Cybersecurity

Missed a CONNECT module? Watch it on-demand!

Recordings of previous CONNECT modules are available below, complimentary for our customers. These streaming videos are approximately 45 minutes long. Use the form below the course you're interested in and a link will be emailed to you.

Available Cybersecurity Modules

Looking for more courses? Use the menu to the left to browse courses on other topics.


Access Management (2016)

June 22, 2016

This module will focus on methods of access management for protection control devices. You will learn concepts associated with access management for protection control devices. The lessons learned should benefit in your daily work related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Access Management Part One

April 2, 2015

This module focuses on how to establish an effective electronic access management program.

Download this Module


Access Management Part Two

April 16, 2015

This module dives deeper into the types of devices that can be used to establish an effective electronic access management program.

Download this Module


Baseline Configurations

May 18, 2016

This module will focus on the specific device characteristics that make up baseline configurations for NERC CIP. You will learn what constitutes baseline configurations from a NERC CIP perspective. The lessons learned should benefit in your daily work related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


BES Cyber Assets

June 14, 2018, presented by Karl Perman

This module will focus on the identification of BES Cyber Assets including the definition of BES Cyber Assets Program.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, and engineers.

How you will benefit:You will learn about NERC CIP-002 and how to identify a BES Cyber Asset.

Please fill out the following form and the video for BES Cyber Assets will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Module 6: Bright Lines and System Categorization Part 1
Download


Module 7: Bright Lines and System Categorization Part 2
Download


Module 8: Communication Networks Part One
Download


Communication Network Part Two

February 19, 2015

This module provides an overview of gateway devices used in the electric power industry for remote access management and other services.

Download this Module


Compliance Management

May 3, 2017, presented by Karl Perman

This module will focus on compliance management and the implementation of a process driven compliance program.

Who should attend: Individuals with a cybersecurity role such as security analysts, systems analysts, engineers and NERC CIP compliance practitioners.

How you will benefit: You will learn what constitutes compliance management from a NERC CIP perspective and how to develop a process-centric approach.

Please fill out the following form and the link for Compliance Management will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Cyber Security Governance Structures

April 30, 2015

This module presents two different structures that can establish a governance structure for the Cyber Security function.

Download this Module


Cyber Security Introductory Concepts

November 13, 2014

This module will provide an overview of the Introductory concepts associate with Cyber Security in the Electric Power Industry such as firewalls, vulnerability assessments, ports and services management, patch managemen, security event incident management and incident recovery.

Download this Module


Defense in Depth

December 11, 2014

This module reveals the basic concepts of a defense in depth methodology for the protection of operational technology.

Download this Module


Module 5: Documentation and Evidence of Compliance/NERC CIP
Download


ESPs and PSPs Part One

March 5, 2015

This module introduces electronic security perimeters and physical security perimeters, including types of devise typically included in these perimeters and how to define these perimeters.

Download this Module


ESPs and PSPs Part Two

March 26, 2015

This module provides additional details pertaining to electronic security perimeters and physical security perimeters that were introduced in Part One.

Download this Module


Firmware Update Management

May 3, 2018, presented by Karl Perman

This module will focus the key activities and business reasons for having a documented firmware update management program.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, and engineers.

How you will benefit: You will learn about the benefits of having a firmware update management program.

Please fill out the following form and the video for Firmware Update Management will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Information Protection "201"

Part 1: April 12, 2017; and Part 2: May 18, 2017, presented by Karl Perman

These modules focus on the NERC CIP-011 including the definition of BES Cyber System Information and the contents of an Information Protection Program, and on how CIP-011 and information protection affects vendors performing work for regulated entities.

Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers. This course is also for individuals who would like an understanding of information protection.

How you will benefit: You will learn about NERC CIP-011 and how to develop an Information Protection Program, and about what constitutes BES Cyber System Information and how the protection of this information will affect those working for a regulated entity as well as vendors.

Please fill out the following form and the links for Information Protection "201": Parts 1 and 2 will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Information Protection Process (IPP)

April 8, 2016

This module will focus on the safe handling of customer information. This course is for individuals new to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Introduction to NERC CIP

October 22, 2014

This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 Program.

Download this Module


Implementation of NERC CIP V5

October 23, 2014

This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 program.

Download this Module


NERC CIP Overview

March 2, 2016

The fundamentals for understanding basic terminology and concepts presented for those new to NERC CIP. This course is geared towards beginners and is the place to start.

Note: This module is available as an online stream instead as a download.

