Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
Oct
21
Mon
MIL-1553 Training | MIL-STD-1553 Training @ Tonex Plano
Oct 21 @ 9:00 am – Oct 22 @ 4:00 pm
Print Friendly, PDF & Email

MIL-1553 Training Course Description, Why choose TONEX for your MIL-1553 (MIL-STD-1553) Training?

MIL-1553 training course by TONEX covers key MIL-STD-1553 principles, features, protocol architecture, functional characteristics, technical components, design, operations, products, testing, cyber security and trends.  Learn about MIL-STD-1553, the high reliable and high available  communications standard used by NASA, DoD including: Air Force, Navy, Army, and Marine.

Systems engineer, project managers, system analysts, Electronic warfare systems engineer, avionics engineers, design engineers, software and hardware engineers, cyber security specialists, cyber war analysts, project managers and anyone else who wants t understand what MIL-STD-1553 is and how it works.

Learn about MIL-STD-1553 systems, analysis and design, architecture, protocols, applications and cyber security:

  • Understand how MIL-STD-1553 bus works and its applications in military avinoics
  • Physical properties of the MIL-STD-1553 bus
  • MIL-STD-1553  mechanical, electrical, and functional characteristics as a serial data bus
  • Keys design process steps of a MIL-STD-1553 system
  • MIL-STD-1553 protocols and data architecture
  • MIL-STD-1553 system overview and overview of architectural components such as:  Bus Controller (BC), Remote Terminal (RT) and Bus Monitor (BM)
  • MIL-STD-1553 development toolkit
  • MIL-STD-1553 implementation, testing, verification and validation
  • MIL-STD-1553 cyber security

MIL-1553 Training

MIL-STD-1553, MIL-STD-1553, or AS15531 is a military standard, Digital Time Division Command/Response Multiplex Data Bus, published by DoD that defines the mechanical, electrical and functional characteristics of a serial data bus. It features a dual redundant balanced line physical layer, a (differential) network interface, time division multiplexing, half-duplex command/response protocol and up to 31 remote terminals (devices).

MIL-STD-1773 is a version of MIL-STD-1553 using optical cabling.

MIL-1553 Training

Learning Objectives

Upon completion of this course, the attendees are be able to:

  • Understand MIL-STD-1553 protocol, architecture and functional characteristics
  • Explain the architecture of MIL-STD-1553
  • Sketch the logical and physical architecture of MIL-STD-1553
  • Describe MIL-STD-1553 mechanical, electrical and functional characteristics
  • Explain technical components, design, operations and, testing aspects of MIL-STD-1553
  • Explore
  • Describe the key cyber security concepts in MIl-STD-1553
  • List the requirements and capabilities of MIL-STD-1553 security
  • Explore vulnerabilities and weaknesses of MIL-STD-1553 applied to aircrafts and weapons

Audience

Managers, applications developers, integrators, sales and marketing professionals involved in managing, marketing, selling, developing, testing or integrating MIL-STD-1553 applications and systems.

Course Content

Introduction to MIL-STD-1553

  • MIL-STD-1553A
  • MIL-STD-1553B
  • Notice 1 and Notice 2
  • MIL-STD-1553 General Requirements
  • MIL-STD-1553 Standards updated by SAE.org

MIL-STD-1553 Data bus Overview

  • Multiplexing in MIL-STD-1553
  • MIL-STD-1553 Hardware Components
  • Terminal Operation
    • Data Bus Controller (BC)
    • Remote Terminal (RT)
    • Data Bus Monitor (BM)

MIL-STD-1553 Hardware Platforms

  • Hardware Characteristics
    • Data Bus Cable
    • Data Bus Coupling
    • Terminal I/O Characteristics
    • Redundant Data Bus Requirements

MIL-STD-1553 Protocol

Command word, mode codes, mode command formats, data word, status word, message error bit.

    • Message Formats
    • Command Word
    • Data Word
    • Mode Codes
    • Status Word
    • Errors

Connecting the Bus

  • Terminal Electrical Characteristics
    • MIL-STD-1553 Cabling
    • MIL-STD-1553 Coupling
    • Direct Coupling
    • Transformer Coupling
  • MIL-STD- System Design
  • Data Bus Topology and Redundancy
  • Data Bus Control and Partitioning
  • Bus Loading

MIL-STD-1553 System and Software Design

  • MIL-STD-1553 Systems Engineering Principals
  • MIL-STD-1553 Requirement Analysis
  • System and Software Design
  • Data Bus Topology and Control
  • Robustness, Partitioning & Redundancy
  • Bus Loading and Bus Controller Software
  • Synchronous and Timing

MIL-STD-1553 Testing Procedures

  • Testing and Verification
  • Test and Operating Requirements
  • Developmental Testing
  • Design Verification
  • Production Testing
  • Systems Integration Testing
  • Field & Operational Testing
  • Integration Issues

MIL-STD-1553 Databus Specification Interpretation

  • MIL-STD-1553 Products and Vendors
  • MIL-STD-1553 Interface Hardware and Software
  • Advanced MIL-STD-1553 UHF/VHF Radio
  • High-Speed MIL-STD-1760 for the aircraft/weapon interface
  • MIL-STD-1760C
  • MIL-STD-1394b, a military version of Firewire
  • Enhanced Performance MIL-STD-1553

Introduction to MIL-STD-1773

  • Media Components and Design
  • Testing
  • Installation and Maintenance
  • Enhancements and Optimization

MIL-STD-1553 Security

  • MIL-STD-1553 Network and System Security
  • Security Definitions
  • Equipment originating or terminating classified plain text language
  • Wirelines, equipment, and the interconnecting lines
  • wirelines, components, equipment, and systems
  • Encrypted or unclassified signals
  • lectrical circuits components, equipment, systems
  • Classified plain language data in electrical form
  • nvestigations and studies of compromising emanations
  • TEMPEST
  • System Security Policy
  • MIL-STD-1553 design (system, hardware, and software)
  • Operational, maintenance, and logistic
  • Security policy of the aircraft, ship, or system

MIL-STD-1553 Advanced Network System Security (Updated)

  • Cyber security and cyber war analysis of multiplex data bus networks to military aircraft systems, aircraft carriers and smart weapons
  • Classification of data across MIL-STD-1553
  • Maintenance of data security within this integrated MIL-1553-STD avionics system for both flight and ground operations
  • RED, BLACK, and RED/BLACK designation of MIL-STD-1553
  • TEMPEST tests, TEMPEST inspections and TEMPEST control plan
  • MIL-STD-1553 System Security Policy
  • MIL-STD-1553 System Security Architecture
  • Compromising emanations (i.e., TEMPEST)
  • Encryption and Ciphering
  • Trusted message routing and control across MIL-STD-1553 bus
  • All BLACK bus – No RED data or RED data processor
  • ALL RED bus
  • RED/BLACK Gateway
  • RED/BLACK Composite
  • TEMPEST Design
  • Hybrid MIL-STD-1553 and Link 16 Cyber Security Analysis
  • MIL-STD-1760B Interconnect Standard for Aircraft Stores
  • MIL-1553-B Signals in MIL-1760A/B
  • MIL-STD-1553 and MIL-1760 Analysis
  • Application of NACSIM-5100 and NACSIM-5112 for U.S. Military Systems
  • Encryption Designs
  • Cryptographic key management, coordination, distribution, and zeroize techniques, circuitry and software
  • Synchronization and timing protocols
  • Encryption alarm and alarm check techniques
  • Trusted Message Routing and Control Design
  • Store Station Utilizing Primary Signal Set
Nov
7
Thu
ARP-4761 Training | Safety Assessment Guidelines @ Tonex Dallas
Nov 7 @ 9:00 am – Nov 8 @ 4:00 pm
Print Friendly, PDF & Email

ARP-4761 Training, Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment

ARP-4761 Training Course Description

ARP-4761 training provides you with the strategies and techniques to execute safety analysis. Such strategy is relevant with demonstrating compliance with certification criteria (14CFR/CS Parts 23 and 25, section 1309) and helping an organization to fulfill their own unique safety guidelines. The safety procedures explained are mainly relevant with civil avionic gear but the procedures and techniques might be used in several cases.

ARP-4761 training covers the standard data to perform the industry approved safety analysis including Functional Hazard Assessment (FHA), Preliminary System Safety Assessment (PSSA), and System Safety Assessment (SSA). We will discuss different safety evaluation techniques required to implement and perform the safety analysis. We also will teach you various safety evaluation techniques consisting of Fault Tree Analysis (FTA), Dependence Diagram (DD), Markov Analysis (MA), Failure Modes and Effect Analysis (FMEA) and Common Cause Analysis (CCA). CCA is comprised of Zonal Safety Analysis (ZSA), Particular Risks Analysis (PRA), and Common Mode Analysis (CMA).

ARP-4761 training

ARP-4761 training teaches you the Safety Assessment Process in avionic systems, as well as incorporating it with other execution procedures. We will discuss the essence of the Reliability Theory and its relevance to airborne systems, equipment specifications and that how they are applied during both the initial and final system safety assessment process.

ARP-4761 training course also considers each of the tools and techniques for performing the Safety Assessment Process, containing real-world scenarios for each of the fundamental methods. We will elaborate precisely how the regulatory structure works and how ARP-4761 fits in. We also explain how ARP-4761 corresponds to other standards for civil airborne systems and equipment, in particular with ARP-4754A.

ARP-4761 training course is mostly dedicated to the practical activities including labs, individual/group activities, and hands-on workshops.

Learn about:

  • The real basis and logic of safety analysis for civil avionic systems and parts
  • The systems safety evaluation associated with the general airplane or system development procedures
  • The safety analysis methods to provide the airplane or system safety analysis
  • The theory of reliability and its correlation to system safety
  • Functional Hazard Analysis (FHA)
  • Fault Tree Analysis (FTA)
  • Dependency Diagrams (DD)
  • Markov Analysis
  • Failure Modes and Effects Analysis (FMEA)
  • Common Cause Analysis (CCA)

Audience

ARP-4761 training is a 2-day course designed for:

  • Engineers and professionals
  • Safety officers and managers
  • Quality managers
  • Project engineers
  • Safety engineers
  • Software/hardware engineers
  • Quality assurance or certification personnel

Training Objectives

Upon the completion of ARP-4761 training, the attendees are able to:

  • Recognize several safety analysis techniques
  • Relate the main participants of ARP-4761 FHA, PSSA, SSA, FTA, DD, MA, CCA
  • Recognize the use of safety methods
  • Determine the communication among the safety procedures and the development procedures
  • Use several safety tools in implementation of a PSSA or SSA
  • Analyze potential methods for presence in ARP-4761
  • Comprehend the procedures necessary for the development of civil aerial systems and technology
  • Deliver comprehensive goals that must be fulfilled by the systems development procedure
  • Explain the overall rules and that how they are used to identify DALs
  • Employ the verification and validation methods as part of the system development procedure
  • Employ the new standard material inside their own organizational framework
  • Describe the avionic systems development procedure and its association with the safety analysis procedure
  • Determine the main avionic systems development procedures and their interrelationships

Course Outline

Overview of ARP-4761

  • ARP-4761 description
  • Terminology
  • History and background
  • Methods and tools
  • Best practices
  • Life cycle
  • System Safety Assessment Process
  • Faults, Errors, and Failures
  • Basic definitions
  • Development & certification process

Model-Based Safety Analysis Process

  • Model-based development
  • Model-based safety assessment
  • Nominal system modeling
    • Validating consequent safety criteria
    • Fault modeling
    • Model extension
    • Safety assessment simulation
    • Proofs of safety specifications
    • Fault trees

ARP-4761 Methods

  • Functional Hazard Assessment (FHA)
  • Preliminary System Safety Analysis (PSSA)
  • Fault Tree Analysis (FTA)
  • Dependency Diagram (DD)
  • Markov Analysis (MA)
  • Failure Modes & Effects Analysis (FMEA)
  • Common Cause Analysis (CCA)
  • Particular Risks Analysis (PRA)
  • Zonal Safety Analysis (ZSA)
  • Common Mode Analysis (CMA)
  • System Safety Analysis (SSA)

Safety Life Cycle

  • Executing the aircraft level FHA while developing the aircraft level criteria
  • Implementing the system level FHA along with with distribution of aircraft operations to system operations, and begin the CCA
  • Conducting the PSSA align with system structure development, and renew the CCA
  • Repeating the CCA and PSSA as the system is apportioned into hardware and software elements
  • Conducting the SSA in line with system execution, and completing the CCA
  • Supplying the outcomes of the previous steps into the certification process

Development Assurance Levels

  • Level A
    • Extremely Improbable
  • Level B
    • Extremely Remote
  • Level C
    • Remote
  • Level D
    • Reasonably Probable, frequent

TONEX Workshop Sample: The Wheel Brake System

The Wheel Brake System is installed on the two primary landing tools. Braking on the major apparatus wheels is applied to give support to safe impedance of the airplane during the taxi and landing phases, and also in the case of a rejected take-off. A secondary role of the wheel brake system is to stop the main gear wheel rotation upon gear withdrawal.

Such braking system can be conducted both commanded manually, via brake pedals, or automatically (auto-brake) with no need for pedal use. The auto-brake operation helps the pilot to pre-equip the braking rate before takeoff or landing. When the wheels have traction, the auto-brake operation will regulate the pressure necessary for brake to smooth the deceleration.

Based on the ARP-4761 guideline, discuss:

  • Nominal system modeling
    • Braking System Control Unit (BSCU)
    • Hydraulic pressure pumps
    • Isolation valves
    • Selector valve
    • Accumulator valve
    • Meter valves
  • Validating the derived safety criteria
  • Fault modeling and extension
    • Digital fault modeling
    • Mechanical fault modeling
    • Fault modeling and extension issues
  • Official safety assessment
    • Fault tolerance verification via model-checkers
    • Official safety assessment issues
    • Projected method for fault tree initiation by PVS
Nov
12
Tue
Telecom Pricing, Cost Analysis, Fraud and Audit Workshop @ Tonex Plano, TX
Nov 12 @ 9:00 am – Nov 15 @ 4:00 pm
Print Friendly, PDF & Email

Telecom Pricing, Cost Analysis, Fraud and Audit Workshop

Telecom Pricing, Cost Analysis, Fraud and Audit Workshop is a 4 day special program covering he key concepts of practical telecom pricing, cost, financial analysis, fraud, audit and management. Participants will learn to perform price and cost analysis, financial modeling, fraud detection and prevention, and audit to determine price reasonableness in accordance with telecom authorities. This course is designed for personnel involved in establishing or modifying the price or cost of telecom services and products.

Who Should Attend?

Telecom financial analysts, cost accountants, cost analysts, budget analysts, systems analysts, auditors, fraud specialists, accounting managers, and financial planners.

