BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200820T080000
DTEND;TZID=America/Chicago:20200919T170000
DTSTAMP:20260407T170915
CREATED:20200821T005100Z
LAST-MODIFIED:20200821T005218Z
UID:10000081-1597910400-1600534800@www.houstonisa.org
SUMMARY:IC55E Implementing Business to MES Integration Using the ANSI/ISA95 Standard Online E-Course
DESCRIPTION:Location: Online \nDescription: This course introduces the fundamental concepts of the ANSI/ISA95 standards so that students can apply them to implementing an integration between plant manufacturing systems and business systems. By understanding the objective models and information flows defined in the ANSI/ISA95 standards\, you will have the tools you need to specify\, design\, and execute a successful business to manufacturing integration project. This course is ideal for: Integration Project Managers; Manufacturing Information Systems Analysts; Information Design Engineers; and IT Professionals \nMake sure to use HOUS2020 for $200 discount\nCertificate Program (if available) \nYou will be able to:   \n\n\n\n·         Specify the requirements for an enterprise/control integration solution.\n\n\n·         Identify the issues involved in the integration of logistics to manufacturing control.\n\n\n·         Identify the business processes that need information from manufacturing systems.\n\n\n·         Identify the manufacturing control processes that need information from business systems.\n\n\n·         Explain the business drivers involved in integration.\n\n\n·         Identify the detailed information associated with enterprise/control integration.\n\n\n·         Discuss the roles of UML\, XML\, and B2MML in vertical integration.\n\n\n·         Apply the ISA95 object models.\n\n\n\n  \nYou will cover:  \n\n\n\n·         Standards and Models:\n\n\n·         ANSI/ISA95 Standards | MESA International Model | WBF B2MML XML Schemas\n\n\n·         Business Processes:\n\n\n·         Procurement | Product Cost Accounting | Product Inventory Control | Maintenance | Production Planning and Scheduling\n\n\n·         Production Processes:\n\n\n·         Detailed Production Scheduling | Production Tracking | Production Resource Management | Product Definition Management\n\n\n·         Information Model:\n\n\n·         Production Resources | Process Segments | Product Definition and Capability | Production Schedules | Production Performance\n\n\n·         Lab and Classroom Exercises:\n\n\n·         Identify key business drivers for integration\n\n\n·         Identify key business processes and objects\n\n\n·         Identify process segment definitions\n\n\n·         Develop shared product definition information\n\n\n\n  \n\n\n\n·         Pre-Exam: Students are asked to take the pre-exam\, which includes questions related to the subject matter areas. Answers will be provided to assess their knowledge\, prior to beginning the course material. \n·         Module 1: Overview and Introduction\n\n\n·         Module 2: Domain Model\n\n\n·         Module 3: Functions\, Activities\, and Data Flow\n\n\n·         Module 4: Major Object Definitions\n\n\n·         Module 5: Operations Definitions Model\n\n\n·         Module 6: Overview and Review\n\n\n·         Module 7: UML and XML\n\n\n·         Module 8: Modeling the Objects \n·         Module 9: Models of Exchanged Information \n·         Module 10: Implementing ISA95 \n·         Final Examination \n  \n\n\n\nISA Standards:\n\n\n·         ANSI/ISA-95.00.01-2010 (IEC 62264-1 Mod) – Enterprise-Control System Integration\, Part 1: Models and Terminology\n\n\n·         ANSI/ISA-95.00.02-2010 (IEC 62264-2 Mod) – Enterprise-Control System Integration\, Part 2: Object Model Attributes\n\n\n·         ANSI/ISA-95.00.03-2013 (IEC 62264-3 Mod) – Enterprise-Control System Integration\, Part 3: Activity Models of Manufacturing Operations Management\n\n\n·         ANSI/ISA-95.00.04-2012 – Enterprise-Control System Integration – Part 4: Objects and Attributes for Manufacturing Operations Management Integration\n\n\n·         ANSI/ISA-95.00.05-2013 – Enterprise-Control System Integration – Part 5: Business-to-Manufacturing Transactions\n\n\n·         ANSI/ISA-95.00.06-2014 – Enterprise-Control System Integration – Part 6: Messaging Service Model
URL:https://www.houstonisa.org/event/ic55e-implementing-business-to-mes-integration-using-the-ansi-isa95-standard-online-e-course/
LOCATION:TX
CATEGORIES:Training,Ansi-ISA95
