Training Archives (2016 and Older)

Watch our older CONNECT modules on Networking and Cyber Security on-demand.

Recordings of CONNECT modules from previous years are available below, complimentary for our customers. All files are approximately 45 minutes long and are in .webm format unless otherwise specified. Click here for information on playing .webm files.

Jump to:


Available Networking Modules

Data Network Communications

September 4, 2014, presented by Jim Doyle

This module briefly covers legacy Communications, but primarily focuses on the basics of Ethernet and Internet Protocol comms within the Local Area Network and Wide Area Network.

Download this Module


Legacy TDM over Packet Switched Networks: Merging the Old with the New

September 17, 2014, presented by Jim Doyle

This module reveals the basic concepts and methods for enabling legacy equipment to utilize modern Ethernet networks and Internet Protocol networks for communications. Includes:

  • Review of legacy Time Division Multiplexing (TDM) environment
  • Overview of next generation packet switched networks (PSN)
  • TDM over PSN - Enables legacy TDM devices to utilize benefits of PSNs while maintaining consistent data rate, timing, security of TDM service. Overview, benefits, handling common problems

Viewers will gain an understanding of how Ethernet and IP WAN services can be used to cost-effectively replace carrier-provided, legacy TDM services.

Download this Module


Legacy TDM over Packet Switched Networks: Teaching Old Protocols New Tricks

October 1, 2014, presented by Jim Doyle

This module presents the enhancements to reliability, redundancy, and security for legacy communications that are inherent to modern communications protocols. Includes:

  • How packet switched networks (PSN) affect transported TDM services
  • How modern PSNs cost-effectively increase the redundancy and resiliency of TDM services
  • Additional mechanisms that increase the redundancy and resiliency of TDM services

Download this Module


WAN Technology Options

October 15, 2014, presented by Jim Doyle

In this module, several WAN technologies are discussed. The advantages and detriments of various technologies and topologies will be covered at a high level. Includes:

  • Review of basic concepts of WAN design
  • WAN topologies and technologies
  • Review of WAN options from various providers

Download this Module


Ethernet WAN Option

October 29, 2014, presented by Jim Doyle

This module focuses on several Ethernet Wide Area Network technologies, topologies, and redundancy options.

Download this Module


Carrier Ethernet Services: Tuning Your Network for Ultimate Performance

December 3, 2014, presented by Jim Doyle

This module presents specific actionable intelligence that will help ensure you are getting the best user experience from your Metro Ethernet or Carrier Ethernet Services. Includes:

  • Private WAN topologies available with MEF-compliant Carrier Ethernet Services from various service provider types (MSO, ILEC, CLEC, IXC)
  • Pros and Cons of various access circuit types, carrier aggregation nodes, and Ethernet NIDs
  • Effects of backhaul and network core location

Attendees will gain an understanding of how Metro Ethernet and Carrier Ethernet is delivered and how to architect their WAN for the best possible user experience.

Download this Module


WAN Carrier Selection: What's Under The Hood Matters!

December 10, 2014, presented by Jim Doyle

This module focuses on key selection criteria that should be considered when choosing a service provider to implement your mission-critical WAN Architecture.

Download this Module


Putting It All Together: Two Example Network Structures

December 17, 2014

This module presents two use cases which cover a variety of applications, networking technologies, topologies, and redundancy.

Download this Module


Available Cyber Security Modules

Access Management (2016)

June 22, 2016

This module will focus on methods of access management for protection control devices. You will learn concepts associated with access management for protection control devices. The lessons learned should benefit in your daily work related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Baseline Configurations

May 18, 2016

This module will focus on the specific device characteristics that make up baseline configurations for NERC CIP. You will learn what constitutes baseline configurations from a NERC CIP perspective. The lessons learned should benefit in your daily work related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


NERC CIP V6 Major Changes

April 14, 2016

This module will provide an overview of the major NERC CIP V6 changes going forward. The lessons learned should benefit in your planning related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Information Protection Process (IPP)

April 8, 2016

This module will focus on the safe handling of customer information. This course is for individuals new to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


NERC CIP Overview

March 2, 2016

The fundamentals for understanding basic terminology and concepts presented for those new to NERC CIP. This course is geared towards beginners and is the place to start.