Learning Objectives

Upon completion of this workshop, the participant will:

  • List financial terminology applied to telecom service providers
  • Explain telecom operators’ cost, financial and pricing models, fraud and audit principles
  • Determine how cost analysis shall be used and applied
  • Explain telecom financial analysis and performance measurement
  • Describe the role of telecommunications regulatory authorities, operating companies applied to cost and price Analysis
  • List telecom price and cost ratio analysis techniques
  • Describe best practices for telecom budgeting and forecasting
  • Summarize telecom project analysis and evaluation
  • List telecom cost and pricing Key performance indicators (KPIs)
  • Evaluate effective telecom financial management and cost control
  • Calculate new telecom service and product ROI
  • List cost related labor and support services
  • Negotiate telecom service cost analysis, financial techniques and contract audit
  • Calculate a telecom cost objective and a price/cost objective
  • List steps in financial analysis and modeling for project planning processes and financial projections
  • Review proven financial analytical tools and understand how and when to use them
  • Describe techniques to improve your organization’s profit picture by making sound business decisions
  • Determine pre-negotiation position applied to different stakeholders using cost and financial calculations
  • Use best practices in budgeting, forecasting, project evaluation and analysis
  • Master the processes of telecom pricing, financial management and cost
  • Control and strategies for telecom tariffing and estimation of cost of network services
  • Describe financial analysis and modeling for services. infrastructure, network operations, IT, legal, competition, sales and marketing
  • Suggest modifications to telecom price or cost to assure reasonableness
  • Describe fraud detection and prevention principles
  • Review telecom audit guidelines

Workshop Topics and Sessions

  • Fundamentals of Telecom Cost and Pricing
  • Fundamentals of Telecom Financial Analysis
  • Introduction to Telecom Cost Analysis
  • Applying Price-Related Factors to Telecom Products and Services
  • Advanced Techniques for Telecom Budgeting, Cost and Price Analysis
  • Advanced Telecom Cost Modeling, Pricing and Financial Analysis – Methodologies
  • Telecom Fraud
  • The Evolution of Fraud
  • Subscription Fraud
  • Internal Fraud
  • Partnership and B2B Fraud
  • Fixed Network Fraud
  • Mobile Network Fraud
  • Prepaid Fraud
  • Roaming Fraud
  • IP Fraud
  • Fraud Detection and Prevention
  • Data Mining, AI and Deep Learning Applied to Fraud Detection and Prevention
  • Telecom Accounting and Auditing Review
  • Financial Statements
  • Business Processes and Accounting
  • Technology and Accounting Audit processes
  • Telecom Auditing & Optimization
  • Voice, video and Data Service Adult
  • Analyze Telecom Usage
  • Customer Service Records (CSRs)
  • Call details records (CDRs)
  • Telecom Service Verification Workshop
Dec
9
Mon
Link 16 Training | Courses | Tactical Data Link Training @ Tonex DC Office
Dec 9 @ 9:00 am – Dec 11 @ 4:00 pm
Print Friendly, PDF & Email

Link 16 and Tactical Digital Information Links (TADIL) Training Courses

Link 16 Training ,is a 3-day technical and operational program covers Link 16 AKA as TADIL-J or Joint Tactical Information Distribution System. (J messages are the key to Link 16 TDL information exchange capabilities)

TONEX is an internationally recognized training company that  delivers customized Link 16 training solutions to DoD, NATO and defense contractors. By choosing Tonex for your Link 16 training courses, you can expect that all the information learned in class is accurate, relevant and up to date. Our Link 16 courses are designed by Link 16 experts in the field, and this allows our workshops to excel in certain topics that only professionals in the field would understand.

Next Public Training Session

December 9, 2019 @ 9:00 am – December 11, 2019 @ 4:00 pm
Tonex Location in Washington, DC
1025 Connecticut Ave, NW Suite 1000
Washington, DC 20036

 

We continually update our reading materials, teaching techniques and course offerings to reflect the latest trends in technology. Instead of following the trends, we stay ahead of them to be a frontrunner in the industry. Our Link 16 training courses follow a specific format that includes the overview, the body of the class and the conclusion, which wraps up with Tonex and industry certifications. Our Link 16 training courses are flexible enough that they can be modified to fit the needs of your business so that your employees can focus on the core values of your organization. Browse our catalog of workshops or contact a Tonex representative to find the best boot camps to advance your career. Link 16 Training crash course, Bootcamp style starts with an introduction to Tactical Data Links and covers concepts behind Network Centric Operations (NCO), Link 16  planning, network design, network management, operations and maintenance, and troubleshooting are discussed.

link 16 training<img class=”aligncenter size-full wp-image-11816″ src=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_700,h_450/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course.jpg” alt=”link 16 training” width=”700″ height=”450″ srcset=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_700/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course.jpg 700w, https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_300/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course-300×193.jpg 300w, https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_640/https://tonex.wpenginepowered.com/wp-content/uploads/link-16-training-course-640×411.jpg 640w” sizes=”(max-width: 700px) 100vw, 700px” /> Link 16 Training, TONEX is the world’s premier provider in Tactical Data Link (TDL) Courses including  TDL Crah Course, Link 4A, Link 11 , Link 16 , Link 16 Cybersecurity, Link 22, VMF, JREAP, SADL, IFDL, MADL, EPLRS, CDL, CEC, MDL, and TTNT .  TONEX is specialized in  specializes Tactical Data Link Training Courses including Link 11, Link 16, Link 22, SADL/EPLRS, VMF and JREAP. For  4-days Tactical Data Link Training Crash Course, TDL Training Bootcamp CLICK HERE Tactical Data Link Training Courses including Link 16  Training Crash Course provides the concepts behind Link 16 tactical data Link system/ JTIDS / MIDS architecture, installation, integration, data processing and operation.

COURSE NAMELENGTH
Advanced Link 16 Training3 days
Joint Range Extension Applications Protocol Training | JREAP Training Bootcamp4 days
Link 16 Advanced Training | Network Enabled Weapons Bootcamp4 days
Link 16 and MIDS Training Bootcamp5 days
Link 16 Cybersecurity Crash Course4 days
Link 16 Systems Engineering Training Course3 days
Link 16 Training for Managers3 days
Link 16 Training | Courses | Tactical Data Link Training3 days
Tactical Data Link Training Crash Course | TDL Training Bootcamp4 days
Tactical Data Links (TDL) Testing Training Bootcamp4 days
Variable Message Format (VMF) Training Bootcamp4 days

  Link 16 Training<img class=”alignnone size-full wp-image-2786″ src=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_197,h_154/https://tonex.wpenginepowered.com/wp-content/uploads/link-16.gif” alt=”Link 16 Training” width=”197″ height=”154″ />

 

Link 16 Training Learning Objectives:

Upon completing of this course, the student will:

  • Discuss Tactical Digital Information Link (TADIL)
  • Understand the key concepts behind Link 16 / JTIDS / MIDS
  • List LINK 16/ JTIDS / MIDS Principals and Features
  • Explore Link 16 / JTIDS / MIDS and JTRS architectures
  • Discuss Link 16 system characteristics
  • Explore network architecture, services, elements, protocols to support services
  • Identify the role of key network nodes, interfaces, protocols, control and related protocols
  • Discuss similarities and differences between Link 4A, Link 11, Link 22, Joint Range Extension Applications Protocol (JREAP), Variable Message Format (VMF), Fifth Generation Aircraft Systems, Interim JTIDS/MIDS Message Specification (IJMS), Situational Awareness Data Link (SADL), Enhanced Position Location Reporting System (EPLRS), Inter/Intra Flight Data Link (IFDL), Multifunction Advanced Data Link (MADL), NATO STANAG standards, CDL (Common Data Link), MDL (Multipurpose Data Link), CEC (Cooperative Engagement Capability),  Tactical Targeting Network Technology (TTNT)
  • Discuss TDMA and CDMA and access mode
  • Describe Network Participation Groups (NGP) and J-Series Messages
  • Discuss various Link 16 terminals and message packing and pulses
  • Understand similarities and differences between Link 16 Networks and Nets
  • Describe Link 16 Network Access Modes, Network Time, Network Time Reference (NTR) and Terminal Synchronization
  • Understand Link 16 Network Roles, Relays and  Pulse Deconfliction
  • Calculate Link 16 capacity and Time Slot Duty Factor (TSDF)
  • Discuss Communications Security and Link 16 Cyber Security
  • Describe Link 16 MSEC/TSEC methods
  • Discuss JTIDS / MIDS Network Planning and Design
  • Discuss JTIDS / MIDS Management, Operation and Troubleshooting and Monitoring
  • Understand the role of Joint Range Extension Applications Protocol (JREAP)
  • Discuss Link 16 Network Enable Weapons
  • Discuss Link 16 troubleshooting techniques and procedures

Link 16 Training Courses<img class=”alignnone size-full wp-image-2787″ src=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_320,h_209/https://tonex.wpenginepowered.com/wp-content/uploads/Link-16-training.jpg” alt=”Link 16 Training Courses” width=”320″ height=”209″ srcset=”https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_320/https://tonex.wpenginepowered.com/wp-content/uploads/Link-16-training.jpg 320w, https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_300/https://tonex.wpenginepowered.com/wp-content/uploads/Link-16-training-300×195.jpg 300w” sizes=”(max-width: 320px) 100vw, 320px” />

Course Outline (Link 16; 3-days)

Overview of Tactical Digital Information Link (TADIL)

  • What is TADIL?
  • TADIL Capabilities
  • Basic principles and purpose
  • Platforms and Development
  • Joint Tactical Information Distribution System (JTIDS)
  • Surveillance Control Data Link (SCDL)
  • Ground Station Modules (GSMs)
  • Joint Tactical Data Link Management Plan (JTDLMP)
  • Tactical data link for command, control, and intelligence
  • Link 4A
  • TADIL A/B [Link-11]
  • Link 16 as the prime data link for U.S. and NATO forces
  • TADIL C [Link-4A]
  • Conventional Link Eleven Waveform (CLEW)
  • Single Tone Link Eleven Waveform (SLEW)
  • Link 22 to replace Link 11 and to complement Link 16
  • Secure digital radio link in HF and UHF band
  • Joint Range Extension Applications Protocol (JREAP)
  • Variable Message Format (VMF)
  • Fifth Generation Aircraft Systems
  • Interim JTIDS/MIDS Message Specification (IJMS)
  • Situational Awareness Data Link (SADL)
  • Enhanced Position Location Reporting System (EPLRS)
  • Inter/Intra Flight Data Link (IFDL)
  • Multifunction Advanced Data Link (MADL)
  • NATO STANAG standards
  • CDL (Common Data Link)
  • MDL (Multipurpose Data Link)
  • CEC (Cooperative Engagement Capability)
  • Tactical Targeting Network Technology (TTNT)

Overview of TADIL J (Link-16)/JTIDS/MIDS

  • Basic Link 16 principles and purpose
  • Link 16 capabilities
  • Link 16 protocol vs. terminals
  • MIL-STD-6016 – Tactical Data Link (TDL) 16 Message Standard
  • STANAG 5516 – Tactical Data Exchange – Link 16
  • MIDS System Segment Specification (SSS)
  • MIDS System Segment – Interface Control Document (Hardware ICD)
  • MIL-STD-6016E: Tactical Data Link (TDL) 16 Message Standard
  • Overview of  or Satellite TADIL J (S-TADIL J)
  • Real-time Beyond Line-of-Sight (BLOS)

Overview of Link 16 System Architecture, Protocols and Components 

  • Overview of Link 16 Operations
  • Link 16 Architecture
  • Link 16 Network Time and Network Roles
  • Link 16 Terminal Navigation and Network Relays
  • Link 16 Terminals and Platforms/Capabilities
  • Link 16 Configurations / Maintenance
  • Link 16 Data Terminals
  • Voice Transmission and Reception over Link 16
  • Principles of Multiple Access in Link 16
  • TDMA Principles in the Link 16
  • Link 16 Frequencies and Time Slots
  • Link 16 Interference Protection Features
  • Time Slot Duty Factor (TDSF)
  • Participation Groups
  • Network Operations, Roles and Responsibilities
  • Precise Participant Location and Identification (PLLI)
  • Link 16 Security
  • Multinetting
  • Range Extension Techniques

Purpose of Tactical Digital Information and Link 16 Systems

  • Purpose and Description
  • Data Link Advantages
  • Link 16 for anti-jam (AJ), secure, data and voice system
  • Standard waveforms and messages to promote interoperability
  • Joint Tactical Information Distribution System (JTIDS) and Multifunctional Information
  • Distribution System (MIDS)
  • Architecture and Network Design
  • Link 16 Parameters
  • Pulse Deconfliction
  • Frequency Assignments
  • Architecture Examples
  • Time Slot Blocks (TSBs)
  • Message Construction
  • Net synchronization
  • Frequencies and Interference Protection Feature (IPF)
  • Range Extension by Relay
  • Time Slot Reallocation (TSR)
  • Precise Participant Location and Identification (PPLI)
  • Link-16 Enhance Throughput (LET)
  • VMF Message Catalog
  • Video on Link-16

LINK-16 Capabilities

  • LINK-16 Basic Capabilities
  • Tactical Data Link 16
  • Link 16 Architecture
  • Link 16 System Operation
  • Waveform
  • Time Slots
  • Exchange real-time tactical data
  • Architecture
  • Time Division Multiple Access (TDMA)
  • Synchronization
  • Acquisition & maintenance of system time
  • Network
  • Time Slot
  • Link 16 Division of Network Time
  • Epochs, Frames and Timeslots
  • Network Participation Groups (NPG)
  • Terminal variations
  • Class I, Class II, MIDS (LVT-1, LVT-2, LVT-3)
  • Host platform integration requirements
  • Link 16 Messages
  • Link 16 Security

Principles and Features of Link 16 Systems and Terminals

  • Link 16 System Characteristics
  • Air/Ground Situational Awareness
  • Link 16 Architecture
  • LINK 16 Features
  • LINK 16 Functions
  • Fully Functional Link 16 Terminal
  • MIDS LVT-1 (Ethernet)
  • MIDS LVT-2 (Ethernet)
  • MIDS LVT-2 (X.25)
  • MIDS LVT-11 IP
  • MIDS LVT-3 (1553)
  • USN E-2 (1553)
  • USAF E-8 (1553)
  • USAF F-15 (1553)
  • USAF MCE (1553)
  • USMC MCE (1553)
  • US Army 2M (X.25)
  • LINK 16 Terminals
  • Multifunctional information distribution system (MIDS) fighter data link
  • Low Volume Terminals (LVT)
  • Terminal Options: MIDS terminals, Class 2 terminals
  • MIDS Low-Volume Terminals (LVTs)
  • The MIDS-LVT (1) Family
  • LVT (1) TACAN Tactical Air Navigation System, and Voice
  • LVT (4) Voice, but eliminates TACAN
  • LVT (6) provides TACAN no Voice
  • LVT (7) bare-bones model, no TACAN or Voice
  • MIDS LVT (2) family ground terminal
  • Handheld Link 16 Radio, BATS-D
  • Handheld Form Factor