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200820T080000
DTEND;TZID=America/Chicago:20200920T170000
DTSTAMP:20260407T170915
CREATED:20200821T005631Z
LAST-MODIFIED:20200821T010739Z
UID:10000083-1597910400-1600621200@www.houstonisa.org
SUMMARY:IC55E Implementing Business to MES Integration Using the ANSI/ISA95 Standard Online E-Course
DESCRIPTION:Location: Online \nDescription: This course introduces the fundamental concepts of the ANSI/ISA95 standards so that students can apply them to implementing an integration between plant manufacturing systems and business systems. By understanding the objective models and information flows defined in the ANSI/ISA95 standards\, you will have the tools you need to specify\, design\, and execute a successful business to manufacturing integration project. This course is ideal for: Integration Project Managers; Manufacturing Information Systems Analysts; Information Design Engineers; and IT Professionals \nMake sure to use HOUS2020 for $200 discount\nCertificate Program (if available) \nYou will be able to:   \n\n\n\n·         Specify the requirements for an enterprise/control integration solution.\n\n\n·         Identify the issues involved in the integration of logistics to manufacturing control.\n\n\n·         Identify the business processes that need information from manufacturing systems.\n\n\n·         Identify the manufacturing control processes that need information from business systems.\n\n\n·         Explain the business drivers involved in integration.\n\n\n·         Identify the detailed information associated with enterprise/control integration.\n\n\n·         Discuss the roles of UML\, XML\, and B2MML in vertical integration.\n\n\n·         Apply the ISA95 object models.\n\n\n\n  \nYou will cover:  \n\n\n\n·         Standards and Models:\n\n\n·         ANSI/ISA95 Standards | MESA International Model | WBF B2MML XML Schemas\n\n\n·         Business Processes:\n\n\n·         Procurement | Product Cost Accounting | Product Inventory Control | Maintenance | Production Planning and Scheduling\n\n\n·         Production Processes:\n\n\n·         Detailed Production Scheduling | Production Tracking | Production Resource Management | Product Definition Management\n\n\n·         Information Model:\n\n\n·         Production Resources | Process Segments | Product Definition and Capability | Production Schedules | Production Performance\n\n\n·         Lab and Classroom Exercises:\n\n\n·         Identify key business drivers for integration\n\n\n·         Identify key business processes and objects\n\n\n·         Identify process segment definitions\n\n\n·         Develop shared product definition information\n\n\n\n  \n\n\n\n·         Pre-Exam: Students are asked to take the pre-exam\, which includes questions related to the subject matter areas. Answers will be provided to assess their knowledge\, prior to beginning the course material. \n·         Module 1: Overview and Introduction\n\n\n·         Module 2: Domain Model\n\n\n·         Module 3: Functions\, Activities\, and Data Flow\n\n\n·         Module 4: Major Object Definitions\n\n\n·         Module 5: Operations Definitions Model\n\n\n·         Module 6: Overview and Review\n\n\n·         Module 7: UML and XML\n\n\n·         Module 8: Modeling the Objects \n·         Module 9: Models of Exchanged Information \n·         Module 10: Implementing ISA95 \n·         Final Examination \n  \n\n\n\nISA Standards:\n\n\n·         ANSI/ISA-95.00.01-2010 (IEC 62264-1 Mod) – Enterprise-Control System Integration\, Part 1: Models and Terminology\n\n\n·         ANSI/ISA-95.00.02-2010 (IEC 62264-2 Mod) – Enterprise-Control System Integration\, Part 2: Object Model Attributes\n\n\n·         ANSI/ISA-95.00.03-2013 (IEC 62264-3 Mod) – Enterprise-Control System Integration\, Part 3: Activity Models of Manufacturing Operations Management\n\n\n·         ANSI/ISA-95.00.04-2012 – Enterprise-Control System Integration – Part 4: Objects and Attributes for Manufacturing Operations Management Integration\n\n\n·         ANSI/ISA-95.00.05-2013 – Enterprise-Control System Integration – Part 5: Business-to-Manufacturing Transactions\n\n\n·         ANSI/ISA-95.00.06-2014 – Enterprise-Control System Integration – Part 6: Messaging Service Model
URL:https://www.houstonisa.org/event/ic55e-implementing-business-to-mes-integration-using-the-ansi-isa95-standard-online-e-course-2/
LOCATION:TX
CATEGORIES:Training,Ansi-ISA95
