Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
Jan
11
Wed
High Altitude Electromagnetic Pulse (HEMP) Training Bootcamp (U) @ Nashville, TN
Jan 11 – Jan 13 all-day
Print Friendly, PDF & Email
Length: 3 Days
Location: Nashville, TN
To Register: Send email to info@tonex.com
Mar
27
Mon
Reliability Analysis for Non-Repairable Systems Training @ Live online
Mar 27 @ 9:00 am – Mar 29 @ 4:00 pm
Print Friendly, PDF & Email

Reliability Analysis for Non-Repairable Systems Training

Reliability Analysis for Non-Repairable Systems Training is a 3-day training designed for those who want a comprehensive training in the theory and practice of Reliability Analysis for Non-Repairable Systems. This 3-day course is designed for program managers, systems analysts, system engineers, procurement, reliability engineers and professional working in the area of system acquisition, operations, maintenance and sustainability.

It is important to understand the type of system being analyzed or designed and use the appropriate reliability methods and tools to match the system needs.

Participants will learn about analysis of non-repairable systems compared to repairable systems. Along with reliability analysis, availability, maintainability, and serviceability, modeling methods of non-repairable systems will be discussed.

Audience

Engineers, analysts, and managers who want to get familiarization with reliability analysis and statistics tools, methods and techniques applied to non-repairable Systems.

Learning Objectives

Upon completion of this course, the participants can:

  • Learn the basic concepts in reliability analysis and engineering
  • Learn about reliability analysis tools and methodologies.
  • Perform reliability assessment to reduce logistic burden of systems throughout life cycle.
  • Organize reliability data collected in the field.
  • Analyze non-repairable component reliability and evaluate Non-repairable system reliability.
  • Find optimal solutions to improve non-repairable Systems reliability.
  • Learn about tools for reliability analysis for non-repairable systems
  • Compute non-parametric estimates of failure probability.
  • Estimate reliability or survival measures and hazard.
  • Design an accelerated life test.

Course Agenda

Reliability of Repairable Systems vs. Non-Repairable Systems

  • Basics of reliability
  • Reliability engineering 101
  • Reliability modeling
  • Repairable systems or products
  • Reliability tasks
  • Common metrics
  • Non-repairable systems or products
  • Non-repairable and components parts
  • Availability vs. reliability
  • High reliability or availability considerations for non-repairable systems

Common Metrics used in Measuring System Types  

  • Mean Time Between Failure (MTBF)
  • Failure in Time (FIT)
  • Time to Failure
  • Mean Time to Repair (MTTR)
  • Mean Time to Failure (MTTF)
  • Failure in Time (FIT)
  • MTTF Time to First Failure
  • Hazard Rate
  • MTBF Time to First Failure
  • ROCOF/Failure Rate
  • Rate of occurrence of failures (ROCOF)
  • Probability analysis
  • Maintainability for repairable systems

Reliability Parameters for Non-repairable Systems

  • MTTF vs. MTBF
  • MTTF Time to First Failure
  • Hazard Rate
  • Reliability
  • Discarded (recycled?) upon failure
  • Lifetime and random variable described by single time to failure
  • Group of components lifetime and time to failure
  • Failure rate and hazard rate of a lifetime distribution
  • Non-parametric estimates of failure probability

Analyzing Reliability Analysis Methods

  • Approach for evaluating four critical factors related to system performance
  • Identify areas of concern to facilitate improvements
  • Tools and techniques to assess and evaluate non-repairable system reliability throughout the lifecycle
  • Reliability tools, techniques, models and frameworks for components and systems
  • Component part databases
  • MIL-HDBK-217
  • MIL-STD-1629
  • Weibull analysis
  • Life Data Analysis
  • Reliability Prediction
  • FRACAS
  • ALT Analysis
  • Reliability Block Diagram
  • reliability prediction
  • Reliability prediction standards for non-repairable systems and components
  • Mean Cumulative Function (MCF)
  • Event Series (Point Processes)
  • NHPP (Parametric method) – complex
  • HPP (For random, constant average rate events)
  • Mean Cumulative Function (MCF)