Overview of NPGs

  • Network Participation Group (NPG)
  • 1 Initial Entry
  • 2/3 RTT-A/RTT-B
  • 4 Network Management
  • 5/6 PPLI and Status
  • 7 Surveillance
  • 8 Mission Management/ Weapons Coordination
  • 9 Control
  • 11 Image Transfer
  • 12/13 Voice A/B
  • 18 Network Enabled Weapons
  • 19/20 Fighter-to-Fighter A&B
  • 21 Engagement Coordination
  • 27 Joint Net PPLI
  • 28 Distributed Network Management

Example of LINK 16 Messages (J Series)

  • Network Management
  • Precise Participant Location and Identification (PPLI)
  • Surveillance
  • Intelligence
  • Weapons Coordination and Management (Network Enables Weapons AKA NEW)
  • Control
  • Platform and System Status
  • Electronic Warfare (EW)

LINK 16 Network Management Operational Scenarios

  • LINK 16 Architecture and Management
  • LINK 16 Troubleshooting and Monitoring
  • LINK 16 Network Planning and Design
  • LINK 16 Operation and Troubleshooting and Monitoring
  • Related J series messages

Link 16 Network Enabled Weapon (NEW)

  • Introduction to Link 16 Network Enable Weapons
  • Net Enabled Weapons  supporting  missions Use Cases
  • Network Enabled Weapons (NEW) Architecture
  • Network Enabled Weapon Messages (J11.X)
  • NEW Implementation Requirements
  • In-Flight Target Updates (IFTUs)
  • Targeting and engagement of Moving Targets
  • In-flight Retargeting/Reallocation
  • In-flight Abort
  • Sensor to Weapon 3PS Targeting (S2W 3PS)
  • Weapon to Weapon Coordination (Cooperative Attack)

Satellite TADILS

  • GEO  vs. LEO
  • Link-11 via satellite
  • Satellite TADIL-J (STJ)
  • Multicast TADIL-J (MTJ)

Structured Link 16 Troubleshooting Approaches

  • Isolate and solve Link 16 network, terminals and design problems
  • Root Cause Analysis Techniques applied to Link 16
  • TONEX Link 16 DFMEA and PFMEA processes and templates
  • Systematic elimination of hypothetical causes
  • Narrowing down on the possible causes
  • The top-down approach
  • The bottom-up approach
  • The spot-the-differences approach
  • The move-the-problem approach
  • Failure at Upper Link 16 Layers
  • Application Layer Failure
  • Failure at Lower Link 16 Layers
  • Failure at network topology
  • Failure at security keys
  • The Divide-and-Conquer Troubleshooting Approach
  • Follow-the-Path Troubleshooting Approach
  • The Compare-Configurations Troubleshooting Approach
  • The Swap-Components Troubleshooting Approach

Link 16 Troubleshooting Procedures

  • Link 16 Verification and Validation Plans
  • Testing, Simulation and Analysis Techniques
  • Verification of Link 16 initial and mission plans
  • Testing Link 16 Hardware Platforms and Software Features
  • Link 16 Network Design Verification
  • Testing Link 16 RF Capabilities
  • Synchronization testing
  • Testing Link 16 Features
  • Testing C2 to C2 Battle Management
  • Testing C2 to Fighter mission assignments
  • Testing Fighter to Fighter information exchange
  • Testing Imagery and Voice communications
  • Testing Network Enable Weapons

TONEX Link 16 Verification and Validation (V&V) Plans and Procedures

  • Link 16 Network Integrity V&V
  • Link 16 NPG Status V&V
  • Cryptonet V&V
  • Frequency Planning and Management V&V
  • Time Slot Duty Factor (TSDF) Tests
  • OPTASK Link V&V
  • Multi-Link Network V&V
  • Roles / Responsibilities V&V

oint Range Extension Applications Protocol (JREAP)

  • What is JREAP?
  • Tactical data over digital media and networks
  • JREAP/TADIL Testing/Simulation
  • JREAP Application Block
  • Joint Range Extension (JRE) Gateway
  • JREAP A – UHF DAMA
  • JREAP B – Serial
  • JREAP C – Ethernet

Link 16 Training covers all aspects of tactical data links  employed by the U.S Navy, the Joint Services, NATO and Japan.  Link 16 / JTIDS / MIDS training course covers all aspects of Link 16 / JTIDS (Joint Tactical Information Distribution System)/ MIDS (Multifunctional Information Distribution System).

Other Special Training Services

TONEX provides customized training to meet specific mission  and technology implementation goals Including:

  • SADL/EPLRS Fundamentals
  • VMF Fundamentals
  • JREAP Fundamentals
  • SATCOM Fundamentals
  • Combat Modeling and Simulation Fundamentals
  • Mission Planning Workshop
  • Platform specific: Operator and Maintenance
  • MIDS Terminal Fundamentals
  • COMSEC Workshop
  • Battlespace Technologies
  • Link 16 OPTASK Link Workshop
  • Advanced Link 16 Workshop
  • Link 16 Network Planning, Design, and Management
  • Tactical Data Link (TDL) RF Workshop
  • TDL Verification and Validation Workshop
  • Military EMC/EMI Workshop
  • Battlespace and Defense Communications Certification
  • Link 16 Network Management Workshop
  • Tactical Data Links & TDL Security Bootcamp
  • Link 16 Terminal Course
  • Military RF Engineering Bootcamp
  • Link 16 Master Certification
  • Link 22 Master Certification
  • Link 16, VMF and SADL/EPLRS Bootcamp
  • Tactical Data Links (TDL) Testing
  • TDL Planning, Procurement and Acquisition
  • Military Cyber Security Training Bootcamp
  • TDL for the Senior Military Professionals
  • Cyber for Military Professionals
  • Cyber Risk Management for Military Professionals
  • Defense Information Security Management Systems
  • Netcentric System of Systems Engineering Bootcamp

Who Should Attend

Operators, Engineers, Designers, Architect, Software and Hardware Developers, Project Managers, Product Managers, Sales and Support and anyone else who is interested to understand concepts behind Link 16 / JTIDS / MIDS.

Dec
17
Tue
Telecom Pricing, Cost and Financial Analysis Training @ Tonex Nashville, TN
Dec 17 @ 9:00 am – Dec 20 @ 4:45 am
Print Friendly, PDF & Email

Telecom Pricing, Cost and Financial Analysis Training by TONEX

Telecom Pricing, Cost and Financial Analysis Training, is a four-day Telecom training covering telecom pricing, cost and financial analysis. Learn the key concepts of practical telecom pricing, cost, financial analysis and management.

In Telecom Pricing, Cost and Financial Analysis Training course, participants will learn to perform  price analysis and cost analysis and financial modeling to determine price reasonableness in accordance with telecom authorities. This course is designed for personnel involved in establishing or modifying the price or cost of telecom services and products.

elecom Pricing, Cost and Financial Analysis Training course delves deep into telecom financial analysis and modeling. The participants will lean how to perform accurate financial analysis, how to use telecom financial indicators and benchmarks to allocate resources and evaluate potential projects for maximum ROI (return-on-investment).
Who Should Attend

Telecom financial analysts,cost accountants, cost analysts, budget analysts, systems analysts, auditors, accountants, accounting managers, and financial planners.

Learning Objectives

Upon completing of Telecom Pricing, Cost and Financial Analysis Training course, the attendees will be able to:

  • List financial terminology applied to telecom service providers
  • Explain telecom operators’ cost, financial models and pricing models
  • Determine how cost analysis shall be used and applied
  • Explain telecom financial analysis and performance measurement
  • Describe the role of telecommunications regulatory authorities, operating companies applied to cost and price Analysis
  • List telecom price and cost ratio analysis techniques
  • Describe best practices for telecom budgeting and forecasting
  • Summarize telecom project analysis and evaluation
  • List telecom cost and pricing Key performance indicators (KPIs)
  • Evaluate effective telecom financial management and cost control
  • Calculate new telecom service and product ROI
  • List cost related labor and support services
  • Negotiate telecom service cost analysis, financial techniques and contract audit
  • Calculate a telecom cost objective and a price/cost objective
  • List steps in financial analysis and modeling for project planning processes and financial projections
  • Review proven financial analytical tools and understand how and when to use them
  • Describe techniques to improve your organization’s profit picture by making sound business decisions
  • Determine pre-negotiation position applied to different stakeholders using cost and financial calculations
  • Use best practices in budgeting, forecasting, project evaluation and analysis
  • Master the processes of telecom pricing, financial management and cost
  • Control and strategies for telecom tariffing  and estimation of cost of network services
  • Describe financial analysis and modeling for services. infrastructure, network operations, IT, legal, competition, sales and marketing
  • Suggest modifications to telecom price or cost to assure reasonableness

Course Outline

Fundamentals of Telecom Cost and Pricing  

  • Principles of telecom products and services
  • Identifying telecom pricing and cost objectives
  • Identifying approaches to telecom pricing
  • Identifying target participants and stakeholders in the price, cost and financial analysis
  • Conducting market research for telecom price analysis
  • Techniques using market research to estimate probable telecom prices
  • Introduction to cost or managerial accounting
  • Principles of budgeting
  • Activity-Based Costing (ABC) for management control
  • Principles of standard costing and variance analysis
  • Cost-Volume-Profit analysis
  • Return on Investment analysis
  • Payback analysis
  • WACC and Hurdle Rates
  • NPV, IRR, ROI, ROIC, ROA RONA-ROCE
  • DuPont Formula and Residual Income (EVA) analysis
  • Internal cash management ratios analysis
  • Cash conversion cycle
  • Burn Rate
  • Turn and Earn
  • Exercise

Fundamentals of Telecom Financial Analysis

  • Ratios and metrics
  • Financial strategic planning and capital budgeting
  • Principles of financial forecasting and economic value-added models
  • Capital Investment proposals and projects
  • Income tax and capital investments
  • Balance sheet analysis
  • ROI, ROA, ROE
  • DuPont formula
  • Income statement analysis
  • Past performance and project outcomes
  • Benchmarking performance
  • Cash flow analysis applied to operations, investing, and financing
  • Cash flow performance indicators
  • Profitability vs. liquidity
  • Financial statement analysis
  • Managing capital
  • Debt and equity
  • Capital Asset Pricing Model (CAPM)
  • How to Calculate Present Value
  • Internal rate of return (IRR)
  • Net present value (NPV)
  • Analyze Financial Statements

Introduction to Telecom Cost Analysis

  • Cost of products and services
  • Cost analysis
  • General cost principles
  • Specific cost principles
  • Techniques to prepare cost analysis
  • Technical and audit support
  • OPEX vs. CAPEX
  • Direct labor costs
  • Indirect labor costs
  • Direct infrastructure and material costs
  • Profit calculation
  • Factors affecting profit analysis
  • Weighted guidelines
  • Trade-Off Analysis
  • Exercises

Applying Price-Related Factors to Telecom Products and Services

  • Telecom trend analysis
  • Telecom products and services cost factors
  • Price evaluation preferences
  • Comparing telecom services and product prices
  • Calculating consumers and businesses Should-Pay price
  • Techniques to calculate telecom Price Index Number
  • Price-Volume analysis and modeling
  • Cost Estimating Relationships
  • Calculating Ratio of price to estimated direct and indirect costs
  • Exercise and workshop

Advanced Techniques for Telecom Budgeting, Cost and Price Analysis

  • Operational budgeting and techniques
  • Time Value for Money
  • Compound interest and of present value
  • Capital budgeting
  • Telecom cost analysis, profit planning and volume/price risks
  • Cost analysis process
  • Cost analysis players, projects and initiatives
  • Pricing strategies
  • Cost accounting standards
  • Regulations to negotiated contracts and subcontracts
  • Contract cost principles and procedures.
  • Fundamental quantitative problems
  • Fundamental quantitative pricing skills
  • Telecom cost analysis techniques
  • Telecom cost accounting standards
  • Price Index Numbers
  • Net Present Value
  • Cost estimating relationships
  • Cost-volume analysis
  • Cost-volume-profit analysis
  • Contract Financing
  • Cost vs. price Analysis
  • Price analysis techniques
  • Price-related factors
  • Scenarios for price analysis
  • Exercise

Advanced Telecom Cost Modeling, Pricing and Financial Analysis – Methodologies

  • Telecom cost and pricing modeling techniques
  • Network costs
  • Interconnection costs
  • Installation and provisioning cost
  • Cost allocation techniques
  • Inventory costs
  • Statistics in pricing
  • Simplified regression analysis
  • Activity based costing/management (ABC/ABM)
  • Profitability and variance analysis
  • Non-financial performance measures (“Balanced Scorecard”)
  • Long Run Incremental Costs (LRIC)
  • Real world examples
  • Telecom Activity-Based Costing (ABC) case study
  • Macroeconomics and growth
  • Politics
  • International trade
  • Microeconomics, supply & demand
  • Big data, analytics and forecasting techniques
  • Pricing influences
  • Quality vs. competition
  • Elasticity of demand
  • Fixed and variable cost modeling
  • Cost Function and transfer pricing
  • Economies of Scale
  • Engineering & redesign
  • DFSS, DFMA, VE,
  • Benchmarking
  • Commercial decisions
  • Calculate mean ands deviation of a dataset
  • Modeling risk and uncertainty
  • Monte Carlo simulations applied to uncertainty
  • Option pricing models
  • Workshop and Group Project
  • Capstone Exercise
Jan
21
Tue
SCADA (Supervisory Control And Data Acquisition) Training @ Tonex Plano
Jan 21 @ 9:00 am – Jan 22 @ 4:00 pm
Print Friendly, PDF & Email

Why should you choose TONEX for your SCADA Training?

SCADA Training, Supervisory Control and Data Acquisition, is a unique training experience provided by TONEX since 2001. When it comes to the sensitive principles in  you need the very best SCADA training courses for your organization. Tonex is synonymous with high-end training courses, specialty workshops and boot camps that focus on information technology, mobile applications and defense. We work with Fortune 500 companies, small businesses and government agencies to deliver the accurate, up-to-date information that is required to excel in the respective field. Our SCADA courses are nothing short of perfection.

Tonex SCADA Training Courses

At this time, Tonex offers the following SCADA System courses:

• SCADA Security Training • SCADA Training – SCADA Training Courses

We teach the following points in our SCADA System training courses:

• Principles of SCADA and Industrial Network Security • Securing infrastructure networks for Smart Grid • SCADA system components • Architecture protocol • Cyber-security • Provisioning • Regulatory requirements • Theory of operations • How to evaluate potential SCADA benefits

Apr
1
Wed
Solar SCADA Training, Supervisory control and data acquisition (SCADA) @ Tonex Plano
Apr 1 @ 9:00 am – Apr 3 @ 4:00 pm
Print Friendly, PDF & Email

Solar SCADA Training, Supervisory control and data acquisition (SCADA)

Solar SCADA Training covers the basic of SCADA systems in solar. SCADA (Supervisory control and data acquisition) is an industrial automation control system at the core of many modern industries, including Energy and Solar. Solar SCADA systems deploy multiple components including: sensors, IEDs, PLC, RTUs, HMI, SCADA software and hardware elements to Monitor, gather, and process data in the Solar environment. SCADA will interact with solar devices  devices and are connected through HMI (human-machine interface) software. Analytics is a big value added for trending, system health and operation.