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200901T080000
DTEND;TZID=America/Chicago:20201024T170000
DTSTAMP:20260407T170915
CREATED:20200821T004727Z
LAST-MODIFIED:20200821T004913Z
UID:10000047-1598947200-1603558800@www.houstonisa.org
SUMMARY:ES10E Applying Instrumentation in Hazardous Classified Locations E-Course
DESCRIPTION:Location: Online  \nDescription: This self-paced\, online course provides a systematic approach to specifying and implementing instrumentation in hazardous locations.  Related standards from National Fire Protection Association (NFPA)\, National Electrical Manufacturers Association (NEMA)\, International Electrotechnical Commission (IEC)\, American Petroleum Institute (API)\, and ISA are discussed. \nCertificate Program (if available) A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \n  \nMake sure to use HOUS2020 for $200 discount\n  \nYou will be able to:   \n\nIdentify process and environmental factors that determine classification\nDescribe and use procedures for electrical classification\nUse applicable standards to develop classification drawings for gases\, dusts\, and fibers\nDescribe the basic principles of protection\nSelect explosion proof apparatus for specific applications\nDetermine when and why explosion seals should be used\nSpecify the use of intrinsically safe and nonincendive systems\nSelect the appropriate protective techniques for different hazards\nSelect alternative protective techniques for reduced cost\nSpecify devices\, design methods and safe construction approaches per National Electrical Code NFPA 70\nPrepare electrical maintenance plans in these classified areas per National Electric Recommended Practice NFPA 70B\nPerform safe operation in these classified areas per National Electric Standard for Work Place Safety NFPA 70E\n\nYou will cover:  \n\n\n\n·         Pre-Exam: Students are asked to take the pre-exam\, which includes questions related to the subject matter areas. Answers will be provided to assess their knowledge\, prior to beginning the course material. \n·         Module 1: Introduction & Location Classification Standards\n\n\n·         Module 2: Class I Division & Zone Classification\n\n\n·         Module 3: Class I Zone (Alternative) & Class II Division Classifications\n\n\n·         Module 4: Class II Division & Zone Classification for Dusts\n\n\n·         Module 5: Protection Technique Standards & Enclosure Types\n\n\n·         Module 6: Explosion Proof Enclosures \n\n\n·         Module 7: Intrinsic Safety\n\n\n·         Module 8: Non-incendive Systems \n·         Module 9: Pressurization & Purging \n·         Module 10: Other Types of Protection \n·         Module 11: Maintenance Considerations \n·         Final Examination
URL:https://www.houstonisa.org/event/es10e-applying-instrumentation-in-hazardous-classified-locations-e-course/
LOCATION:TX
CATEGORIES:Training,Ansi-ISA95
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200901T080000
DTEND;TZID=America/Chicago:20201024T170000
DTSTAMP:20260407T170915
CREATED:20200821T005452Z
LAST-MODIFIED:20200821T010827Z
UID:10000082-1598947200-1603558800@www.houstonisa.org
SUMMARY:ES10E Applying Instrumentation in Hazardous Classified Locations (September) E-Course
DESCRIPTION:About this course: ISA’s online instructor-assisted training courses offer the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home\, or while traveling. \nThis online course utilizes pre-recorded training modules\, additional video/simulation modules\, as well as e-mail and live discussions. Students will have access via email to an instructor throughout the course\, as well as a listserve to communicate with other students in the class. \nThis online\, self-paced course runs for eight (8) weeks. You will have access to 11 online modules\, each taking approximately 60 minutes. Your course syllabus will guide you through the course modules and provide assignments and opportunities to interact with the instructor and other course participants. \nMake sure to use HOUS2020 for $200 discount\nDates/Length: September\, 8 weeks \nDescription: This self-paced\, online course provides a systematic approach to specifying and implementing instrumentation in hazardous locations. Related standards from National Fire Protection Association (NFPA)\, National Electrical Manufacturers Association (NEMA)\, International Electrotechnical Commission (IEC)\, American Petroleum Institute (API)\, and ISA are discussed.