Assessing Reliability Analysis for Non-repairable systems

  • Reliability benchmarking & gap analysis
  • Reliability and system lifecycle phases
  • Root cause failure analysis
  • Reliability data collection
  • Reliability predictions
  • Reliability block diagrams
  • Fault tree analysis
  • Failure modes & effects analysis
  • Thermal analysis
  • Derating analysis and component selection
  • Tolerance and worst case analysis
  • Material selection
  • Design of experiments
  • Finite element analysis
  • Dynamic analysis (modal, shock, vibration, immersion, water, etc.)
  • Design review and retrospective facilitation
  • Reliability test plan development
  • Highly accelerated life testing (halt)
  • Fracture and fatigue
  • Design verification testing
  • Highly Accelerated Stress Screening (HASS)
  • Environmental testing and analysis
  • Thermal testing and analysis
  • Reliability demonstration testing
  • Closed-loop corrective action process setup
  • Lessons Learned Process Establishment
Apr
24
Mon
Certified Space Security Specialist Professional (CSSSP) Training – Level 2 (Professional) @ Live online
Apr 24 @ 9:00 am – Apr 27 @ 4:00 pm
Print Friendly, PDF & Email

Upcoming course: CSSSP Level 1 (Specialist)

  • Length: 4 Days
  • When: March 27-March 30, 2023 (Live Online or In-Person)
  • Where: Washington D.C.

Learn more >>>

Next course: CSSSP Level 2 (Professional)

  • Length: 4 Days
  • When: April 24- April 27, 2023 (In-Person Class and Live Online with Teams)
  • Where: Washington D.C.

Next course: CSSSP Level 3 (Expert)

  • Length: 4 Days
  • When: May 22- May 25, 2023 (In-Person Class and Live Online with Teams)
  • Where:  Washington, DC.

 

Certified Space Security Specialist Professional (CSSSP): Level 1

We are developing an overwhelming reliance on space technology – a trend not lost on cybercriminals.

This growing dependency on satellites and the like, puts organizations in a precarious position. In industries like transport and logistics, location data is routinely recorded in real time from GPS satellites and sent to back offices to allow teams to track drivers and assets.

Organizations which have remote outposts or oceangoing ships can’t exactly get online via a mobile or cable network, so they have to use communications satellites instead. On top of that, satellites store sensitive information they collect themselves, which might include images of sensitive military installations or critical infrastructure.

Of course all of these factors make for attractive targets to various types of cybercriminal. Although residing in the vacuum of deep space makes them less vulnerable to physical attacks, space-based systems are still ultimately controlled from computers on the ground. At issue is that data is transmitted by and stored on orbiting satellites more and more every year. Therefore, bad actors have them in their sites due to the high value of data stored on satellites and other space systems.

Particularly disturbing, space security specialists now tell us that cyber attackers don’t even need to be expert hackers from space-faring nations. And neither do they need direct, physical access to control systems belonging to organizations like NASA, ESA or Roscosmos.

For NASA, reliable communication between ground and spacecraft is central to mission success, especially in the realms of digital communication (data and command links). Unfortunately, these light communication links are vulnerable to malicious intrusion. If terrorists or hackers illegally listen to, or worse, modify communication content, disaster can occur.

Especially worrisome are the consequences of a nuclear powered spacecraft under control of a hacker or terrorist, which could be devastating. Obviously, all communications to and between spacecraft must be extremely secure and reliable.

Military satellites and space systems are also vulnerable since almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more. Aging IT systems, supply-chain vulnerabilities and other technological issues that leave military satellite communications open to disruption and tampering also need to be addressed according to space security personnel.

While navigational satellite systems like GPS (US), GLONASS (Russia) and Beidou (China) might not be the easiest targets to hack, there are dozens of other satellite owners of global communications. Additionally, thousands more companies rent bandwidth from satellite owners for selling services like satellite TV, phone and internet. Then there are hundreds of millions of businesses and individuals around the world which use them.

All told, it’s a pretty large potential attack surface which is connected directly to the internet.

Certified Space Security Specialist Professional (CSSSP) Course by Tonex

Although some of these issues are no different from other industries, space systems are met with a unique confluence of cybersecurity risks that complicates the sector’s remediation capabilities.

Governments, critical infrastructure and economies rely on space-dependent services—for example, the Global Positioning System (GPS)—that are vulnerable to hostile cyber operations. However, few space-faring states and companies have paid sufficient attention to the cybersecurity of satellites in outer space, creating a number of risks.

Accelerate your space cybersecurity career with the CSSSP certification.

