?

Missed a CONNECT module? Watch it on-demand!

Recordings of previous CONNECT modules are available below, complimentary for our customers. These streaming videos are approximately 45 minutes long. Use the form below the course you're interested in and a link will be emailed to you.

Available Cybersecurity Modules

Looking for more courses? Use the menu to the left to browse courses on other topics.

RFL CONNECT Vulnerability Assessments in Electric Power Utilities

June 24, 2021

Who should attend: Compliance, engineering, IT and security personnel involved in performing vulnerability assessments.

How you will benefit: Learn about differences between vulnerability assessments in business networks and real time operating systems

Please fill out the following form and the video will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


RFL CONNECT Patching for Industrial Control Systems

June 23, 2022

Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers.

How you will benefit: You will learn the key activities and importance of a patching program for industrial control system components.

Please fill out the following form and the video will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input

Transient Cyber Assets (TCAs) & Removable Media

May 20, 2021, presented by Karl Perman

Who should attend: Compliance, engineering, IT and other security personnel involved with TCAs and RM.

How you will benefit: Attendees will learn about strategies to manage and track TCAs and RM.

Please fill out the following form and the video will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Supply Chain Risk Management: Vendor Risk Evaluations (CIP-013)

April 22, 2021, presented by Brian Dob -->

Who should attend: Compliance, security, procurement, IT, engineering and others involved in supply chain risk evaluations.

How you will benefit: Attendees will learn about the components of vendor risk evaluations and coordination of risk evaluations between vendors and regulated entities.

Please fill out the following form and the video will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Access Management (2016)

June 22, 2016

This module will focus on methods of access management for protection control devices. You will learn concepts associated with access management for protection control devices. The lessons learned should benefit in your daily work related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Access Management Part One

April 2, 2015

This module focuses on how to establish an effective electronic access management program.

Download this Module


Access Management Part Two

April 16, 2015

This module dives deeper into the types of devices that can be used to establish an effective electronic access management program.

Download this Module


Baseline Configurations

May 18, 2016

This module will focus on the specific device characteristics that make up baseline configurations for NERC CIP. You will learn what constitutes baseline configurations from a NERC CIP perspective. The lessons learned should benefit in your daily work related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


BES Cyber Assets

June 14, 2018, presented by Karl Perman

This module will focus on the identification of BES Cyber Assets including the definition of BES Cyber Assets Program.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, and engineers.

How you will benefit:You will learn about NERC CIP-002 and how to identify a BES Cyber Asset.

Please fill out the following form and the video for BES Cyber Assets will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Module 6: Bright Lines and System Categorization Part 1
Download


Module 7: Bright Lines and System Categorization Part 2
Download


Module 8: Communication Networks Part One
Download


Communication Network Part Two

February 19, 2015

This module provides an overview of gateway devices used in the electric power industry for remote access management and other services.

Download this Module


Compliance Management

May 3, 2017, presented by Karl Perman

This module will focus on compliance management and the implementation of a process driven compliance program.

Who should attend: Individuals with a cybersecurity role such as security analysts, systems analysts, engineers and NERC CIP compliance practitioners.

How you will benefit: You will learn what constitutes compliance management from a NERC CIP perspective and how to develop a process-centric approach.

Please fill out the following form and the link for Compliance Management will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Cyber Security Governance Structures

April 30, 2015

This module presents two different structures that can establish a governance structure for the Cyber Security function.

Download this Module


Cyber Security Introductory Concepts

November 13, 2014

This module will provide an overview of the Introductory concepts associate with Cyber Security in the Electric Power Industry such as firewalls, vulnerability assessments, ports and services management, patch managemen, security event incident management and incident recovery.

Download this Module


Cyber Security Supply Chain Risk

October 29, 2020

Learn about impacts on regulated entities and vendors that supply systems and services to the electric power industry.

Download this Module


Defense in Depth

December 11, 2014

This module reveals the basic concepts of a defense in depth methodology for the protection of operational technology.

Download this Module


Module 5: Documentation and Evidence of Compliance/NERC CIP
Download


ESPs and PSPs Part One

March 5, 2015

This module introduces electronic security perimeters and physical security perimeters, including types of devise typically included in these perimeters and how to define these perimeters.

Download this Module


ESPs and PSPs Part Two

March 26, 2015

This module provides additional details pertaining to electronic security perimeters and physical security perimeters that were introduced in Part One.

Download this Module


Firmware Update Management

May 3, 2018, presented by Karl Perman

This module will focus the key activities and business reasons for having a documented firmware update management program.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, and engineers.

How you will benefit: You will learn about the benefits of having a firmware update management program.

Please fill out the following form and the video for Firmware Update Management will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Information Protection "201"

Part 1: April 12, 2017; and Part 2: May 18, 2017, presented by Karl Perman

These modules focus on the NERC CIP-011 including the definition of BES Cyber System Information and the contents of an Information Protection Program, and on how CIP-011 and information protection affects vendors performing work for regulated entities.

Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers. This course is also for individuals who would like an understanding of information protection.

How you will benefit: You will learn about NERC CIP-011 and how to develop an Information Protection Program, and about what constitutes BES Cyber System Information and how the protection of this information will affect those working for a regulated entity as well as vendors.

Please fill out the following form and the links for Information Protection "201": Parts 1 and 2 will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Information Protection Process (IPP)

April 8, 2016

This module will focus on the safe handling of customer information. This course is for individuals new to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Introduction to NERC CIP

October 22, 2014

This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 Program.

Download this Module


Interactive Remote Access

November 19, 2020

You will learn about the risks associated with remote access, access management methods and NERC CIP considerations.