URL:https://www.houstonisa.org/event/es10e-applying-instrumentation-in-hazardous-classified-locations-september-e-course/
LOCATION:TX
CATEGORIES:Training,Ansi-ISA95
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200903
DTEND;VALUE=DATE:20201201
DTSTAMP:20260407T170915
CREATED:20200903T161033Z
LAST-MODIFIED:20200911T212155Z
UID:10000088-1599091200-1606780799@www.houstonisa.org
SUMMARY:IC32E Using the ISA/IEC 62443 Standard to Secure Your Control Systems E-Course
DESCRIPTION:Course Hours: Online Course – Refer to Syllabus\nCertification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course.Part of the ISA/IEC 62443 Cybersecurity Certificate Program\nYour course registration includes your registration for the exam.\n\n\n\n\nISA’s CyberU online instructor-led training courses offer the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home\, or while traveling. \nThis online course utilizes online training modules\, additional text materials\, online evaluations\, and e-mail discussions. Students will have access via email to an instructor and an opportunity to participate in live Q&A sessions with the instructor and other class participants. \nThis CyberU course runs for eight (8) weeks. You will have access to twelve online modules for the web/audio sessions. Each module is between 20 to 60 minutes. Your course syllabus will guide you through the course modules and provide assignments and the schedule for the live Q&A sessions. \n  \nMake sure to use HOUS2020 for $200 discount\n  \nDescription\n  \nA detailed look at how the ISA/IEC 62443 (formerly ISA 99) Standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.  The course explores the move to using open standards such as Ethernet\, TCP/IP\, and web technologies in SCADA and process control networks that has begun to expose these systems to the same cyber-attacks that have wreaked so much havoc on global government and corporate information systems. \n  \nYou will be able to:\n\nDiscuss the need and importance for control system security\nLearn about current principles and best practices\nUnderstand the structure and content of the ISA 99 / IEC 62443 series of documents\nDiscuss the principles behind the creating an effective long term program security\nLearn the basics of risk analysis\, industrial networking and network security\nUnderstand the concepts of defense in depth and zones and conduits\nLearn how to apply key risk mitigation techniques such as anti-virus\, patch management\, firewalls and virtual private networks\nLearn how secure software development strategies can make systems inherently more secure\nLearn what is being done to validate or verify the security of systems\n\n  \nYou will cover:\n  \nModule 1: Using the ISA/IEC 62443 Standards to Secure Your Control Systems\nProvides a basic introduction to control system cyber security and the ISA/IEC 62443 standards.  Discussion of trends\, regulations\, industry standards and best practices\, common myths\, the ISA 99 committee\, and the structure of the ISA 62443 standard.  Topics include:  Self-assessment of your Control Systems Security knowledge\, Trends in control system cybersecurity\, Potential Impacts\, Five common myths regarding IACS Security\, Regulations and Standards\, ISA99 committee work. \nModule 2: Terminology\, Concepts\, Models and Metrics\nCovers the material in ISA 62443-1-1 (published as ISA-99.00.01:2007) that forms the basis for the ISA 62443 series of standards.  Topics include: Difference between IT and IACS\, Security Objectives\, Defense-in-Depth\, Risk Assessment\, Policies\, Zones & Conduits\, Security Levels and the Security Lifecycle Models \nModule 3: Threats and Vulnerabilities\nProvides a basic introduction to networking with a focus on the application of Ethernet in the industrial environment.  Topics include: Types of networks\, OSI reference model\, Network Devices\, Network Protocols\, Network Tools built into Operating Systems. \nModule 4: Industrial Networking Basics L1-L3\nBuilds on the previous module and covers networking with a focus on the upper layers of the OSI reference model\, problems with the OSI model\, network discovery\, and security auditing tools in the industrial environment.  