Learn about:

  • Benefits of SCADA
  • SCADA components and architecture
  • Managing and optimizing solar electric photovoltaic (PV) system using SCADA
  • Optimize energy production and consumption based on location, orientation and plant conversion efficiency
  • Enhancing your real-time energy production and conversion efficiency
  • Learn how SCADA technology will improve quality of system components
  • Role of SCADA in SOLAR system performance monitoring
  • SCADA security and control

Topics Covered:

What is SCADA?

  • Capabilities of SCADA
  • How SCADA systems work
  • The value of SCADA
  • Basic SCADA Architecture
  • SCADA, ICS, DCS and PLC
  • The Evolution of SCADA
  • A basic SOLAR SCADA system

Modern Solar SCADA Systems

  • Essential components of a PV monitoring system
  • Solar PLC, HMI and SCADA software and hardware
  • Role of SCADA in Solar PV (Photovoltaic) energy generation and performance
  • Managing Solar through SCADA
  • Monitoring PV plants
  • Measuring values at the DC level
  • Grid Integration and Solar
  • PV Plant with Solar’s Control System
  • Solar Plant Controllers

Solar SCADA Technologies & Capabilities

  • Solar and Grid Integration
  • Solar Grid Integration Plant Design
  • Solar Plant Design & Engineering Project Engineering and Development
  • Advanced PV Modules Balance of Systems
    Balance of Systems Technologies Mounting Systems
  • Mounting Systems Construction Management
  • Solar Procurement & Construction Management Operations and Maintenance
  • Solar SCADA Operations & Maintenance
  • SCADA Operations Center
  • Solar Energy Forecasting
  • Solar Trending with SCADA

Solar SCADA Best Lessons Learned

  • SCADA security
  • Solar SCADA security mechanisms
  • Solar SCADA Communications Network
  • Ethernet, WiFi, Cellular, Microwave
  • Other Systems
  • SCADA Protocols
  • IEC 60870-5-101
  • Modbus
  • DNP3
  • Deploying Solar SCADA Systems
  • Security and Vulnerability of Solar SCADA Systems
  • Attacks Against Solar SCADA Systems
  • Developing a Solar SCADA Security Strategy
May
11
Mon
Electronic Warfare Training Bootcamp | EW Crash Course @ Live on-line and at Tonex Nashville, TN
May 11 @ 9:00 am – May 14 @ 4:00 pm
Print Friendly, PDF & Email

Electronic Warfare Training Bootcamp, or Electronic Warfare Training Crash Course is a 4-day intensive training bootcamp covering key concepts, technologies and principles of operation of  Electronic Warfare (EW) systems and radar-controlled weapon systems including:

  • NAVAL EW
  • GROUND EW
  • AIRBORNE EW
  • CYBER EW

Electronic attack, protection and support are key EW functions including:

  • Domain superiority inclusing land, air, sea, space, cyberspace
  • Superiority or control in the electromagnetic spectrum
  • Disrupting a given EW related signal
  • Using radio waves,infrared or laser light, to confuse or disable an enemy’s electronics
  • Preventing a receiver from being jammed
  • Support and operation to augment detection and mitigation
  • Creating and producing the data necessary to disrupt the electromagnetic spectrum
  • Collecting an enemy’s radio signals or sensing the radar of an incoming missile.

TONEX has been a leader in electronic warfare training and consulting since 1993.

TONEX has helped in knowledge transfer to U.S. and NATO government agencies, DoD and government contractors to develop EW systems and recently tactical lasers, advanced electro-optics, next generation jammers, big data and analytics to support activity-based intelligence, Link-16,  along with ISR and electrical systems capable of powering innovations for the future.

Learn about:

  • Fundamentals of EW
  • Use of EW to combat activities from detecting and defending IED attacks to jamming enemy communications, ship defense or taking over control of enemy drones
  • Use of Radio, Infrared and Radar
  • Military action involving the use of electromagnetic
  • Electronic countermeasures
  • RF detection and mitigation to augment security operation
  • Detection and mitigation techniques
  • Big data and analytics
  • Electronic Warfare strategy
  • Advanced electronic warfare technology to defend assets and proactively use the electromagnetic spectrum to attack enemies
  • EW systems including Navy’s Next Generation Jammer, Army vehicle-mounted EW and Air Force integration of EW into its fleet
  • Advanced EW attack technology
  • Advanced electronic attack
  • Advanced electronic warfare support
  • Harden kill-chains with electronic protection
  • principals of electromagnetic battle management to manage the assets in the battlespace

For details of  Electronic Warfare Training Bootcamp, CLICK HERE

Key Topics Include:

  • Introduction To Electronic Warfare (EW)
  • Radar Fundamentals
  • Target Discriminants
  • Characteristics Of RF Radiation
  • Electromagnetic Spectrum
  • Radar Signal Characteristics
  • Radar Principles
  • Antenna Characteristics And Scans
  • Target Tracking
  • Radar Missile Guidance Techniques
  • Electronic Warfare Fundamentals Table Of Contents
  • Fundamentals Of Radar Jamming
  • Radar Noise Jamming
  • Decoys
  • IR Fundamentals
  • Laser Fundamentals
  • Radar Electronic Protection (EP) Techniques
  • Radar Warning Receiver (RWR) Basic Operations
  • Geolocation Techniques
  • Self-protection Jamming System Operations
  • Electronic Warfare (EW) Key Principles & Overview
  • Electronic Warfare (EW) Operational Functions and Capabilities
  • Using DoDAF to Architect Electronic Warfare (EW) Operation, Capabilities, System and Services
  • Threat Systems and Simulation
  • Electronic Attack Concepts
  • Electronic Protection and Jamming Radar, Electromagnetic, Radio Propagation Theory and Communications Systems
  • Electronic Warfare (EW) Physics, Math and Calculations
  • Application of Chaff and Decoys
  • Application of IR/EO Threats and Countermeasures
  • Role of Antennas and Receivers used in Electronic Warfare
  • Principles and Types of Antennas, Receivers and Signal Processing
  • Probability of Detection Calculation
  • Precision Location Techniques
  • Radar Characteristics and Radar Types
  • Electromagnetic Spectrum (EMS) warfare
  • Traditional and Next Generation Threat Radars and Countermeasures
  • Traditional and Next Generation Communications Threats and Countermeasures
  • Decoys and Infrared Threats & Countermeasures
  • Directed Energy Weapons (DEW)
  • Principles of Laser and High Power RF DEW
Aug
24
Mon
Microgrid Certification Training | Microgrid Certificate @ Live on line and at TONEX Plano
Aug 24 @ 9:00 am – Aug 27 @ 4:00 pm
Print Friendly, PDF & Email

Microgrid Certification Training, Microgrid Certificate

Microgrid Certification Training curriculum is a leading edge certification and relevant to what is happening in the energy industry right now. Microgrid technology is an advanced technology developed in recent years as a critical competence of traditional power networks with reliable and efficient operation across a wide range of industries. The ability to deliver the technical information of smart grids to the right audience at the right time is a valuable skill, especially for those engaged in the field of power systems.

Microgrid Certification Training, Micro grid Certificate helps you to understand the microgrids, their operation and control as well as energy management principles applied to the microgrids. This certificate is divided into three main topics in microgrids which will help engineers and scientists to prepare themselves with the skills and required confidence to meet their organization’s needs or position themselves for their job responsibilities and promotions.  Our experts at TONEX will help you to understand the fundamental concepts of micro grids in order to tackle the real-world challenges. The micro gird certificate consists of four major topics:

  • Introduction to Microgrids
  • Microgrid operation and control
  • Energy management systems in Microgrids

The first part of the Microgrid Certification Training briefly introduces the concept of microgrids, background of renewable energy sources as the main components of a microgrid, history of renewable energy sources, advantages of microgrids and transmission system implemented in microgrids. Furthermore, you will be introduced to the basic per unit systems applied to microgrids, different types of microgrids, main operating modes in a microgrid such as: islanded mode and grid connected mode To add more details to the microgrids, you will learn the basics of solar panels, wind farms and energy storage systems as three main components of a microgrid in detail.

For each part, the operation basics, and main components will be briefly introduced and recent advancement will be taught. For example, main components of a wind farm generation unit such as: wind generators, wind turbines, towers, and foundations will be introduced and power converters implemented for each device will be discusses briefly. By the end of the first part, the audience are supposed to understand the basics of microgrid operation and should be able to understand the solar photovoltaic panels, wind farms, and battery energy storage systems.

You will also learn:

  • Transformers in microgrids
  • Different types of load in microgrids
  • Fault tolerance in microgrids
  • Cost benefits regarding microgrids
  • Hybrid microgrids
  • Micrgorid stability assessment and protection
  • Batteries in solar panels
  • Different types of PV modules
  • PV strings
  • Hybrid PV systems
  • Pulse width modulation techniques in microgrids
  • Power voltage curves for PV system
  • Power curves in wind turbines
  • Different types of wind turbines
  • Concept of pitch in wind farms
  • Series compensation in wind parks
  • Control of wind energy systems
  • Concept of energy storage systems
  • Applications of energy storage systems in microgrids
  • Conventional energy storage systems
  • Control of battery energy storage systems
  • Droop control in energy storage systems

The second part of the Microgrid Certification Training, Microgrid certificate training focuses on operation and control of microgrids from basic traditional approaches to the advanced hierarchical control of microgrids.  Firstly, basics of microgrid control will be introduced and different control modes in islanded mode and grid connected operation mode of the microgrid will be discussed. You will also learn the power elecrtronic converter control, classifications and operation, operation principles of wind farms, PV, energy storage, concept of offshore wind farms, and maximum power point tracking in microgrids. Next our instructors will focus on two separate operating modes in a microgrid (islanded and grid connect) and will describe the different control methodologies applied to each mode so far. For example, effect of voltage dips in islanded mode, active power control in islanded/grid connected mode, supporting the voltage and frequency in grid connected mode, parallel operation of converters in islanded/grid connected mode, concept of droop control in islanded mode, reactive power sharing in grid connected mode, and low voltage ride through capability of converters in grid connected mode are covered in the second part. Finally, the advanced control methodology named as hierarchical control of microgrid will be introduced and concepts of primary, secondary and tertiary controllers will be discussed in detail. You will also learn:

  • Voltage source converters in microgrids
  • Distributed loads in microgrids
  • Effect of electric vehicle charging in microgrid
  • Operation of storage units in islanded mode
  • Virtual synchronous generator effect in islanded microgrid
  • Power quality in islanded mode
  • Effect of LCL filter
  • Inner current loop and frequency control in islanded mode
  • Control of single converter in grid connected mode
  • Master and slave control of microgrids
  • Primary droop control
  • Secondary voltage and frequency control in microgrids
  • Primary control in wind farms, energy storages and PV
  • Power flow using tertiary control of microgrids
  • Frequency restoration
  • Peak shaving in microgrids
  • Demand response in microgrids
  • Unbalance compensation
  • Voltage harmonic reduction in microgrids

The third part of Microgrid Certification Training, Microgrid certificate training covers the energy management system (EMS) in microgrids. Firstly, the definitions and common terms will be provided to describe the concept of EMS. Then, the audience will be introduced with the main topics of EMS in microgrids such as: Data forecasting in microgrid EMS, DG scheduling, load dispatch, photovoltaic effect in EMS, effect of fuel cells in microgrid EMS, and optimization platform for microgrids.  After introduction part, our instructors will go into the details of EMS architecture and control in microgrids. You will learn the centralized and decentralized EMS techniques, market operator, local controllers, effect of real time data in centralized EMS, communication advancement in EMS, exchanging the price information between multiple DGs, advantages and disadvantages of microgrid EMS, forecasting the data for EMS, optimizing the power flow, optimizing the EMS policies and voltage and frequency control in short term microgrid EMS. Finally, the audience will be introduced to the challenges in the microgrid EMS such as renewable energy intermittency, network latency, and reliability of communications, two way communication challenges, and cyber security in centralized and decentralized microgrid EMS.  You will also learn:

  • Optimal dispatch in microgrid EMS
  • Monitoring devices for EMS
  • Load dispatch in microgrid EMS
  • Major vendors of EMS
  • Photovoltaic in EMS
  • Battery energy storage effect in microgrid EMS
  • Centralized and decentralized EMS in microgrids
  • Microgrid central controller (MGCC)
  • Communicating with neighbors in microgrid
  • Synchronization of microgrid through consensus objective
  • Data transfer limit between neighbors in microgrid
  • Human machine interface (HMI)
  • Real-time control effect in microgrid EMS
  • Optimization in microgrid EMS
  • Weather forecasting
  • Short term and long term EMS
  • Electricity market in EMS
  • Reliability of communications
  • Time synchronization
  • Openness of microgrid EMS
  • Reliability and cyber security of microgrid EMS

microgrid certification training<img class=”alignnone size-full wp-image-9025″ src=”https://tonex.wpenginepowered.com/wp-content/uploads/microgrid-certification-training.jpg” alt=”microgrid certification training” width=”395″ height=”128″ srcset=”https://tonex.wpenginepowered.com/wp-content/uploads/microgrid-certification-training.jpg 395w, https://tonex.wpenginepowered.com/wp-content/uploads/microgrid-certification-training-300×97.jpg 300w” sizes=”(max-width: 395px) 100vw, 395px” />

 

Audience

The Microgrid Certification Training, Microgrid certificate training is a 4-day course designed for:

  • All engineers who wants to learn, design, or operate the micro grids
  • Power traders to understand the modern microgrid technologies.
  • Independent system operator personnel.
  • Faculty members from academic institutes who want to teach the renewable energy or micro grid courses.
  • Investors and contractors who plan to make investments in smart grid industry.
  • Professionals in other energy industries.
  • Marketing people who need to know the background of the products they sell.
  • Electric utility personnel who recently started career in power systems or having new job responsibilities related to micro grids.
  • Technicians, operators, and maintenance personnel who are or will be working at green energy based companies.
  • Managers, accountants, and executives of power system industry.
  • Scientist or non-electrical engineers involved in micro grid related projects or proposals.
  • Graduate students seeking a professional career in micro grids

 

Microgrid Certification Training Objectives

Upon completion of the Microgrid Certification Training, Microgrid certificate training course, the attendees are able to:

  • Understand the concept of microgrids with its main components
  • Understand the operation of battery energy storage systems
  • Describe the main parts and operation principle of wind farms
  • Explain the operation and control of solar PV modules.
  • Describe the main power electronic converter types implemented in microgrids
  • Understand the hierarchical control of microgrids
  • Describe the differences between islanded mode and grid connected mode operation of microgrids
  • Explain the droop control methods implemented in microgrids
  • Understand the voltage and frequency control algorithms in microgrids
  • Describe the power control methods in islanded or grid connected mode operation.
  • Understand the energy management systems (EMS) in microgrids.
  • Tackle different challenges related to microgrid EMS.
  • Understand the EMS in centralized or decentralized microgrids.
  • Explain the effect of data forecasting in microgrid EMS

Microgrid Certification Training Course Agenda and Topics

Microgrid Certification Training, Microgrid certificate-Part1 (Introduction):