Download this Module


Implementation of NERC CIP V5

October 23, 2014

This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 program.

Download this Module


NERC CIP Overview

March 2, 2016

The fundamentals for understanding basic terminology and concepts presented for those new to NERC CIP. This course is geared towards beginners and is the place to start.

Note: This module is available as an online stream instead as a download.

Download this Module


NERC CIP V6 Major Changes

April 14, 2016

This module will provide an overview of the major NERC CIP V6 changes going forward. The lessons learned should benefit in your planning related to NERC CIP.

Note: This module is available as an online stream instead as a download.

Download this Module


Risk-Based Approach to Cyber Security

June 27, 2019, presented by Karl Perman

This module will focus on having a risk-based approach to cyber security including sample methodology and purpose.

Who should attend: Individuals with a role in cybersecurity or NERC CIP such as compliance, security and engineers.

How you will benefit: You will learn about the purpose of having a risk-based approach to cybersecurity.

Please fill out the following form and the video will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Supply Chain Security

March 22, 2018, presented by Karl Perman

This course provides an overview of new (CIP-013) supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.

How you will benefit: You will learn about the new requirements for those involved in the supply chain of critical systems to the electric power industry.

Please fill out the following form and the video for Supply Chain Security will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Supply Chain Security Update

April 11, 2019, presented by Karl Perman

Update on the new (CIP-013) supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.

How you will benefit: You will learn about the new requirements for those involved in the supply chain of critical systems to the electric power industry.

Please fill out the following form and the video will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


Supply Chain Management: Parts 1 and 2

Part 1: March 15, 2017, presented by Karl Perman

Overview of discussions and proposed new supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about the proposed new requirements for those involved in the supply chain of critical systems to the electric power industry.

and

Part 2: March 29, 2017, presented by Karl Perman

This module will focus on terms and conditions and training for vendors involved in the supply chain.

Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about terms and conditions and training as part of supply chain security.

Please fill out the following form and the links for Supply Chain Management: Parts 1 and 2 will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input


The Future of Network Reliability Through Security Controls

October 20, 2020

UTC Version.

Download this Module


Vulnerability Assessments and Operational Technology

January 28, 2021

Who should attend: Individuals with a role in utility operations, engineering, maintenance, OT instrumentation or NERC compliance.

How you will benefit: You will learn about the potential impacts of running a vulnerability assessment on operational technology, considerations and an overview of NERC CIP requirements.

Download this Module


Vulnerability Assessments for Protective Equipment

May 2, 2019, presented by Karl Perman

This module will focus on the key activities and purposes of having a vulnerability assessment program for protective equipment.

Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers.

How you will benefit: You will learn about the benefits of having a vulnerability assessment program.

Please fill out the following form and the video will be emailed to you.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Invalid Input

Download CONNECT Archives

Please fill out the form below to request archives of previous CONNECT modules. You will receive an email with download links for the modules you select.

Name:(*)
Please enter your name.

Company:(*)
Please enter your company's name

Email:(*)
Please enter your email address

Phone Number:
Invalid Input

Please select the courses you would like to download.

The download or streaming links will be sent to you via email.

Vulnerability Assessments and Operational Technology
Invalid Input

Interactive Remote Access
Invalid Input

Cyber Security Supply Chain Risk
Invalid Input

The Future of Network Reliability Through Security Controls
Invalid Input

Manny presentation at UTC

RFL FSU Introduction
Invalid Input

Data Network Communications
Invalid Input

Legacy TDM over Packet Switched Networks: Merging the Old with the New
Invalid Input

Legacy TDM over Packet Switched Networks: Teaching Old Protocols New Tricks
Invalid Input

WAN Technology Options
Invalid Input

Introduction to NERC CIP
Invalid Input

Implementation of NERC CIP V5
Invalid Input

Ethernet WAN Option
Invalid Input

MPLS WAN Option
Invalid Input

Cyber Security Introductory Concepts
Invalid Input

Network Redundancy and Resiliency: Going Beyond the Enterprise Network
Invalid Input

Carrier Ethernet Services
Invalid Input

WAN Carrier Selection: What's Under The Hood Matters!
Invalid Input

Defense in Depth
Invalid Input

Putting It All Together: Two Example Network Structures
Invalid Input

Communication Network Part Two
Invalid Input

ESPs and PSPs Part One
Invalid Input

ESPs and PSPs Part Two
Invalid Input

Access Management Part One
Invalid Input

Access Management Part Two
Invalid Input

Cyber Security Governance Structures
Invalid Input

NERC CIP Overview
Invalid Input

Information Protection Process (IPP)
Invalid Input

NERC CIP V6 Major Changes
Invalid Input

Baseline Configurations
Invalid Input

Access Management (2016)
Invalid Input

Please type the characters below to help prevent SPAM.(*)
Please type the characters below to help prevent SPAM.
Invalid Input

RFL Connect

Past CONNECT Course Archives

Download Videos


Online Training Courses In
Networking, Communications,
Protection & Cyber Security

Learn more

Utility industry and electric utility white papers by RFL providing communications and protection solutions to today's challenges, such as migrating data from leased lines.

FEATURED WEBINAR:
Helping Utilities Move Forward in IP Migration

FEATURED SOLUTION:
Multipoint-to-Multipoint Protective Relaying Signaling Using Digital Communications and Built-In Logic

Read our Electric Utility White Papers

Find RFL and Hubbell at an upcoming trade show in your area!

See Upcoming Trade Shows

RFL offers a 24-hour emergency service program that provides specialized service anytime, anywhere in the world. All of RFL's products are engineered and manufactured to the highest-quality standards and are supported by a team of highly trained customer service engineers.

Contact Sales Associate