creating an effective long term program security\nInterpret the ISA/IEC 62443 industrial security framework and apply them to your operation\nDefine the basics of risk and vulnerability analysis methodologies\nDescribe the principles of security policy development\nExplain the concepts of defense in depth and zone/conduit models of security\nAnalyze the current trends in industrial security incidents and methods hackers use to attack a system\nDefine the principles behind the key risk mitigation techniques\, including anti-virus and patch management\, firewalls\, and virtual private networks\n\n  \nYou will cover:  \n\nUnderstanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same\nHow Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks\nCreating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nRisk Analysis:  Business Rationale | Risk Identification\, Classification\, and Assessment\nAddressing Risk with Security Policy\, Organization\, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness\nAddressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control\nAddressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management\nMonitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS\nValidating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems\n\nLaboratory Demo: \nPCAP Live Capture Analysis
URL:https://www.houstonisa.org/event/ic32m-using-the-isa-iec-62443-standard-to-secure-your-control-systems-m-course/
LOCATION:TX
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200914
DTEND;VALUE=DATE:20201220
DTSTAMP:20260407T155158
CREATED:20200912T072745Z
LAST-MODIFIED:20200912T072801Z
UID:10000010-1600041600-1608422399@www.houstonisa.org
SUMMARY:TS02E Certified Control Systems Technician (CCST) Level II Exam Review Online E-Course
DESCRIPTION:Description: This is a fast-paced review of the knowledge and skills necessary for technicians with 7+ years of practical experience who are preparing to sit for the CCST Level II exam. An explanation of the requirements\, examination process and practice certification-type exams are provided. \nMake sure to use HOUS2020 for $200 discount\nrequirements\, examination process and practice certification-type exams are provided. \nCertificate Program (if available)  Certified Control System Technician Certificate \nYou will be able to:   \n\nUnderstand CCST program\nUnderstand basic concepts of process control\nUnderstand the use of instrument air and requirements\nUnderstand P&ID documentation and symbology\nUnderstand basic measurements\nUnderstand how to use temperature instrumentation\nUnderstand how to measure and regulate pressure and flow\nUnderstand how to measure and regulate level\nUnderstand how to use analyzers\nUnderstand how to operate control systems safely\nUnderstand new technologies in control systems and how numbering systems such as decimal\, binary and hexadecimal are used\nUnderstand basics of PLC and protocol requirements\nExplain Fieldbus and Communications protocols used in control systems\nUnderstand use of SCADA for control systems. Explain fiber optics options for control systems.\nUnderstand process dynamics (response to change) in control systems\nUnderstand how control actions affect functionality\nUnderstand how to use proportional control actions\nUnderstand objectives of tuning . Explain various tuning methods and identify when to use each.\nUnderstand how manipulating variables effects output functions\nUnderstand the need for and how to calibrate instruments\nLearn to optimize instrument performance\nLearn good maintenance practices for equipment and instruments\nLearn to use network diagnostic tools\nLearn to troubleshoot control system issues\nUnderstand safety procedures for effective operations\nUnderstand elements involved in control loop start up and tuning\n\n  \nYou will cover:  \nPre-Exam: Students are asked to take the pre-exam\, which includes questions related to the subject matter areas.  Answers will be provided for students to assess their knowledge\, prior to beginning the course material.