Concept of Microgrids

  • Traditional power network
  • Background and history of renewable energy sources
  • Trends for microgrids
  • Power electronic based devices
  • Common terms
  • Cower consumption in microgrids
  • Renewable generation units
  • Transformers in microgrids
  • Different types of loads in microgrids
  • Component of a microgrids
  • Per unit system
  • Transmission lines
  • DC and AC microgrids
  • Advantages of microgrids
  • Redundancy
  • Modularity
  • Fault tolerance
  • Efficiency in microgrids
  • Maintenance
  • Smaller size and cost benefits
  • Grid connected microgrids
  • Islanded mode operation of microgrids
  • Typical structure of microgrids
  • AC-DC hybrid microgrids
  • Microgrid configurations
  • Synchronization of AC sources in microgrids
  • Stability assessment of microgrids
  • Microgrid protection

Solar Panels and Photovoltaics in Microgrids

  • Why solar energy?
  • High photovoltaic (PV) penetration and utility distribution systems
  • Solar system owners
  • Advanced distribution system and solar panels
  • Main components of a PV system
  • PV module or solar arrays
  • Battery
  • Charge regulator
  • Inverter
  • Back-up generator
  • DC/AC loads
  • Different types of PV modules
  • Main elements of a PV module selection
  • PV strings
  • Connection of modules, series and parallel
  • Lead-acid batteries in PV systems
  • Nickel Cadmium batteries in PV systems
  • Standalone PV system
  • Grid connected PV system
  • Hybrid PV system
  • PV system design considerations
  • Costs in PV systems
  • Installation and operation principals of PV systems
  • PV system control
  • Maximum power point tracking
  • Proportional resonance controller
  • Pulse width modulation unit
  • Current controller
  • Phase locked loop in PV systems
  • Voltage current characteristics of PV modules
  • Power curves for PV system
  • Incremental conductance control
  • Perturb and observe control in PV system

Wind Farms in Microgrids

  • Wind energy systems
  • Wind farm scales
  • Grid integration of wind farms
  • Economics of wind farms
  • Fundamentals of wind power
  • Kinetic energy in wind power
  • Efficiency in extracting the wind power
  • Power curves in wind turbines
  • Different types of wind turbines
  • Doubly fed induction generators (DFIG)
  • Permanent magnet based wind farms
  • Main components of a wind farms
  • Wind generator
  • Wind turbine
  • Wind turbine blades
  • Horizontal and vertical axis wind farms
  • Tower
  • Drive train
  • Electronics and control
  • Pitch
  • Brake
  • Cooling system
  • Foundation of wind farms
  • Control of wind farms
  • Transmission lines
  • Concept of reactive power compensation in wind farms
  • Oscillations in wind farms
  • Control of drivetrain speed
  • Blade regulation control
  • Stalling and pitch angle control
  • Active and reactive power control in DFIGs
  • Wind forecasting
  • Future technology developments of wind farms
  • Cost of wind energy

Battery Energy Storage Systems in Microgrids

  • Concept of energy storage systems
  • Emerging needs for energy storages
  • Effect of energy storages in utility, customers and generations
  • Classifications of energy storage systems
  • Economics of energy storages in market
  • Energy storage applications in current grids
  • Limiting factors in energy storage implementations
  • Mechanical storage systems
  • Electromechanical storage systems
  • Chemical energy storages
  • Thermal storage systems
  • Conventional battery technology
  • Capacitors
  • Superconducting magnetic energy storage
  • Contingency reserves by energy storages
  • Reactive support and voltage control
  • Black start capability of energy storages
  • Congestion management by energy storages in microgrids
  • Demand management
  • Detailed models of energy storage systems
  • Different sizes of energy storage system for microgrid applications
  • Applications of energy storages in microgrids
  • Grid operational support by energy storages
  • Power quality and reliability improvements by energy storages
  • Concept and power and energy in storage systems
  • Discharging principles
  • Short term applications of energy storages in microgrids
  • Control of energy storage systems
  • Droop control
  • Active and reactive power control in energy storages
  • State of charge (SOC) control
  • Optimization techniques by energy storage system control

 

Microgrid Certification Training, Microgrid certificate-Part2 (Control and Operation):

Basics of Microgrid Control

  • Types of operation of microgrids
  • Control in grid connected mode
  • Control in islanded mode
  • Power electronic based equipments in microgrids
  • Power electronic converters
  • Power electronic switches
  • Classification of power electronic converters implemented in microgrids
  • Voltage source converters in microgrids
  • Multilevel voltage source converters
  • Pulse width modulation techniques
  • Operation principles of PV panel system
  • Operation principles of wind turbines
  • Effect of UPS in microgrid systems
  • Distributed loads in microgrids
  • Effect of virtual inertias in microgrids
  • Integration of distributed generation to shape smart grids
  • Necessity of maximum power point trackers
  • Operation of storage units in islanded mode
  • Effect of electric vehicle charging stations in microgrids
  • Wind turbine generations, offshore and on shore

Islanded Mode Operation of Microgrids

  • Islanded mode operation basics
  • Effect of long-term voltage dips or faults
  • Importing and exporting the active and reactive power
  • Controlling the current and voltage in converters
  • Supporting the frequency and voltage
  • Virtual synchronous generator effect
  • Blackouts by main grids
  • Voltage and frequency management in islanded mode operation
  • Supply and demand balancing effect
  • Power quality in islanded mode operation
  • Hierarchy of loads in islanded mode
  • Concept of point of common coupling
  • Control of a voltage source converter in islanded mode
  • Effect of LCL filter
  • Direct and quadratic (d-q) axis based control
  • Voltage control loop
  • Effect of inner current loop in islanded mode
  • Parallel converters in islanded mode operation
  • Effect of master/slave control in islanded mode
  • Frequency droop control in parallel operation
  • Voltage droop control in parallel operation

Grid Connected Mode Operation of Microgrids

  • Basics of grid connected operation
  • Control of a single converter in grid connected mode
  • Effect of parallel converters in control
  • Concept of master and slave control
  • Inner current loop and voltage control in grid connected mode
  • Droop control strategy of grid connected converters
  • Active power sharing among converters through droop
  • Reactive power sharing droop
  • Concept of inertia in microgrids
  • Effect of synchronization through an inverter
  • An inverter working as a synchronous generator
  • Park transformation in droop control of inverters in grid connected mode
  • Low voltage ride through capability of voltage source converters in grid connected mode

Hierarchical Control of Microgrids

  • Primary control loop
  • Secondary control in microgrids
  • Tertiary control
  • Centralized control of microgrids
  • Decentralized control of microgrids
  • Primary control in wind energy systems
  • Primary control in PV systems
  • Primary control in energy storages
  • Secondary control in wind energy systems
  • Secondary control in PV systems
  • Secondary control in energy storages
  • Calculating power flow for tertiary control
  • SOC management control for energy storage system
  • Cooperative synchronization of multiple energy storage units
  • Secondary control in islanded microgrids
  • Frequency restorations
  • Power quality improvement
  • Energy management systems for load shedding
  • Load shedding
  • Peak shaving control
  • Synchronization of the microgrid with grid
  • Optimization and upper level control as a tertiary control loop
  • Low voltage ride through as a tertiary control loop
  • Islanding detection
  • Microgrids interconnections
  • Harmonic compensation
  • Voltage harmonic reduction in grid connected mode
  • Voltage harmonic reduction in islanded mode
  • Unbalance compensation in microgrids
  • Concept of unbalance in microgrids
  • Sources for unbalances
  • Modeling the unbalance effect
  • Designing the compensation algorithms
Jan
25
Mon
RF Training Fundamentals @ Live on Line
Jan 25 @ 9:00 am – Jan 26 @ 4:00 pm
Feb
10
Wed
MBSE Training | Model-Based Systems Engineering Training @ Live online
Feb 10 @ 9:00 am – Feb 12 @ 3:00 pm
Print Friendly, PDF & Email

Length: 3 Days

Print Friendly, PDF & Email

MBSE Training Course Description – Model-Based Systems Engineering

MBSE Training, Model-Based Systems Engineering (MBSE), covers the formalized application of modeling to support systems analysis, use cases, requirements, design, analysis, verification, and validation activities. MBSE Training covers the process that begins with the conceptual design phase and continues throughout development and later life cycle phases. MBSE Training will show the modeling capabilities of MBSE to link all elements of your system to have greater visibility into your design, verification and validation. Learn how SysML used to model structure and behavior of dynamic systems.

MBSE_Diagram

MBSE can manage the development and deployment of complex systems without  ad-hoc collections of independent documents. MBSE with SysML includes a general-purpose graphical modeling technique for specifying, analyzing, designing, and verifying complex systems that may include hardware, software, information, personnel, procedures, and facilities.

TONEX provides basic and advanced MBSE training includes SysML training covering OMG SysML. Learn about the industry standard for modeling Systems Engineering applications, Agile Modeling methods such as Scrum and Robust Process methods such as Unified Process compatible).

SysML provides graphical representations with a semantic foundation for modeling system requirements, behavior, structure, and parametric equations that can integrate with a broad range of engineering analysis.

Learning Objectives

Upon completion of this course, the attendees will:

  • Understand what MBSE is
  • Describe how MBSE supports systems engineering processes
  • Recognize the various types of MBSE methodologies
  • Apply MBSE knowledge in your day-to-day SE work
  • Understand what SysML is
  • Learn about SysML diagrams
  • Learn the benefits of implementing MBSE and SysML in a modeling environment and tools
  • understand SysML fundamental constructs
  • Describe how SysML fits with related MBE/MBSE technologies
  • Discover the benefits of a SysML-based MBE/MBSE approach
  • Create a plan to deploy MBSE and SysML technologies in your organization

MBSE Training Course Outline

What is Systems Engineering ?

  • What is System?
  • System Thinking
  • Applying systems thinking to systems design
  • Avoiding Poor Design
  • Entities
  • Attributes
  • Relationships
  • Integrated requirements management
  • Capture customer needs accurately
  • Architecture development
  • Subsystems and components
  • Validation and Verification
  • Highlights gaps and missing functions

SE Practices for Describing Systems

  • Motivation for Systems Engineering
  • Systems Engineering Process
  • Systems Engineering Method
  • Specifications
  • Interface requirements
  • System design
  • Analysis & Trade-off
  • Test plans
  • System Modeling Activities
  • Integrating MBSE into the SE Process
  • System Development Process
  • Moving from Document centric to Model centric

Model-based systems engineering (MBSE)

  • Definition of Model-Based Systems Engineering (MBSE)
  • System Model
  • Contrasting Document-Based SE with MBSE
  • Purpose for Modeling a System
  • Requirements for a systems engineering process
  • What is a model?
  • An Integrating framework for the Systems Engineering
  • MBSE definitions
  • MBSE benefits and advantages
  • Unlocking the power of MBSE
  • Requirements
  • Behavior
  • Communication
  • Four elements of a model
  • Characteristics of a model
  • System modeling language
  • Modeling the  behavior
  • Structure and system relationships
  • the model  and concept of the design
  • MBSE Methodologies
  • MBSE  model and system definition language
  • Modeling languages and information standards
  • UML
  • SysML

MBSE Across the System Life Cycle

  • MBSE ‘s role to facilitate traditional SE activities
  • Specification and design precision
  • System design integration
  • Re-use of system artifacts
  • Output of MBSE as a system model
  • Model Requirements
  • Model Analysis and Design
  • Model Simulation
  • Model Code
  • Model Test
  • Simple Model Construction
  • Requirements, functions, and components
  • Modeling Notations
  • Integrated graphical views
  • Hierarchies
  • Functional flow and enhanced functional flows
  • N2
  • IDEF0
  • Physical block
  • Systems Engineering Solutions
  • Robust and agile analysis
  • Requirements definition through architecture to systems verification
  • End-to-end traceability
  • Extensive behavioral modeling representing control flow, function flow, and interface flow
  • System simulations
  • Behavioral models
  • Integrated Model-Based
  • Model Based Operational  and System Architecture
  • Languages, Processes, Tools and architecture frameworks

Overview of SysML

  • Introduction to the OMG Systems Modeling Language (OMG SysML™)
  • 4 Pillars of SysML
  • SysML Diagram Types
  • SysML Diagrams
  • Package diagram
  • Requirement diagram
  • Use Case diagram
  • Block Definition diagram
  • Internal Block diagram
  • Activity diagram
  • Sequence diagram
  • State Machine diagram
  • Parametric diagram

Modeling with SysML

  • Using SysML in Support of MBSE
  • Modeling Functionality with Use Cases
  • Modeling Requirements and their Relationships
  • Modeling Structure with Blocks (Block Definition Diagrams)
  • Modeling Structure with Blocks (Internal Block Diagrams)
  • Modeling Flow-Based Behavior with Activities
  • Modeling Event-Based Behavior with State Machines
  • Modeling Message-Based Behavior with Interactions
  • Modeling Constraints with Parametrics
  • Modeling Cross-Cutting Relationships with Allocations

Working with MBSE Domains

  • Architecting, specifying and developing complex systems
  • Process Domain (SE activities)
  • Source Requirements Domain
  • Behavior Domain
  • V&V Domain
  • Architecture Domain

Workshops: Working with SysML Diagrams

  • Block Definition Diagrams
  • Internal Block Diagrams
  • Use Case Diagrams
  • Activity Diagrams
  • Sequence Diagrams
  • State Machine Diagrams
  • Constraints and Parametric Diagrams
  • Package Diagrams
  • Requirements Diagrams
  • Allocations
Mar
8
Mon
EMI/EMC Training @ Live online
Mar 8 @ 9:00 am – Mar 10 @ 4:00 pm
Print Friendly, PDF & Email

EMI/EMC Training Course by TONEX

Applied Electromagnetic Compatibility (EMC) and Electromagnetic Interference (EMI) training course serves as a technical program to electromagnetic compatibility (EMC) and electromagnetic interference (EMI). It is a technical overview of many topics.

Tonex Applied EMC/EMI course is applicable to professional engineers and technicians practicing in EMC fields to include bonding, grounding, shielding, EMI prediction, EMI analysis, conducted and radiated interference, lightning protection and more.

Learn about the requirements that commercial and military electronic systems must meet to get certified. Master techniques that can be used to protect systems against these threats. Explore unconventional high power EM threats, including nuclear electromagnetic pulse and high power microwave weapons (optional topics)

In a nutshell, Engineers know the math and the physics of EMC. Technicians know the instruments and test setups. Engineers need good writing and verbal skills. Technicians need to know the pitfalls of real measurements. All applicants have to be competent in the fundamentals, i.e., coupling, filters, shielding, etc. as well as the specifications which apply to their particular specialty.

Aug
30
Mon
Link 16 and MIDS Training Bootcamp @ Live online and Tonex Plano
Aug 30 @ 9:00 am – Sep 2 @ 4:00 pm
Print Friendly, PDF & Email

Link 16 and MIDS Training Bootcamp

Link 16 and MIDS Training Bootcamp is a 5-day special program provides an overview  of the concepts of Tactical Data Links and Link 16 and  MIDS-LVT terminals, their functions and operations, and maintenance as a Link 16 Tactical Data Link Terminal.

