BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210302
DTEND;VALUE=DATE:20210613
DTSTAMP:20260405T121232
CREATED:20200912T072629Z
LAST-MODIFIED:20210115T053911Z
UID:10000095-1614643200-1623542399@www.houstonisa.org
SUMMARY:TS03E Certified Control Systems Technician (CCST) Level III Exam Review Course E-Course
DESCRIPTION:Length: 15 Weeks\nCEU Credits: 3.2\nCertification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nDescription: \nThis online course reviews the knowledge and skills areas included on the new Certified Control Systems Technician® (CCST®) Level III examination. The intent is to prepare an automation professional who meets the exam criteria to take the exam. The content is based on the latest Job Analysis Domains\, Tasks\, Knowledge Areas\, and Skill Areas developed\, and regularly reviewed and updated as the basis for the CCST certification exam. \nMake sure to use HOUS2021 for $200 discount\nCertificate Program (if available) Certified Control System Technician Certificate \nYou will be able to:   \n\nDefine the scope and format of the CCST Level III exam\nCompare process variable measurements and control valve selections\nDiscuss how the various types of control technologies are used in industrial automation\, including process control from basic to advanced control\, discrete\, batch\, motor and\, motion control\nDetermine the requirement for tuning and discuss tuning procedures\nIdentify the range of digital communications used in automation and how these are used in system integration\nExplain when safety instrumented systems (SISs) are needed and how they are specified\nApply the critical areas of regulatory procedures and project documentation\nInterpret the best practice methodology for troubleshooting automation projects\n\nYou will cover:  \nWeek 1: Review of Process Information\, Domain 1\, and Process Control Concepts \nWeek 2: Number Systems\, Instrument Performance\, and Calibration Equipment and Procedures \nWeek 3: Common Measurement Instruments \nWeek 4: Final Control Elements\, Domain 2\, and Feedback Control Strategies \nWeek 5: Advanced Control Strategies\, Loop Checking Concepts\, and Start-up Concerns \nWeek 6: Domain 3\, Symbols and Identification\, P&IDs\, and Other Project Documents \nWeek 7: Domain 4\, Troubleshooting\, and Installation in Hazardous Areas \nWeek 8: Instrument Maintenance and Installation Practices \nWeek 9: Tuning Methods\, and Project Management \nWeek 10: Risk Assessments \nWeek 11: Applicable Standards \nWeek 12: Programmable Electronic Systems \nWeek 13: Networking and Fieldbuses \nWeek 14: Cybersecurity \nWeek 15: Final Exam
URL:https://www.houstonisa.org/event/ts03e-certified-control-systems-technician-ccst-level-iii-exam-review-course-e-course/
LOCATION:TX
CATEGORIES:Training,CapCcst-ExamReview
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210322T080000
DTEND;TZID=America/Chicago:20210515T170000
DTSTAMP:20260405T121232
CREATED:20210122T090632Z
LAST-MODIFIED:20210122T091548Z
UID:10000022-1616400000-1621098000@www.houstonisa.org
SUMMARY:FG15E Developing & Applying Standard Instrumentation and Control Documentation Online
DESCRIPTION:Description: This course will present the methodology for the designing and developing control systems documentation. The development of piping and instrument diagrams (P&IDs) and related ISA drawings are emphasized. This course covers both the development and the reading/interpreting of these documents\, making it beneficial to engineers\, designers\, software programmers\, system integrators\, and technicians. \nMake sure to use HOUS2020 for $200 discount!\nCertificate Program (if available) A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course.ISA’s online instructor-assisted training courses offer the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home\, or while traveling. \n  \n You will be able to:   \n  \n\nDesign\, develop\, and interpret the documents used to define instruments and control systems for a typical project\, including P&IDs\, loop diagrams\, specification forms\, instrument lists\, logic diagrams\, installation details\, and location plans\nExplain the information included on each document\nPlan document development as it relates to project management\nApply ISA standards for symbols and terminology to