\nModule 1A:  Overview of CCST Program\nModule 1B & 1C:  ISO 9000/Concepts of Process Control\nModule 2:  Instrument Air\nModule 3:  P&ID Basics \nModule 4:  Basic Measuring Units\nModule 5:  Instrument Fundamentals/Temperature\nModule 6:  Pressure/Flow\nModule 7:  Level\nModule 8:  Analyzers & Final Control Elements\nModule 9:  Safety & Electricity\nModule 10:  Advancing Technologies & Numbering Systems\nModule 11:  PLC Basics & Basic Requirements for Protocol\nModule 12:  Fieldbus & Communications Protocol\nModule 13:  Fiber Optics & SCADA\nModule 14:  Process Dynamics\nModule 15:  Control Action\nModule 16:  PID\nModule 17:  Tuning\nModule 18:  Advanced Control Strategy\nModule 19:  Calibration\nModule 20:  Instrument Performance\nModule 21:  Pressure Test/Calibration Equipment & Instrument Maintenance\nModule 22:  Best Procedures for LANs & Troubleshooting w/ Statistics\nModule 23:  Tools & DCS Troubleshooting\nModule 24:  Hazardous Locations & Installation\nModule 25:  Start Up & Loop Checking\nFinal Examination \n  \nClassroom Materials: \n\nCourse noteset with slides from course modules and course syllabus\nCCST Level II Study Guide\, ISA
URL:https://www.houstonisa.org/event/ts02e-certified-control-systems-technician-ccst-level-ii-exam-review-online-e-course/
LOCATION:TX
CATEGORIES:Training,CapCcst-ExamReview
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200914T080000
DTEND;TZID=America/Chicago:20201113T170000
DTSTAMP:20260407T155158
CREATED:20200821T005704Z
LAST-MODIFIED:20200821T011250Z
UID:10000084-1600070400-1605286800@www.houstonisa.org
SUMMARY:EC50E Safety instrumented Systems: A Life-Cycle Approach E-Course
DESCRIPTION:Dates: September 14\, 2020 to November 13\, 2020 \nLocation: Online \nMake sure to use HOUS2020 for $200 discount\nDescription:  \n\n\n\nISA’s CyberU online instructor-led training course offers the benefit of a high-quality ISA training course with the added advantage of studying at your own pace in the office\, at home or while traveling.\n\n\n  \nThis online course utilizes online training modules\, additional text materials\, online evaluations\, and email discussions. Students will have access via email to an instructor and have an opportunity to participate in live Q&A sessions with the instructor and other class participants. The course focuses on the engineering requirements for the specification\, design\, analysis\, and justification of safety instrumented systems for the process industries. Students will learn how to determine safety integrity levels and evaluate whether proposed or existing systems meet the performance requirements.\n\n\n  \nThis CyberU course runs for seven (7) weeks. You will have access to seven online modules for a web/audio session. Each module takes approximately 60 minutes. Your course syllabus will guide you through the course modules\, provide assignments\, and the schedule for live Q & A sessions.\n\n\n\n  \nCertificate Program (if available) A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. Your course registration includes your registration for the exam. \nYou will be able to:   \n\nDefine safety instrumented system.\nDiscuss how regulations have resulted through lessons learned from high profile process industry accidents.\nDetermine which ANSI/ISA\, AIChE\, and IEC guidelines and standards are relevant in industry.\nIdentify the Scope of ISA 61511\nDiscuss strategies for the management of functional safety\nIdentify the stages of the safety design life cycle.\nIdentify available safety layers for an IACS\nDiscuss the importance of “defense in depth” concept\nIdentify how SISs are used to reduce risk.\nCategorize risk using a PHA\nDetermine SIL using qualitative methods\nDetermine performance requirements for each SIL\nConduct a LOPA\nDiscuss LOPA methodology\nDevelop guidelines for LOPA\nDetermine risk tolerance\nIdentify resources for cyber security in an IACS\nIdentify failure modes and the risks involved with each\nIdentify hardware modeling techniques (SIL verification.)\nExplain the impact of redundancy on failure rates.