TONEX offers a variety of TDL, Link 16 and MIDS training courses  to meet your applications of Link 16/MIDS, and TDL needs. Link 16 and MIDS training courses are fully customized to meet your specific technology, operation, mission or strategy MIDS Specifications and Documentation

Link 16 and MIDS Training Bootcamp introduces the attendees to the various Link 16 will learn Link 16 and MIDS-LVT terminals functions, processes, capabilities, planning, operations and management. Link 16 and MIDS Training Bootcamp is a vendor-neutral course but still covers many aspects of the commercial terminals offered by different vendors.

Vendor-neutral Link 16 and MIDS training, of course, can help your organization embrace the best practices in Link 16 and Link 16 MIDS terminals in a way that vendor-specific training probably can’t. Link 16 and MIDS Terminal vendor-neutral training can also help you build the expertise your organization needs to evaluate Link 16 MIDS terminals and solution providers and ultimately avoid vendor lock-in.

Course Objectives

Upon completion of this course, the attendees are be able to:

  • Describe principles behind Tactical Data Links (TDL) and Link 16
  • Describe what Link 16 is and how operates as a TDL
  • Describe the difference between Link 16 with other TDLs and related technologies and protocols such as Link 11, Link 22, SADIL, JREAP and VMF
  • List Link 16 protocol, architecture and functional characteristics
  • Describe Link 16  functions and applications
  • Describe basics of the Link 16 protocol, Link 16 network and Link 16 terminal
  • Define Link 16 terminal requirements architecture and design
  • Explain Link 16 network design and implementation using MIDS
  • List MIDS features and benefits
  • Describe principles behind MIDS and MIDS-LVT terminals
  • Describe Link 16 MIDS terminals software hardware
  • Describe operation of different types of MIDS-LVT terminals
  • Describe concepts behind MIDS-LVT (1) and MIDS-LVT (2) terminals
  • Describe operational procedures behind Link 16 MIDS terminals

Course Topics

Introduction to Tactical Data Links

  • Introduction to Network Centric Warfare
  • Overview of Tactical Data Link (TDLs) Solutions
  • Introduction to Link 16
  • Introduction to Multifunctional Information  Distribution System (MIDS)
  • Overview of MIDS/Low Volume Terminals (LVT)

Overview of Link 16

  • Link 16 as a TDL
  • Link 16 Networking
  • Link  16 Benefits and Features
  • Link 16  Operation
  • Overview of Link 16 Architecture
  • Link 16 Terminals, Interfaces and Functions
  • Link 16 Network Management
  • Link 16 Terminals and Software
  • Link 16 Terminals: JTIDS, MIDS and JTRS
  • Operation of the MIDS, MIDS JTRS
  • Link 16 Terminal Communications Interfaces
  • Link 16 Terminal connecting to  X.25, 1553, and Ethernet interfaces
  • Link 16 Troubleshooting and Monitoring
  • Link 16 Mission Planning
  • Link 16 OPTASK Link
  • Link 16 Network Planning
  • Link 16/MIDS Operations
  • Link 16 Network Management
  • Link 16 Network Design
  • Link 16 System Integration

Link 16 Communication Protocol and Messages

  • Features and Functions of the Link 16 Network
  • Link 16 System Characteristics
  • Link 16 Terminal Waveform and Waveform Generation
  • Link 16 Spectrum
  • Link 16 Frequencies
  • Time Division Multiple Access
  • Link 16 TDMA Features
  • Link-16 Time Slots and Time Slot Assignments
  • Link 16 and Pulses
  • Link 16 Networks / Nets
  • Link 16 Network Access Modes
  • Link 16 Message Packing
  • Link 16 Terminal Synchronization
  • Link 16 Network Time
  • Link 16 Interference Protection Features (IPF)
  • Link 16 Time Slot Duty Factor (TSDF)
  • Network Roles and Functions
  • Role of  Different Types of Network Relays
  • Link 16 Gateways
  • Joint Range Extension Applications Protocol (JREAP)
  • Link 16 Network Participation Groups (NPG)
  • The Link 16 J-series Message
  • Link 16 Message Types
  • Network Entry
  • Precise Participant Location and Identification (PPLI)
  • Multinetting
  • Range Extension Technique
  • Link 16 Network Roles
  • Link 16 Terminal Navigation
  • Link 16 Terminals
  • Link 16 Terminal Restrictions

Overview of Multifunctional Information  Distribution System (MIDS)

  • MIDS Terminals
  •  Class1, Class2, URC-138, MIDS, MIDS, JTRS, and SFF
  • Multifunctional Information Distribution System
  • MIDS Terminals
  • Link 16 requirements
  • US Forces and  Coalition partners
  • MIDS Terminals
  • Inside a MIDS Terminal
  • JTIDS, MIDS and JTRS
  • MIDS-JTRS
  • Multifunctional Information Distribution System Joint Tactical Radio System (MIDS-J)
  • Multifunctional Information Distribution System on Ship (MIDS-On Ship)
  • Multifunctional Information Distribution System: Fighter Data Link (MIDS-FDL)
  • Multifunctional Information Distribution System: Low Volume Terminal (MIDS-LVT(1))
  • Multifunctional Information Distribution System-Low Volume Terminal 2/11 (MIDS-LVT 2/11)

Overview of Multifunctional Information  Distribution System (MIDS) Low Volume Terminals (LVT)

  • Introduction to MIDS-LVT
  • MIDS LVT Features
  • Security and Jam Resistant Connectivity
  • Distributed Network
  • Range Coverage
  • Relative Position Data Accuracy
  • Overview of MIDS-LVT Terminal Products and Solutions
  • MIDS-LVT Terminal Operations
  • MIDS-LVT Initialization and Functions
  • MIDS-LVT Software and Hardware
  • MIDS-LVT Support and Host Equipment
  • Radiation Restrictions and Frequency Management
  • Operation,  testing, troubleshooting of Link 16 terminals
  • MIDS-LVT Flexible, open-architecture designs
  • Critical airborne, ground, and maritime link
  • Coordination of forces and situational awareness in battlefield operations
  • The reliability of the MIDS LVT
  • MIDS LVT Architecture and Components
  • Line Replaceable Units (LRUs)
  • Receiver/Transmitter (R/T)
  • Multifunctional Information Distribution System: Low Volume Terminal (MIDS-LVT(1))
  • Link 16 interoperability
  • TADIL-J and IJMS
  • Specifications
  • Physical Specs
  • Power Requirements
  • Power modes
  • Voice channels
  • 2.4 Kbps LPC-10 and 16 Kbps CVSD
  • Host interface
  • MIL-STD-1553, Ethernet, PhEN3910 and X.25
  • Weapon Enabled Terminals

Multifunctional Information Distribution System-Low Volume Terminal 2/11 (MIDS-LVT 2/11)

  • Pseudo-random frequency hopping
  • Specifications
  • Physical Specs
  • Power Requirements
Apr
11
Mon
Satellite Communications Training | Crash Course @ Live online and Tonex Nashville,TN
Apr 11 @ 9:00 am – Apr 14 @ 3:00 pm
Print Friendly, PDF & Email

Satellite Communications Training Crash Course

Satellite Communications Training crash course focuses on satellite communications  payloads, systems engineering and architecture of satellite systems including application requirements such as digital video and broadband media, mobile services, IP networking and UDP/TCP/IP services, concept of operations, identifying end-to-end satellite payload requirements and constellation.

This popular and intensive Satellite Communications Training crash course provides attendees with an in-depth knowledge of satellite communication principals and techniques and key emerging technologies.

CSSSP Certification by Tonex

Satellite communications with earth reflecting in solar panels ( Elements of this 3d image furnished by NASA)

Who Should Attend

The course is ideal for engineers and managers involved in Satellite Communications planning, architecture, design, implementation and operation.

Course Objectives

Upon completion of this course, the attendees will:

  • Learn the basic introduction to RF characteristics and modelling tools used to calculate spurious signals, inter-modulation levels, phase noise, Bit Error Rate and RF interference
  • Gain familiarity with merits such as Gain to Noise Temperature Ratio (G/T)
    Provide an in-depth knowledge of satellite communication systems planning, design, operation and maintenance.
  • Gain familiarity with propagation, link budget, RF planning, system tradeoffs multiple access, modulation and coding schemes
  • Gain familiarity with system architecture of satellite communications payloads
  • Learn the basic aspects of satellite performance
  • Gain familiarity with repeater design and different repeater components
  • Gain familiarity with key communications parameters
  • Basic introduction of speech and video coding, satellite networking, TCP/IP and other trends

Course Topics

Introduction

  • Different types of satellite orbits and payloads
  • Geostationary Earth Orbit (GEO) system
  • Low Earth Orbit (LEO) system
  • Medium Earth Orbit (MEO) system
  • Major categories of satellite services defined by ITU
  • Broadcasting Satellite Service
  • Mobile Satellite Service
  • Fixed Satellite Service
  • Satellite communications systems engineering principals
  • Digital Direct-to-Home (DTH) TV
  • VSAT services
  • 2-way interactive services
  • Mobile communications technologies
  • Service and performance requirements

Planning and Design (Earth & Planetary)

  • Satellite constellations
  • Satellite orbits
  • Orbital mechanics basics
  • Satellite coverage
  • Space environment orbit and attitude determination and analysis
  • Propulsion system
  • Spacecraft operations and automation
  • Spacecraft navigation
  • Coverage and communication analysis

Satellite Communications Principles

  • Terrestrial Systems
  • Satellite communication systems
  • Satellite communication system architecture
  • Satellite access
  • Radio link reliability
  • Doppler effect
  • Satellite constellations
  • Spot beams
  • Radio Link
  • Spectrum issues
  • Spectrum sharing methods
  • Propagation characteristics
  • General propagation characteristics
  • Analog and digital Modulation
  • Digital modulation and Coding
  • Satellite RF Link
  • Multiple access principles
  • Earth Stations
  • Antennas
  • Satellite system performance
  • Link budget analysis
  • System tradeoffs

System Specification and Requirement Writing

  • Spacecraft subsystems areas
  • Communications payload, Altitude Control, Propulsion, Electrical Power and Distribution, Payload, Thermal, Telemetry, Tracking and Command, and Orbit Control
  • Satellite Radio building blocks
  • Satellite ground segment
  • Earth stations subsystem
  • Various types of satellite payloads
  • Satellite transponders
  • Bent-pipe Satellites
  • Key technology advancements in Satellite Communications (SATCOM) payloads  for telecommunications services
  • Different types of orbits for satellites
  • International regulations (ITU-T) governing the frequency planning and coordination of the diverse satellite networks

Requirement analysis  of the Satellite Payload

  • Capabilities of different repeater components
  • Assessment techniques for performance of all major building blocks including repeaters, antenna system, and tracking
  • Critical subsystem and system design concepts such as power budget, loss, group delay, IM (Intermodulation) distortion, digital impairments, cross-polarization, adjacent satellite and channel interference for
  • Design principles and performance budgets for system elements such as receivers, phased-array antennas, multiplexers, amplifiers, analog and digital processors, reflector, feeds and other passive and active components
  • System verification of payload and ground segment performance
  • Evaluation of subsystem / system performance, and guidelines for overseeing development

Key Payload Communications Parameters

  • Gain and phase variation with frequency
  • Phase Noise
  • Frequency Stability
  • Spurious signals from frequency converter
  • Self-interference products
  • Passive Intermodulation products
  • Noise figure and payload performance budgets
  • Engineering specifications and techniques for payload compatibility with the satellite bus
  • Communications satellite’s transponder
  • Communications channel between the receiving and the transmitting antennas

Transponder System Design and Architecture

  • System tradeoffs
  • RF tradeoffs (RF power, EIRP, G/T)
  • Input band limiting device (a band pass filter)
  • Input low-noise amplifier (LNA)
  • Frequency translator
  • Oscillator and a frequency mixer
  • Output band pass filter
  • Power amplifier
  • Traveling-wave tube
  • Solid state amplifiers
  • Design elements and specifications for the satellite communications payload
  • “Bent pipe” principle
  • Bent-pipe repeater subsystem
  • Regenerated mode
  • Regenerated and bent-pipe mode
  • Bent-pipe topology
  • On-board processing
  • Demodulated, decoded, re-encoded and modulated signals

Communications Payload Performance Management

  • Performance and capacity planning
  • Payload system Tradeoffs
  • Bent-pipe repeater analysis and design
  • Antenna Design and Performance
  • Link budget
  • On-board Digital processor
  • A/D and D/A conversion
  • DSP (digital signal processing)
  • Multiple access technologies
  • Principles behind FDMA, TDMA, CDMA
  • Demodulation and remodulation
  • Multiplexing
  • Multi-beam Antennas
  • RF Interference
  • Spectrum Management
Apr
25
Mon
RF Engineering Training Boot Camp @ Live on-line
Apr 25 @ 9:00 am – Apr 28 @ 4:00 pm
Print Friendly, PDF & Email

RF Engineering Training Boot Camp is the unique answer to your RF planning, design and engineering in any wireless networks needs.

RF Engineering Training, also known as Radio Frequency Engineering, is a subset of electrical engineering that deals with devices which are designed to operate in the Radio Frequency spectrum: range of about 3 kHz up to 300 GHz.

RF Engineering Training covers all aspects of Radio Frequency Engineering, a subset of electrical engineering. RF Engineering training will incorporate theory and practices to illustrate the role of RF into almost everything that transmits or receives a radio wave which includes : traditional cellular networks such as GSM, CDMA, UMTS.HSPA+, 4 LTE, LTE-Advanced, 5G NR, mmWave, Wi-Fi, Bluetooth, Zigbee, Satellite Communications,  VSAT, Two-way radio, and Public Safety Solutions.

RF Engineers are a part of a highly specialized field and are an integral part of wireless solutions. Their expertise is needed to design effective and reliable solutions to produce quality results, an in-depth knowledge of math, physics and general electronics theory is required.

RF Engineers are specialists in their respective field and assist in both the planning, design, implementation, and maintenance of different RF solutions.

To produce quality results in RF Engineering Training bootcamp, the program covers an in-depth knowledge of math, physics, general electronics theory as well as specialized modules in propagation and microstrip design may be required.

Topics Covered in RF Engineering Training Bootcamp – Crash Course:

  • RF Theory
  • RF Engineering Principles
  • Modulation
  • Antenna Theory
  • Interference Analysis
  • Link Design
  • Principles of Noise and Interference
  • Principles of Jamming
  • Communications Control and Jamming Theory of Operation
  • RF System Specifications
  • RF Surveys and Planning
  • Radio Wave Propagation and Modeling
  • Frequency Planning
  • Traffic Dimensioning
  • Cell Planning Principals
  • Coverage Analysis
  • RF Optimization
  • RF Benchmarking
  • RF Performance
  • RF Safety
  • RF Simulation
  • RF Testing
  • RF System Integration and Measurements
  • Planning of  Radio Networks
  • Advanced Topics in Cell Planning
  • Advanced Topics in RF Planning and Architecture
  • Voice and Data Traffic Engineering
  • RAN Optimization
Aug
22
Mon
Signals Intelligence (SIGINT) Training Bootcamp | SIGINT Training Course @ Live online
Aug 22 @ 9:00 am – Aug 24 @ 3:00 pm
Print Friendly, PDF & Email

Signals Intelligence (SIGINT) Training Bootcamp

SIGINT (Signals Intelligence) is a broad discipline, and can include intelligence collection from various means including communications intelligence (COMMINT), electronic intelligence (ELINT), Radar and electronic warfare (EW).