Note: This module is available as an online stream instead as a download.

Download this Module


Cyber Security Governance Structures

April 30, 2015

This module presents two different structures that can establish a governance structure for the Cyber Security function.

Download this Module


Access Management Part Two

April 16, 2015

This module dives deeper into the types of devices that can be used to establish an effective electronic access management program.

Download this Module


Access Management Part One

April 2, 2015

This module focuses on how to establish an effective electronic access management program.

Download this Module


ESPs and PSPs Part Two

March 26, 2015

This module provides additional details pertaining to electronic security perimeters and physical security perimeters that were introduced in Part One.

Download this Module


ESPs and PSPs Part One

March 5, 2015

This module introduces electronic security perimeters and physical security perimeters, including types of devise typically included in these perimeters and how to define these perimeters.

Download this Module


Communication Network Part Two

February 19, 2015

This module provides an overview of gateway devices used in the electric power industry for remote access management and other services.

Download this Module


Defense in Depth

December 11, 2014

This module reveals the basic concepts of a defense in depth methodology for the protection of operational technology.

Download this Module


Cyber Security Introductory Concepts

November 13, 2014

This module will provide an overview of the Introductory concepts associate with Cyber Security in the Electric Power Industry such as firewalls, vulnerability assessments, ports and services management, patch managemen, security event incident management and incident recovery.

Download this Module


Implementation of NERC CIP V5

October 23, 2014

This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 program.

Download this Module


Introduction to NERC CIP

October 22, 2014

This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 Program.

Download this Module


Download CONNECT Archives

Please fill out the form below to request archives of previous CONNECT modules. You will receive an email with download links for the modules you select.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Phone Number:
Invalid Input

Please select the courses you would like to download.

The download or streaming links will be sent to you via email.

Data Network Communications
Invalid Input

Legacy TDM over Packet Switched Networks: Merging the Old with the New
Invalid Input

Legacy TDM over Packet Switched Networks: Teaching Old Protocols New Tricks
Invalid Input

WAN Technology Options
Invalid Input

Introduction to NERC CIP
Invalid Input

Implementation of NERC CIP V5
Invalid Input

Ethernet WAN Option
Invalid Input

MPLS WAN Option
Invalid Input

Cyber Security Introductory Concepts
Invalid Input

Network Redundancy and Resiliency: Going Beyond the Enterprise Network
Invalid Input

Carrier Ethernet Services
Invalid Input

WAN Carrier Selection: What's Under The Hood Matters!
Invalid Input

Defense in Depth
Invalid Input

Putting It All Together: Two Example Network Structures
Invalid Input

Communication Network Part Two
Invalid Input

ESPs and PSPs Part One
Invalid Input

ESPs and PSPs Part Two
Invalid Input

Access Management Part One
Invalid Input

Access Management Part Two
Invalid Input

Cyber Security Governance Structures
Invalid Input

NERC CIP Overview
Invalid Input

Information Protection Process (IPP)
Invalid Input

NERC CIP V6 Major Changes
Invalid Input

Baseline Configurations
Invalid Input

Access Management (2016)
Invalid Input

Please type the characters below to help prevent SPAM.(*)
Please type the characters below to help prevent SPAM.
Invalid Input

RFL Connect

Sign Up for Spring 2018 Courses

Register Now


Online Training Courses In
Networking, Communications,
Protection & Cyber Security

Learn more

Utility Industry Solutions

Utility industry and electric utility white papers by RFL providing communications and protection solutions to today's challenges, such as migrating data from leased lines.

NEW FEATURED SOLUTION: Anti-Islanding

Read our Electric Utility White Papers

Upcoming Events

Find RFL and Hubbell at an upcoming trade show in your area!

See Upcoming Trade Shows

Support

RFL offers a 24-hour emergency service program that provides specialized service anytime, anywhere in the world. All of RFL's products are engineered and manufactured to the highest-quality standards and are supported by a team of highly trained customer service engineers.

Contact Sales Associate