\nDemonstrate the use of fault tolerance tables.\nDevelop an SRS\nExplain the pros and cons of relay logic systems\nExplain the pros and cons of microprocessor systems (PLC)\nDiscuss the pros and cons of pneumatic systems\nIdentify typical field devices in an IACS\nDiscuss impact of field devices on system performance\nExplain Center for Internet Security (CIS) Benchmarks\nExplain pros and cons of using certification vs prior use devices.\nExplain the FAT process.\nExplain installation and commissioning process.\nExplain the validation process\nIdentify priorities of the operation and maintenance phase.\nIdentify safety requirements for MOC\nIdentify documents to maintain for SRS\n\nYou will cover:  \n\n\n\n·         Module 1: Background\, Scope\, Management Issues\, The Life Cycle\n\n\n·         Module 2: Hazard and Risk Assessment\, Selecting SILs\n\n\n·         Module 3: Layer of Protection Analysis (LOPA) and Cybersecurity\n\n\n·         Module 4: Reliability and Modeling Issues\n\n\n·         Module 5: SRS and Logic Solver Technologies\n\n\n·         Module 6: Field Devices\, Certification\, Miscellaneous Design Issues\n\n\n·         Module 7: FAT and Beyond
URL:https://www.houstonisa.org/event/ec50e-safety-instrumented-systems-a-life-cycle-approach-e-course/
LOCATION:TX
CATEGORIES:Training,Ansi-ISA95
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200921
DTEND;VALUE=DATE:20201004
DTSTAMP:20260407T155158
CREATED:20200921T171113Z
LAST-MODIFIED:20200921T171113Z
UID:10000007-1600646400-1601769599@www.houstonisa.org
SUMMARY:IC39M Management of Alarm Systems M-Course
DESCRIPTION:Description: This online course focuses on the key activities of the alarm management lifecycle provided in the ANSI/ISA18.2 standard\, Management of Alarm Systems for the Process Industries\, and the IEC version\, IEC62682. The activities include the alarm philosophy development\, alarm rationalization\, basic alarm design\, advanced alarm techniques\, HMI design for alarms\, monitoring\, assessment\, management of change\, and audit. \nMake sure to use HOUS2020 for $200 discount!\nCertificate Program (if available) A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nYou will be able to:   \n\n\n\n·         Develop an Alarm Management Philosophy\n\n\n·         Identify alarms\n\n\n·         Rationalize alarms\, including classification and prioritization\n\n\n·         Design basic alarms\n\n\n·         Determine when advance alarm techniques should be used\n\n\n·         Document alarms for operations\n\n\n·         Design reports for monitoring and assessment of alarm system performance\n\n\n·         Manage changes to alarm systems \n·         Audit Alarm Systems\n\n\n\n  \nYou will cover:  \n\n\n\n·         The Business Case for Alarm Management\n\n\n·         The Common Problems in Alarm Systems\n\n\n·         The Alarm Management Lifecycle\n\n\n·         Philosophy\n\n\n·         Identification\n\n\n·         Rationalization\n\n\n·         Basic Alarm Design\n\n\n·         Advanced Alarm Design\n\n\n·         HMI Design for Alarms\n\n\n·         Implementation\n\n\n·         Operation\n\n\n·         Maintenance\n\n\n·         Monitoring and Assessment\n\n\n·         Management of Change\n\n\n·         Audit\n\n\n·         Starting Points for Alarm Management\n\n\n·         Sustaining Alarm Management\n\n\n\n  \n\n\n\n·         Module 1: Alarm Management Drivers and Common Alarm Problems\n\n\n·         Module 2: Alarm Lifecycle\n\n\n·         Module 3: Alarm Philosophy\n\n\n·         Module 4: Alarm Identification and Alarm Rationalization\n\n\n·         Module 5: Detail Alarm Design\n\n\n·         Module 6: Implementation\, Operation\, and Maintenance\n\n\n·         Module 7: Monitoring and Assessment of Alarms\n\n\n·         Module 8: Change Management\, Audits\, and Getting Started\n\n\n·         Module 9: Summary and Review
URL:https://www.houstonisa.org/event/ic39m-management-of-alarm-systems-m-course/
LOCATION:TX
CATEGORIES:Training,Technical-Training
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
END:VCALENDAR