SIGINT systems gather information from adversaries’ electronic signals.  Analysts then evaluate this raw data from foreign communication systems, radars and weapon systems, and transform it into actionable intelligence.  The information generated by these systems offers insight into adversaries’ actions, capabilities, and intentions before they are carried out.

The origins of SIGINT can be traced back to the first world war when British forces began intercepting German radio communications to gain intelligence about their plans. This led to the use of cryptography to conceal the content of radio transmissions, and as such, cryptanalysis became an integral part of SIGINT as well.

But as electronic warfare and wireless technology has evolved, so have approaches to signals intelligence. Automation and artificial intelligence (AI), for example, have greatly improved communications planning and SIGINT capabilities. An automated algorithm detects and identifies signals in sensor data much faster than a highly trained operator.

Signal detection from massive amounts of stored data is like searching for a needle in a haystack. An operator controlled autonomous agent finds incoming signals, automatically determine signal type, and provides an analyst with reasons why a determination was made.

Algorithms help SIGNET systems automates the low-level detection and classification tasks. This frees up military personnel to focus on higher level tactical decision making. This way, the system becomes another team member, with a supervising human in the loop to authorize the appropriate military response.

In addition, through SIGNET automation, a commander can gain an “EM signature picture” of his forces as they are arrayed in the battlespace. This way, he can glean valuable information on his own EM signature and use that information to improve or implement additional passive and active actions to increase survivability.

The responsibilities of a signals intelligence (SIGINT) analyst include examining foreign communications and activity and collating the information by compiling reports on combat, strategy and tactical intelligence, to support Special Operations Task Force and other government agencies.

Using advanced equipment, the SIGINT analyst analyzes intercepted messages and organizes relevant information, identifies operational patterns, and notifies commanders of unusual activity so they can respond appropriately. Other duties include maintaining databases and assisting with placing, camouflaging and retrieving surveillance systems.

Opportunities in this type of position are most prevalent in the military including the Army, Air Force and the National Guard, but there are positions available outside the military as well, such as with technology companies that work with law enforcement and counterintelligence agencies.

Signals Intelligence (SIGINT) Training Bootcamp by Tonex

Signals Intelligence (SIGINT) Training Bootcamp is a 3-day training course covering all aspects of  Signals Intelligence (SIGINT) including Communications Intelligence (COMINT), Electronic Intelligence (ELINT) and Foreign Instrumentation Signals Intelligence (FISINT).

Advanced Network Characterization (ANC), Digital Land Mobile Communication (DLMC), 4G/5G, WiFi, IoT, SATCOM, Radar, UHV/VHF/H, microwave, mmWave and optical signals utilizing the latest technologies and methodologies in the SIGINT field are discussed.

SIGINT (Signal Intelligence) Training Course by Tonex

SIGINT involves collecting intelligence from communications and information systems to help protect troops and military operations, national security, fight terrorism, combat international crime and narcotics, support diplomatic negotiations, support allies, and advance many other important national objectives.

Participants will learn about SIGINT and tools to collect SIGINT from various sources, including foreign communications, satellite/space, commercial communication systems, mobile networks, radar and other electronic and communication systems. The instructors will show you what to collect, and how to process, analyze, produce, and disseminate Signals Intelligence information and data for intelligence and counterintelligence purposes.

Participants will also learn about advanced techniques and algorithms for collection, network characterization, and analysis across the Radio Frequency Spectrum for the purpose of supporting Find, Fix, Finish, Exploit, Analyze and Disseminate (F3EAD).

Communication is an important part of everyday life — especially when it comes to leading a country. World leaders communicate with their people in a variety of ways. All of these forms of communication emit a signal that can be collected. The information gathered from these intercepted signals is of vital importance to national security.

Learning Objectives

After completing the SIGINT training bootcamp, participants will:

  • Discuss the basic and advanced SIGINT principles
  • Discuss strategies for safeguarding SIGINT approaches
  • Define the roles and responsibilities that support SIGINT environments
  • Conduct gap analysis between SIGINT baseline and best practices
  • Get familiar with RF theory, antenna principles, antenna types and characteristics
  • Tools to predict system performance via link budgets and detection theory.
  • Learn about Interferometers and adaptive digital beamforming
  • Evaluate detection concepts and principles of link budgets
  • Describe principles behind emitter geolocation techniques
  • Evaluate and implement advanced signal processing techniques
  • Analyze, assess, and optimize propagation effects and models for challenging environments
  • Integrate receiver architectures and modern digital signal processing hardware/software
  • Explain principles behind Software Defined Radio (SDR)
  • Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability (CIA) in SIGINT environments

Who Should Attend

SIGINT training course is designed for hardware and software engineers, analysts, scientists, project managers, military intelligence professionals, and anyone else who wants to learn about the SIGINT.

Course Structure

This 3-day interactive SIGINT Training Course is structured with a mix of lectures, class discussions, workshops and hands-on exercises led by highly knowledgeable and engaging instructors.

Course Agenda and Topics

SIGINT 101

  • What is signals intelligence (SIGINT)?
  • Principles behind Intelligence, Surveillance and Reconnaissance (ISR)
  • ISR missions
  • ISR intelligence architectures
  • Component of command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) applications
  • Image intelligence (IMINT), signals intelligence (SIGINT), and measurement and signatures intelligence (MASINT) collection systems
  • Collection and exploitation of signals transmitted from various communication systems, radars, and weapon systems
  • Technical definitions
  • Targeting
  • Intercept management
  • Signal detection
  • Traffic analysis
  • Electronic order of battle
  • Communications intelligence
  • Electronic signals intelligence
  • SIGINT and MASINT
  • SIGINT and Electronic Warfare (EW)

Elements of SIGINT

  • Communications Intelligence (COMINT)
  • Technical and intelligence information derived from intercept of foreign communications
  • Electronic Intelligence (ELINT)
  • Information collected from systems such as radars and other weapons systems
  • Foreign Instrumentation Signals Intelligence (FISINT)
  • Signals detected from weapons under testing and development
  • Principles behind Geolocation,
  • Parameters of receiver platforms, measurement types
  • Requirements for data links and timing sources
  • Role of Artificial Intelligence (AI) and Machine Learning (ML) in SIGINT

The Fundamentals of Signal Analysis

  • The Time, Frequency and Modal Domains
  • Principles behind Time Domain
  • Principles behind Frequency Domain
  • Instrumentation
  • Dynamic Signal Analysis
  • FFT Properties
  • Sampling and Digitizing
  • Aliasing
  • Band Selectable Analysis
  • Windowing
  • Network Stimulus
  • Averaging
  • Real Time Bandwidth
  • Overlap Processing
  • Dynamic Signal Analyzers
  • Modal Domain Measurements

Signals Intelligence (SIGINT) Technical Principles

  • SIGINT Capability
  • Performance of a SIGINT system
  • Algorithm selection
  • Software, firmware and hardware architecture
  • Propagation analysis and effects
  • Emitter characteristics
  • Traditional and modern emitter geolocation approaches
  • Analytical tools and algorithms to predict accuracy
  • Operation in dense signal environments
  • Interferometry and automatic modulation classification
  • Adversaries’ electronic signals
  • Evaluate raw data from foreign communication systems, radars, and weapon systems
  • Data transform ion and actionable intelligence
  • SIGINT integration with different platforms and UAVs, , manned aircraft, surface vessels, and ground vehicles
  • Commercial-off-the-shelf (COTS) -hardware
  • Open system architecture
  • Advanced signal location and exploitation capabilities

SIGINT Operational Planning

  • SIGINT organization
  • Command and Control (C2) and Operations
  • SIGINT roles and responsibilities
  • Planning and operations
  • Planning responsibilities
  • SIGINT organizations structure examples
  • Planning consideration
  • SIGINT communications
  • SIGINT functional planning (using DoDAF views)
  • SIGINT Systems Engineering
  • SIGINT Concept of Operations (ConOps)
  • Enemy Characteristics
  • Topography
  • Coordination of SIGINT operations
  • Planning and direction
  • Collection
  • Processing and Exploitation
  • Production, Dissemination and Utilization

Principles of Collection

  • SIGINT collected
  • Type of signal targeted Raw SIGINT
  • Signals Analysis
  • Analyzing electronic signals and communications
  • Analyzed SIGINT
  • Role of HUMINT
  • Translators, cryptologists, analysts, and other technical experts
  • Process to turn the raw data into intelligence
  • Tools to produce finished intelligence
  • The volume and variety of today’s signals
  • Challenges to the timely production of finished intelligence
  • Track and analyze all the SIGINT collected

Principles of Electronic Intelligence

  • Basic math concepts
  • Waveforms
  • Principles of modulation and coding
  • Radar Principles
  • Interpulse modulation
  • Intrapulse modulation
  • Radiation patterns and scan
  • Radar types and functions
  • Collection anomalies
  • Analysis of Radar signals
  • Electronic attack
  • Digitization and interpretive analysis
  • Electronic intelligence (ELINT) analysis techniques
  • ELINT applications, strengths and limitations

Advanced Electronic Intelligence

  • SIGINT technologies
  • The analysis of Radar signals
  • Signal-to-Noise-Ratio  (SNR) and Eb/No considerations for analog and digital Systems
  • Signal power
  • Polarization (Linear, Circular and Elliptical)
  • Beam analysis
  • Antenna Scan analysis
  • Intrapulse analysis
  • Radio Frequency (RF) analysis
  • Determining ELINT parameter limits
  • Technical ELINT (TechELINT)
  • Signal structure, emission characteristics, modes of operation, emitter functions
  • Weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals
  • Tools to obtain signal parameters
  • Design of radar detection, countermeasure or counterweapons equipment
  • Operation of the countermeasures
  • Operational ELINT (OpELINT)
  • Locating specific ELINT targets
  • Determining the operational patterns of the systems
  • Electronic Order of Battle (EOB)
  • Threat assessments
  • Tactical ELINT
  • TELINT
  • Collection, processing, and reporting of foreign telemetry signals intelligence
  • Intelligence information derived from the intercept, processing, and analysis of foreign telemetry
  • Foreign Instrumentation Signals Intelligence

Workshops and Case Studies

  • An approach to UAV-based ELINT
  • Principles of sensor and data fusion in SIGINT
  • Optical imaging satellite data and Electronic Intelligence Satellite data
  • Detection area analysis in ELINT systems
  • A simple ELINT receiver architecture
  • Overview of a conventional warfare ELINT system supporting an unconventional COMINT fight
  • Cyber/SIGINT collection, processing techniques and enablers
  • Cyber/SIGINT systems engineering, analysis, development, integration, test and evaluation of technologies/techniques
  • Real-time processing technology to improve the extraction, identification, analysis and reporting of tactical information a applied to Cyber and SIGINT
  • ISR information extraction for SIGINT issues
  • Algorithms for identification, collection, processing, and exploitation of electronic communication signals in a moderate to dense co-channel environment with potentially significant Doppler effects
Jan
11
Wed
High Altitude Electromagnetic Pulse (HEMP) Training Bootcamp (U) @ Nashville, TN
Jan 11 – Jan 13 all-day
Print Friendly, PDF & Email
Length: 3 Days
Location: Nashville, TN
To Register: Send email to info@tonex.com
Mar
27
Mon
Reliability Analysis for Non-Repairable Systems Training @ Live online
Mar 27 @ 9:00 am – Mar 29 @ 4:00 pm
Print Friendly, PDF & Email

Reliability Analysis for Non-Repairable Systems Training

Reliability Analysis for Non-Repairable Systems Training is a 3-day training designed for those who want a comprehensive training in the theory and practice of Reliability Analysis for Non-Repairable Systems. This 3-day course is designed for program managers, systems analysts, system engineers, procurement, reliability engineers and professional working in the area of system acquisition, operations, maintenance and sustainability.

It is important to understand the type of system being analyzed or designed and use the appropriate reliability methods and tools to match the system needs.

Participants will learn about analysis of non-repairable systems compared to repairable systems. Along with reliability analysis, availability, maintainability, and serviceability, modeling methods of non-repairable systems will be discussed.

Audience

Engineers, analysts, and managers who want to get familiarization with reliability analysis and statistics tools, methods and techniques applied to non-repairable Systems.

Learning Objectives

Upon completion of this course, the participants can:

  • Learn the basic concepts in reliability analysis and engineering
  • Learn about reliability analysis tools and methodologies.
  • Perform reliability assessment to reduce logistic burden of systems throughout life cycle.
  • Organize reliability data collected in the field.
  • Analyze non-repairable component reliability and evaluate Non-repairable system reliability.
  • Find optimal solutions to improve non-repairable Systems reliability.
  • Learn about tools for reliability analysis for non-repairable systems
  • Compute non-parametric estimates of failure probability.
  • Estimate reliability or survival measures and hazard.
  • Design an accelerated life test.