Topics include: Encapsulating data\, OSI reference model\, Network Devices\, Network Protocols. \nModule 5: Network Security Basics 101\nProvides a basic introduction to network security.  Topics include: Security Appliances\, Network Segmentation\, Encryption\, Secure Protocols and Intrusion Detection.  Topics include:  Why address security? Firewalls\, Network Segmentation Architectures\, Encryption\, Intrusion Detection\, Monitoring Network Traffic. \nModule 6: Industrial Protocols\nCovers at a high level the structure and application of common industrial protocols such as MODBUS\, PROFIBUS\, OPC and CIP (EtherNet/IP).  Topics include:  What is a protocol?  Multitude of Industrial Protocols\, Ports in use. \nModule 7: Establishing an Industrial Automation and Control Systems Security Program\nCovers the material in ISA 62443-2-1 (published as ISA-99.02.01:2009) that specifies the elements and requirements of an IACS Cyber Security Management System (CSMS).  Topics include: Six top level activities\, Common pitfalls\, Risk Analysis\, Security Policy\, Organization and Awareness\, Personnel security\, Physical & Environmental Security\, Network Segmentation\, Access Control\, Change Management\, Patch and Anti-virus management\, Information management\, Incident Response and Disaster Recover Planning\, Compliance Monitoring\, and Program Maintenance. \nModule 8: Security Risk Assessment and System Design\nCovers Security Level definitions and Foundational Requirements that establish a basis for the requirements in scoping an IACS assessment\, establishing zones & conduits\, analyzing the security risk for each zone\, assigning a security level target to each zone and verifying the design satisfies the security level target.  Topics include:  Definitions\, Risk Equation\, Cyber Risk Reduction Factor\, Basic Security analysis tools\, Identification of Zones and Conduits. \nModule 9: Intro to the IACS Cybersecurity Lifecycle\nShort jaunt into the Assess\, Develop & Implement and Maintain phases of the IACS Cybersecurity Lifecycle.  These phases are covered more in depth in ISA’s IC33\, IC34 & IC37 courses.  Topics include:  Cyber Security Life Cycle diagram\, Phases\, Continuous processes. \nModule 10: Security Program Requirements for IACS Service Providers\nCreating a secure product out of the box is only a small piece of the security puzzle.  Asset Owners\, Integrators and Suppliers all have a role.  This module covers how IEC 62443-2-4 specifies requirements IACS service providers can offer to the asset owner during integration and maintenance activities of an Automation Solution.  Topics include:  IACS Patching\, Asset Owner Requirements\, Product Supplier/Service Provider Requirements\, Malicious Code Protection. \nModule 11: Developing Secure Products and Systems\nOverview of component tier Product Development Requirements and Technical Security Requirements for IACS that are Product supplier centric.  Topics include:  Component tier standards ISA-62443-4-1 & ISA-62443-4-2\, Primary & Secondary goals\, ISA 62443 relationships\, ISA Security Compliance Institute (ISCI)\, ISASecure™. \nModule 12: Evolving Security Standards and Practices\nStandards are voluntary documents unless there is a requirement to use them.  In this module\, we look at the continuously evolving industrial security regulatory landscape.  The only constant is change!  