documentation\nDescribe the relationship of ISO 9000\, OSHA process safety management (PSM)\, and API 750 to control systems documentation\n\n  \n  \n  \nYou will cover:  \n  \n\nP&IDs: Definition and Use | ISA Standard Symbols and Identification | Contents and Piping Information | Design and Construction | Developing from Flow Diagrams | Scheduling Considerations | Hazardous Area Considerations\nInstrument Lists: Definition and Use\nControl System Software: PLC/DCS Functional Requirement Documentation Development\nLogic Diagrams: Definition and Use | Symbology | Interpretation | ISA Standards\nInstallation Details: Use | Development | Materials of Construction | Valves | Scheduling\nLocation Plans: Purpose and Development | Structural Considerations | Electrical and Other Trays | Panel Location\nInstrument List: Specification Forms | An ISA20 Specification Form\nLoop Diagrams: Purpose | Interpretation | Development | ISA Standards | Scheduling Considerations\nControl Methods: Feedback | Feedforward | Ratio | Cascade | Control Valves\n\nStandards and Documentation: ISA5.1 – ISA5.6 | ISO 9000 | OSHA | Process Safety System Management | API 750
URL:https://www.houstonisa.org/event/fg15e-developing-applying-standard-instrumentation-and-control-documentation-online/
LOCATION:TX
CATEGORIES:Training,Technical-Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210511T080000
DTEND;TZID=America/Chicago:20210513T160000
DTSTAMP:20260405T121232
CREATED:20210415T054226Z
LAST-MODIFIED:20210415T055215Z
UID:10000122-1620720000-1620921600@www.houstonisa.org
SUMMARY:IACS Cybersecurity Design & Implementation (IC34)
DESCRIPTION:Certificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nUse Coupon code: HOUS2021 to receive discount of $200 off registration.\nDescription: \nThe second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution\, in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level. \nThis course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally\, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification. \nYou will be able to: \n\nInterpret the results of an ICS cybersecurity risk assessment\nDevelop a cybersecurity requirements specification (CRS)\nDevelop a conceptual design based upon information in a well-crafted CRS\nExplain the security development lifecycle process and deliverables\nPerform a basic firewall configuration and commissioning\nDesign a secure remote access solution\nDevelop system hardening specification\nImplement a basic network intrusion detection system\nDevelop a Cybersecurity Acceptance test plan (CFAT/CSAT)\nPerform a basic CFAT or CSAT\n\nYou Will Cover: \n\nIntroduction to the ICS Cybersecurity Lifecycle\nAssessment phase\nImplementation phase\nMaintenance phase\nConceptual Design Process\nInterpreting risk assessment results\nCybersecurity requirements specifications\nDeveloping a conceptual design\nConceptual design specification\nDetailed Design Process\nSecurity Development Lifecycle (SDL)\nTypes of technology\nSelecting appropriate technology\nDeveloping a detailed design\nDocumenting the design/specification\nDesign & Implementation Examples\nFirewall design example\nRemote access design example\nSystem hardening design example\nIntrusion detection design example\nTesting\nDeveloping test plans\nCybersecurity Factory Acceptance Testing\nCybersecurity Site Acceptance Testing\n\nClassroom/Laboratory Exercises: \n\nDevelop a Physical & Cybersecurity Plan\nConfigure a Perimeter Firewall\nConfigure an ICS Firewall\nInstall and use SNORT!\nConfigure Windows Local Group Policy Objects\nInstall MS Security Compliance Manager (SCM)\nConduct ICS Device Hardening\nConduct Network Device Hardening\nUse a Domain Controller\nConfigure a VPN Connection\nConduct Security Configuration Auditing\nConduct System Robustness Testing\n\nWho Should Attend: \n\nControl systems engineers and managers\nSystem Integrators\nIT engineers and managers industrial facilities\nPlant managers\nPlant Safety and Risk Management\n\nRecommended Pre-Requisites: \nISA Courses IC32 and IC33 or equivalent knowledge/experience. \nRecommended Reading: \nCybersecurity Library
URL:https://www.houstonisa.org/event/iacs-cybersecurity-design-implementation-ic34/
LOCATION:TX
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
END:VCALENDAR