Course Agenda

Reliability of Repairable Systems vs. Non-Repairable Systems

  • Basics of reliability
  • Reliability engineering 101
  • Reliability modeling
  • Repairable systems or products
  • Reliability tasks
  • Common metrics
  • Non-repairable systems or products
  • Non-repairable and components parts
  • Availability vs. reliability
  • High reliability or availability considerations for non-repairable systems

Common Metrics used in Measuring System Types  

  • Mean Time Between Failure (MTBF)
  • Failure in Time (FIT)
  • Time to Failure
  • Mean Time to Repair (MTTR)
  • Mean Time to Failure (MTTF)
  • Failure in Time (FIT)
  • MTTF Time to First Failure
  • Hazard Rate
  • MTBF Time to First Failure
  • ROCOF/Failure Rate
  • Rate of occurrence of failures (ROCOF)
  • Probability analysis
  • Maintainability for repairable systems

Reliability Parameters for Non-repairable Systems

  • MTTF vs. MTBF
  • MTTF Time to First Failure
  • Hazard Rate
  • Reliability
  • Discarded (recycled?) upon failure
  • Lifetime and random variable described by single time to failure
  • Group of components lifetime and time to failure
  • Failure rate and hazard rate of a lifetime distribution
  • Non-parametric estimates of failure probability

Analyzing Reliability Analysis Methods

  • Approach for evaluating four critical factors related to system performance
  • Identify areas of concern to facilitate improvements
  • Tools and techniques to assess and evaluate non-repairable system reliability throughout the lifecycle
  • Reliability tools, techniques, models and frameworks for components and systems
  • Component part databases
  • MIL-HDBK-217
  • MIL-STD-1629
  • Weibull analysis
  • Life Data Analysis
  • Reliability Prediction
  • FRACAS
  • ALT Analysis
  • Reliability Block Diagram
  • reliability prediction
  • Reliability prediction standards for non-repairable systems and components
  • Mean Cumulative Function (MCF)
  • Event Series (Point Processes)
  • NHPP (Parametric method) – complex
  • HPP (For random, constant average rate events)
  • Mean Cumulative Function (MCF)

Assessing Reliability Analysis for Non-repairable systems

  • Reliability benchmarking & gap analysis
  • Reliability and system lifecycle phases
  • Root cause failure analysis
  • Reliability data collection
  • Reliability predictions
  • Reliability block diagrams
  • Fault tree analysis
  • Failure modes & effects analysis
  • Thermal analysis
  • Derating analysis and component selection
  • Tolerance and worst case analysis
  • Material selection
  • Design of experiments
  • Finite element analysis
  • Dynamic analysis (modal, shock, vibration, immersion, water, etc.)
  • Design review and retrospective facilitation
  • Reliability test plan development
  • Highly accelerated life testing (halt)
  • Fracture and fatigue
  • Design verification testing
  • Highly Accelerated Stress Screening (HASS)
  • Environmental testing and analysis
  • Thermal testing and analysis
  • Reliability demonstration testing
  • Closed-loop corrective action process setup
  • Lessons Learned Process Establishment
Apr
24
Mon
Certified Space Security Specialist Professional (CSSSP) Training – Level 2 (Professional) @ Live online
Apr 24 @ 9:00 am – Apr 27 @ 4:00 pm
Print Friendly, PDF & Email

Upcoming course: CSSSP Level 1 (Specialist)

  • Length: 4 Days
  • When: March 27-March 30, 2023 (Live Online or In-Person)
  • Where: Washington D.C.

Learn more >>>

Next course: CSSSP Level 2 (Professional)

  • Length: 4 Days
  • When: April 24- April 27, 2023 (In-Person Class and Live Online with Teams)
  • Where: Washington D.C.

Next course: CSSSP Level 3 (Expert)

  • Length: 4 Days
  • When: May 22- May 25, 2023 (In-Person Class and Live Online with Teams)
  • Where:  Washington, DC.

 

Certified Space Security Specialist Professional (CSSSP): Level 1

We are developing an overwhelming reliance on space technology – a trend not lost on cybercriminals.

This growing dependency on satellites and the like, puts organizations in a precarious position. In industries like transport and logistics, location data is routinely recorded in real time from GPS satellites and sent to back offices to allow teams to track drivers and assets.

Organizations which have remote outposts or oceangoing ships can’t exactly get online via a mobile or cable network, so they have to use communications satellites instead. On top of that, satellites store sensitive information they collect themselves, which might include images of sensitive military installations or critical infrastructure.

Of course all of these factors make for attractive targets to various types of cybercriminal. Although residing in the vacuum of deep space makes them less vulnerable to physical attacks, space-based systems are still ultimately controlled from computers on the ground. At issue is that data is transmitted by and stored on orbiting satellites more and more every year. Therefore, bad actors have them in their sites due to the high value of data stored on satellites and other space systems.

Particularly disturbing, space security specialists now tell us that cyber attackers don’t even need to be expert hackers from space-faring nations. And neither do they need direct, physical access to control systems belonging to organizations like NASA, ESA or Roscosmos.

For NASA, reliable communication between ground and spacecraft is central to mission success, especially in the realms of digital communication (data and command links). Unfortunately, these light communication links are vulnerable to malicious intrusion. If terrorists or hackers illegally listen to, or worse, modify communication content, disaster can occur.

Especially worrisome are the consequences of a nuclear powered spacecraft under control of a hacker or terrorist, which could be devastating. Obviously, all communications to and between spacecraft must be extremely secure and reliable.

Military satellites and space systems are also vulnerable since almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more. Aging IT systems, supply-chain vulnerabilities and other technological issues that leave military satellite communications open to disruption and tampering also need to be addressed according to space security personnel.

While navigational satellite systems like GPS (US), GLONASS (Russia) and Beidou (China) might not be the easiest targets to hack, there are dozens of other satellite owners of global communications. Additionally, thousands more companies rent bandwidth from satellite owners for selling services like satellite TV, phone and internet. Then there are hundreds of millions of businesses and individuals around the world which use them.

All told, it’s a pretty large potential attack surface which is connected directly to the internet.

Certified Space Security Specialist Professional (CSSSP) Course by Tonex

Although some of these issues are no different from other industries, space systems are met with a unique confluence of cybersecurity risks that complicates the sector’s remediation capabilities.

Governments, critical infrastructure and economies rely on space-dependent services—for example, the Global Positioning System (GPS)—that are vulnerable to hostile cyber operations. However, few space-faring states and companies have paid sufficient attention to the cybersecurity of satellites in outer space, creating a number of risks.

Accelerate your space cybersecurity career with the CSSSP certification.

Certified Space Security Specialist Professional (CSSSP) certification is ideal for space and security practitioners, analysts, engineers, managers and executives interested in proving their knowledge across space security practices and principles.

The CSSSP® (Certified Space Systems Security Professional) qualification is one of the most respected certifications in the space security industry, demonstrating an advanced knowledge of space cybersecurity.

Earning the CSSSP proves you have what it takes to effectively design, implement and manage a cybersecurity space program. With a CSSSP, you validate your expertise and become a Space Cyber member, unlocking a broad array of exclusive resources, educational tools, seminars, conferences and networking opportunities.

CSSSP certification also explores factors that led to the space sector’s poor cybersecurity posture, various cyberattacks against space systems, and existing mitigation techniques employed by the sector.

Analyzing the current state of the industry along with security practices across similar sectors, several security principles for satellites and space assets are proposed to help reorient the sector toward designing, developing, building and managing cyber secure systems. These security principles address both technical and policy issues in order to address all space system stakeholders.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

The CSSSP qualification has been developed and maintained jointly by SpaceCyber.org and Tonex.

CSSSP Domains (CBK) are:

  1. Space Systems Engineering
  2. Cybersecurity Principles for Space Systems
  3. Space Cybersecurity Foundation
  4. Space Security Planning, Policy and Leadership
  5. Space Security Architecture and Operation
  6. Space Threat and Vulnerability Analysis and Assessment
  7. Space Ethical Hacking, Penetration Testing and Defenses
  8. Space Intrusion Detection Analysis
  9. Space Network Penetration Testing and Ethical Hacking
  10. Space Embedded Systems Cybersecurity
  11. Space Defensible Security Architecture and Engineering
  12. Space Forensic Analysis
  13. Space Network and System Reverse Engineering
  14. Space Incident Response and Network Forensics
  15. MIL-STD-1553 Cybersecurity
  16. ARINC 429 Cybersecurity
  17. Artificial Intelligence(AI), Machine Learning (ML) and Deep Learning (DL) Integration with Space Cybersecurity
  18. Blockchain Integration with Space Cybersecurity
  19. Sensor Fusion Integration with Space Cybersecurity
  20. Electronic Warfare Capabilities in Space
  21. Use of Electromagnetic Pulses or Directed Energy (laser beams or microwave-bombardments)
  22. Space System Survivability and US War Fighting
  23. Electronic Warfare and Aircraft Survivability
  24. Cyber Warfare Capabilities in Space Missions
  25. Counter Communications System
  26. Electronic and Cyber Warfare in Outer Space
  27. Counter-space Capabilities
  28. Types of Counter-space Technology
  29. Measures and Their effectiveness in Addressing Counter-space Capabilities

For more information, questions, comments, contact us. 

Future related programs to Certified Space Security Specialist Professional (CSSSP) Certification are:

  • Space Cyber Infrastructure Specialist (SCIS)
  • Space Cyber Engineering Specialist (SCES)
  • Space Cyber Operations Specialist (SCOS)
  • Space Cyber Technology Professional (SCTP)
  • Space Cyber Operations Manager (SCOM)
  • Space Cyber Infrastructure Expert (SCIE)
  • Space Cyber Domain Expert (SCDE)
  • Space Cyber Manager (SCM)
  • Space Cyber Authority Expert (SCAE)
  • Space Cyber Application Specialist (SCAS)
  • Space Cyber Leadership Certificate (SCLC)
May
22
Mon
Certified Space Security Specialist Professional (CSSSP) Training – Level 3 (Expert) @ Live online
May 22 @ 9:00 am – May 25 @ 4:00 pm
Print Friendly, PDF & Email

Upcoming course: CSSSP Level 1 (Specialist)

  • Length: 4 Days
  • When: March 27-March 30, 2023 (Live Online or In-Person)
  • Where: Washington D.C.

Learn more >>>

Next course: CSSSP Level 2 (Professional)

  • Length: 4 Days
  • When: April 24- April 27, 2023 (In-Person Class and Live Online with Teams)
  • Where: Washington D.C.

Next course: CSSSP Level 3 (Expert)

  • Length: 4 Days
  • When: May 22- May 25, 2023 (In-Person Class and Live Online with Teams)
  • Where:  Washington, DC.

 

Certified Space Security Specialist Professional (CSSSP): Level 1

We are developing an overwhelming reliance on space technology – a trend not lost on cybercriminals.

This growing dependency on satellites and the like, puts organizations in a precarious position. In industries like transport and logistics, location data is routinely recorded in real time from GPS satellites and sent to back offices to allow teams to track drivers and assets.

Organizations which have remote outposts or oceangoing ships can’t exactly get online via a mobile or cable network, so they have to use communications satellites instead. On top of that, satellites store sensitive information they collect themselves, which might include images of sensitive military installations or critical infrastructure.

Of course all of these factors make for attractive targets to various types of cybercriminal. Although residing in the vacuum of deep space makes them less vulnerable to physical attacks, space-based systems are still ultimately controlled from computers on the ground. At issue is that data is transmitted by and stored on orbiting satellites more and more every year. Therefore, bad actors have them in their sites due to the high value of data stored on satellites and other space systems.

Particularly disturbing, space security specialists now tell us that cyber attackers don’t even need to be expert hackers from space-faring nations. And neither do they need direct, physical access to control systems belonging to organizations like NASA, ESA or Roscosmos.

For NASA, reliable communication between ground and spacecraft is central to mission success, especially in the realms of digital communication (data and command links). Unfortunately, these light communication links are vulnerable to malicious intrusion. If terrorists or hackers illegally listen to, or worse, modify communication content, disaster can occur.

Especially worrisome are the consequences of a nuclear powered spacecraft under control of a hacker or terrorist, which could be devastating. Obviously, all communications to and between spacecraft must be extremely secure and reliable.

Military satellites and space systems are also vulnerable since almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more. Aging IT systems, supply-chain vulnerabilities and other technological issues that leave military satellite communications open to disruption and tampering also need to be addressed according to space security personnel.

While navigational satellite systems like GPS (US), GLONASS (Russia) and Beidou (China) might not be the easiest targets to hack, there are dozens of other satellite owners of global communications. Additionally, thousands more companies rent bandwidth from satellite owners for selling services like satellite TV, phone and internet. Then there are hundreds of millions of businesses and individuals around the world which use them.

All told, it’s a pretty large potential attack surface which is connected directly to the internet.

Certified Space Security Specialist Professional (CSSSP) Course by Tonex

Although some of these issues are no different from other industries, space systems are met with a unique confluence of cybersecurity risks that complicates the sector’s remediation capabilities.

Governments, critical infrastructure and economies rely on space-dependent services—for example, the Global Positioning System (GPS)—that are vulnerable to hostile cyber operations. However, few space-faring states and companies have paid sufficient attention to the cybersecurity of satellites in outer space, creating a number of risks.

Accelerate your space cybersecurity career with the CSSSP certification.

Certified Space Security Specialist Professional (CSSSP) certification is ideal for space and security practitioners, analysts, engineers, managers and executives interested in proving their knowledge across space security practices and principles.

The CSSSP® (Certified Space Systems Security Professional) qualification is one of the most respected certifications in the space security industry, demonstrating an advanced knowledge of space cybersecurity.

Earning the CSSSP proves you have what it takes to effectively design, implement and manage a cybersecurity space program. With a CSSSP, you validate your expertise and become a Space Cyber member, unlocking a broad array of exclusive resources, educational tools, seminars, conferences and networking opportunities.

CSSSP certification also explores factors that led to the space sector’s poor cybersecurity posture, various cyberattacks against space systems, and existing mitigation techniques employed by the sector.

Analyzing the current state of the industry along with security practices across similar sectors, several security principles for satellites and space assets are proposed to help reorient the sector toward designing, developing, building and managing cyber secure systems. These security principles address both technical and policy issues in order to address all space system stakeholders.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

The CSSSP qualification has been developed and maintained jointly by SpaceCyber.org and Tonex.

CSSSP Domains (CBK) are:

  1. Space Systems Engineering
  2. Cybersecurity Principles for Space Systems
  3. Space Cybersecurity Foundation
  4. Space Security Planning, Policy and Leadership
  5. Space Security Architecture and Operation
  6. Space Threat and Vulnerability Analysis and Assessment
  7. Space Ethical Hacking, Penetration Testing and Defenses
  8. Space Intrusion Detection Analysis
  9. Space Network Penetration Testing and Ethical Hacking
  10. Space Embedded Systems Cybersecurity
  11. Space Defensible Security Architecture and Engineering
  12. Space Forensic Analysis
  13. Space Network and System Reverse Engineering
  14. Space Incident Response and Network Forensics
  15. MIL-STD-1553 Cybersecurity
  16. ARINC 429 Cybersecurity
  17. Artificial Intelligence(AI), Machine Learning (ML) and Deep Learning (DL) Integration with Space Cybersecurity
  18. Blockchain Integration with Space Cybersecurity
  19. Sensor Fusion Integration with Space Cybersecurity
  20. Electronic Warfare Capabilities in Space
  21. Use of Electromagnetic Pulses or Directed Energy (laser beams or microwave-bombardments)
  22. Space System Survivability and US War Fighting
  23. Electronic Warfare and Aircraft Survivability
  24. Cyber Warfare Capabilities in Space Missions
  25. Counter Communications System
  26. Electronic and Cyber Warfare in Outer Space
  27. Counter-space Capabilities
  28. Types of Counter-space Technology
  29. Measures and Their effectiveness in Addressing Counter-space Capabilities

For more information, questions, comments, contact us. 

Future related programs to Certified Space Security Specialist Professional (CSSSP) Certification are:

  • Space Cyber Infrastructure Specialist (SCIS)
  • Space Cyber Engineering Specialist (SCES)
  • Space Cyber Operations Specialist (SCOS)
  • Space Cyber Technology Professional (SCTP)
  • Space Cyber Operations Manager (SCOM)
  • Space Cyber Infrastructure Expert (SCIE)
  • Space Cyber Domain Expert (SCDE)
  • Space Cyber Manager (SCM)
  • Space Cyber Authority Expert (SCAE)
  • Space Cyber Application Specialist (SCAS)
  • Space Cyber Leadership Certificate (SCLC)