Topics include:  Normative and Informative elements\, NIST Cyber Security Framework\, ISA-62443-2-1 requirement to monitor and evaluate applicable legislation relevant to cyber security\, Standards Development Organizations (SDOs). \nCourse Materials (PDF format):\n\nIC32E v2.0 Course Syllabus\nIC32E v2.0 Noteset Volume I with sections on Course Presentation slides from course modules\, Instructional Surveys/Answers and Additional Resources\nIC32E v2.0 Noteset Volume II with the following three publications\nANSI / ISA 99.00.01-2007 / IEC 62443-1-1: Security for Industrial Automation and Control Systems Part 1: Terminology\, Concepts\, and Models (Approved 29 October 2007)\nANSI / ISA 99.00.02-2009 / IEC 62443-2-1: Security for Industrial Automation and Control Systems Part 2: Establishing an Industrial Automation and Control System Security Program\nISA-62443.03.03 / IEC 62443-3-3: Security for Industrial Automation and Control Systems: System Security Requirements and Security Assurance Levels\nTextbook: Industrial Automation by Ronald L. Krutz (Second Edition)\n\n  \nFeatures of ISA CyberU online course:\nOnline Pre-recorded Course Modules\nYour instructor has pre-recorded each course module so that you can access the course presentations on your schedule. Each module is a web/audio session that takes approximately 20 – 60 minutes. \nAsk the Expert\nInteract with your expert instructor via email throughout the course and through scheduled live Q&A sessions. You can expect a reply to your email within 24 hours. This email address is active during the entire course duration. \nThe Q&A sessions provide an opportunity for you and your classmates to speak one-on-one with the instructor. You will have an opportunity to ask any questions you may have about the course material and interact with your fellow classmates. \nClass Discussions\nYou will be invited to subscribe to a course listserve that includes course participants. You can use this listserve to post questions and share experience relevant to the course with other class members. \nCourse Assignments and Exams\n\nTake the course pre-test before you begin studying the course material to get a better understanding of areas that you will want to focus on more during the course.\nHomework assignments for all modules will be indicated on the syllabus. The homework assignments are designed to help expand your understanding of the course material.\nComplete the final exam for the course in order to receive Continuing Education Units (CEU) credit. The final exam will be taken and scored online. You must receive at least 80% on the course exam to receive CEU credit. (Note this exam is not the ISA/IEC 62443 Cybersecurity Fundamentals Specialist Exam)
URL:https://www.houstonisa.org/event/ic32e-using-the-isa-iec-62443-standard-to-secure-your-control-systems-september-october-e-course/
LOCATION:TX
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200903T080000
DTEND;TZID=America/Chicago:20200930T170000
DTSTAMP:20260407T170915
CREATED:20200903T161026Z
LAST-MODIFIED:20200903T161026Z
UID:10000085-1599120000-1601485200@www.houstonisa.org
SUMMARY:IC32M  Using the ISA/IEC 62443 Standard to Secure Your Control Systems M-Course
DESCRIPTION:Dates: Self-paced \nLength:  : 12 Modules of Varying Length \nCEU Credits:  1.0 \nLocation: Online \nDescription: This is a self-paced\, online course consisting of 12 modules which take a detailed look at how the ISA/IEC 62443 (formerly ISA 99) Standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. The course explores the move to using open standards such as Ethernet\, TCP/IP\, and web technologies in SCADA and process control networks that has begun to expose these systems to the same cyber-attacks that have wreaked so much havoc on global government and corporate information systems \n  \nMake sure to use HOUS2020 for $200 discount!\n  \nCertificate Program (if available) Part of the ISA/IEC 62443 Cybersecurity Certificate Program. After successfully completing all twelve modules\, students may take the exam for ISA/IEC 62443 Cybersecurity Fundamentals Specialist. Exam fee is included with course purchase. \nYou will be able to:   \n\nDiscuss the principles behind creating an effective long term program security\nInterpret the ISA/IEC 62443 industrial security framework and apply them to your operation\nDefine the basics of risk and vulnerability analysis methodologies\nDescribe the principles of security policy development\nExplain the concepts of defense in depth and zone/conduit models of security\nAnalyze the current trends in industrial security incidents and methods hackers use to attack