Download this Module


NERC CIP V6 Major Changes

April 14, 2016

This module will provide an overview of the major NERC CIP V6 changes going forward. The lessons learned should benefit in your planning related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Risk-Based Approach to Cyber Security

June 27, 2019, presented by Karl Perman

This module will focus on having a risk-based approach to cyber security including sample methodology and purpose.

Who should attend: Individuals with a role in cybersecurity or NERC CIP such as compliance, security and engineers.

How you will benefit: You will learn about the purpose of having a risk-based approach to cybersecurity.

Please fill out the following form and the video for Risk-Based Approach to Cyber Security will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Supply Chain Security

March 22, 2018, presented by Karl Perman

This course provides an overview of new (CIP-013) supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.

How you will benefit: You will learn about the new requirements for those involved in the supply chain of critical systems to the electric power industry.

Please fill out the following form and the video for Supply Chain Security will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Supply Chain Security Update

April 11, 2019, presented by Karl Perman

Update on the new (CIP-013) supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.

How you will benefit: You will learn about the new requirements for those involved in the supply chain of critical systems to the electric power industry.

Please fill out the following form and the video for Supply Chain Security Update will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Supply Chain Management: Parts 1 and 2

Part 1: March 15, 2017, presented by Karl Perman

Overview of discussions and proposed new supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about the proposed new requirements for those involved in the supply chain of critical systems to the electric power industry.

and

Part 2: March 29, 2017, presented by Karl Perman

This module will focus on terms and conditions and training for vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about terms and conditions and training as part of supply chain security.

Please fill out the following form and the links for Supply Chain Management: Parts 1 and 2 will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Vulnerability Assessments for Protective Equipment

May 2, 2019, presented by Karl Perman

This module will focus on the key activities and purposes of having a vulnerability assessment program for protective equipment.

Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers.

How you will benefit: You will learn about the benefits of having a vulnerability assessment program.

Please fill out the following form and the video for Vulnerability Assessments for Protective Equipment will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input

Download CONNECT Archives

Please fill out the form below to request archives of previous CONNECT modules. You will receive an email with download links for the modules you select.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Phone Number:
Invalid Input

Please select the courses you would like to download.

The download or streaming links will be sent to you via email.

Data Network Communications
Invalid Input

Legacy TDM over Packet Switched Networks: Merging the Old with the New
Invalid Input

Legacy TDM over Packet Switched Networks: Teaching Old Protocols New Tricks
Invalid Input

WAN Technology Options
Invalid Input

Introduction to NERC CIP
Invalid Input

Implementation of NERC CIP V5
Invalid Input

Ethernet WAN Option
Invalid Input

MPLS WAN Option
Invalid Input

Cyber Security Introductory Concepts
Invalid Input

Network Redundancy and Resiliency: Going Beyond the Enterprise Network
Invalid Input

Carrier Ethernet Services
Invalid Input

WAN Carrier Selection: What's Under The Hood Matters!
Invalid Input

Defense in Depth
Invalid Input

Putting It All Together: Two Example Network Structures
Invalid Input

Communication Network Part Two
Invalid Input

ESPs and PSPs Part One
Invalid Input

ESPs and PSPs Part Two
Invalid Input

Access Management Part One
Invalid Input

Access Management Part Two
Invalid Input

Cyber Security Governance Structures
Invalid Input

NERC CIP Overview
Invalid Input

Information Protection Process (IPP)
Invalid Input

NERC CIP V6 Major Changes
Invalid Input

Baseline Configurations
Invalid Input

Access Management (2016)
Invalid Input

Please type the characters below to help prevent SPAM.(*)
Please type the characters below to help prevent SPAM.
Invalid Input

RFL Connect

Past CONNECT Course Archives

Download Videos


Online Training Courses In
Networking, Communications,
Protection & Cyber Security

Learn more

Utility Industry Solutions

Utility industry and electric utility white papers by RFL providing communications and protection solutions to today's challenges, such as migrating data from leased lines.

FEATURED WEBINAR:
Helping Utilities Move Forward in IP Migration

FEATURED SOLUTION:
Multipoint-to-Multipoint Protective Relaying Signaling Using Digital Communications and Built-In Logic

Read our Electric Utility White Papers

Upcoming Events

Find RFL and Hubbell at an upcoming trade show in your area!

See Upcoming Trade Shows

Support

RFL offers a 24-hour emergency service program that provides specialized service anytime, anywhere in the world. All of RFL's products are engineered and manufactured to the highest-quality standards and are supported by a team of highly trained customer service engineers.

Contact Sales Associate