a system\nDefine the principles behind the key risk mitigation techniques\, including anti-virus and patch management\, firewalls\, and virtual private networks\n\n  \nYou will cover:  \n\nUnderstanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same\nHow Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks\nCreating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nRisk Analysis:  Business Rationale | Risk Identification\, Classification\, and Assessment\nAddressing Risk with Security Policy\, Organization\, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness\nAddressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control\nAddressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management\nMonitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS\nValidating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems\n\nLaboratory Demo: \nPCAP Live Capture Analysis
URL:https://www.houstonisa.org/event/ic32m-using-the-isa-iec-62443-standard-to-secure-your-control-systems-m-course/
LOCATION:TX
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200912
DTEND;VALUE=DATE:20200913
DTSTAMP:20260407T170915
CREATED:20200912T073030Z
LAST-MODIFIED:20200912T073030Z
UID:10000009-1599868800-1599955199@www.houstonisa.org
SUMMARY:TS00E Certified Control Systems Technician (CCST) Level I Review Course Online E-Course
DESCRIPTION:DATE TO BE DETERMINED \nDescription: The course is a fast-paced review of the knowledge and practical skills necessary to install and maintain standard measurement and control instrumentation. It is intended for practicing technicians preparing for the ISA Certified Control Systems Technician® (CCST®) Level I exam. Practice certification-type exams and an explanation of the examination process are provided. \nMake sure to use HOUS2020 for $200 discount\nCertificate Program (if available):  Certified Control System Technician Certificate \nYou will be able to:   \n\nCite principles and theory that explain measurement and control instrument functions\nDescribe procedures required to properly maintain the function of measurement and control instrumentation\nIdentify the procedures and safety requirements for loop checking and its purpose\nPerform calculations and other analysis of information related to the calibration and troubleshooting of measurement and control instruments and systems\nDescribe procedures required to safely start-up and shut-down a new or existing process\nReview normal tasks of process control technicians as outlined by the current CCST job task analysis.\nDefine the education\, experience\, and examination requirements for becoming a CCST\nIdentify important knowledge and skill requirements of a practicing CCST\nDescribe the procedures involved in taking the CCST Level I exam\nIdentify any need for further study or training in specific knowledge areas\nComplete simulated CCST Level I Practice Exams\n\nYou will cover:  \nEach course module has been pre-recorded by your instructor\, so that you can access on your schedule. Each module is a web/audio session that takes approximately 60 minutes. \nModule 1: Overview of CCST Certification/Concepts of Process Control\nModule 2: Domain 1 — Calibration\, Maintenance\, Repair and Troubleshooting \nModule 3: Domain 1 — Calibration\, Maintenance\, Repair and Troubleshooting\nModule 4: Domain 1 — Calibration\, Maintenance\, Repair and Troubleshooting\nModule 5: Domain 2 — Project Start-up\, Commissioning\, Loop-checking\, Project Organization and Planning\nModule 6: Domain 2 — Project Start-up\, Commissioning\, Loop-checking\, Project Organization and Planning \nModule 7: Domain 2 — Project Start-up\, Commissioning\, Loop-checking\, Project Organization and Planning\nModule 8: Domain 3 — Documentation\nModule 9: Domain 3 — Documentation\nModule 10: Domain 3 — Documentation\nModule 11: Final Exam
URL:https://www.houstonisa.org/event/ts00e-certified-control-systems-technician-ccst-level-i-review-course-online-e-course/
LOCATION:TX
CATEGORIES:Training,CapCcst-ExamReview
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
END:VCALENDAR