Certified Space Security Specialist Professional (CSSSP) certification is ideal for space and security practitioners, analysts, engineers, managers and executives interested in proving their knowledge across space security practices and principles.

The CSSSP® (Certified Space Systems Security Professional) qualification is one of the most respected certifications in the space security industry, demonstrating an advanced knowledge of space cybersecurity.

Earning the CSSSP proves you have what it takes to effectively design, implement and manage a cybersecurity space program. With a CSSSP, you validate your expertise and become a Space Cyber member, unlocking a broad array of exclusive resources, educational tools, seminars, conferences and networking opportunities.

CSSSP certification also explores factors that led to the space sector’s poor cybersecurity posture, various cyberattacks against space systems, and existing mitigation techniques employed by the sector.

Analyzing the current state of the industry along with security practices across similar sectors, several security principles for satellites and space assets are proposed to help reorient the sector toward designing, developing, building and managing cyber secure systems. These security principles address both technical and policy issues in order to address all space system stakeholders.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

The CSSSP qualification has been developed and maintained jointly by SpaceCyber.org and Tonex.

CSSSP Domains (CBK) are:

  1. Space Systems Engineering
  2. Cybersecurity Principles for Space Systems
  3. Space Cybersecurity Foundation
  4. Space Security Planning, Policy and Leadership
  5. Space Security Architecture and Operation
  6. Space Threat and Vulnerability Analysis and Assessment
  7. Space Ethical Hacking, Penetration Testing and Defenses
  8. Space Intrusion Detection Analysis
  9. Space Network Penetration Testing and Ethical Hacking
  10. Space Embedded Systems Cybersecurity
  11. Space Defensible Security Architecture and Engineering
  12. Space Forensic Analysis
  13. Space Network and System Reverse Engineering
  14. Space Incident Response and Network Forensics
  15. MIL-STD-1553 Cybersecurity
  16. ARINC 429 Cybersecurity
  17. Artificial Intelligence(AI), Machine Learning (ML) and Deep Learning (DL) Integration with Space Cybersecurity
  18. Blockchain Integration with Space Cybersecurity
  19. Sensor Fusion Integration with Space Cybersecurity
  20. Electronic Warfare Capabilities in Space
  21. Use of Electromagnetic Pulses or Directed Energy (laser beams or microwave-bombardments)
  22. Space System Survivability and US War Fighting
  23. Electronic Warfare and Aircraft Survivability
  24. Cyber Warfare Capabilities in Space Missions
  25. Counter Communications System
  26. Electronic and Cyber Warfare in Outer Space
  27. Counter-space Capabilities
  28. Types of Counter-space Technology
  29. Measures and Their effectiveness in Addressing Counter-space Capabilities

For more information, questions, comments, contact us. 

Future related programs to Certified Space Security Specialist Professional (CSSSP) Certification are:

  • Space Cyber Infrastructure Specialist (SCIS)
  • Space Cyber Engineering Specialist (SCES)
  • Space Cyber Operations Specialist (SCOS)
  • Space Cyber Technology Professional (SCTP)
  • Space Cyber Operations Manager (SCOM)
  • Space Cyber Infrastructure Expert (SCIE)
  • Space Cyber Domain Expert (SCDE)
  • Space Cyber Manager (SCM)
  • Space Cyber Authority Expert (SCAE)
  • Space Cyber Application Specialist (SCAS)
  • Space Cyber Leadership Certificate (SCLC)
May
22
Mon
Certified Space Security Specialist Professional (CSSSP) Training – Level 3 (Expert) @ Live online
May 22 @ 9:00 am – May 25 @ 4:00 pm
Print Friendly, PDF & Email

Upcoming course: CSSSP Level 1 (Specialist)

  • Length: 4 Days
  • When: March 27-March 30, 2023 (Live Online or In-Person)
  • Where: Washington D.C.

Learn more >>>

Next course: CSSSP Level 2 (Professional)

  • Length: 4 Days
  • When: April 24- April 27, 2023 (In-Person Class and Live Online with Teams)
  • Where: Washington D.C.

Next course: CSSSP Level 3 (Expert)

  • Length: 4 Days
  • When: May 22- May 25, 2023 (In-Person Class and Live Online with Teams)
  • Where:  Washington, DC.

 

Certified Space Security Specialist Professional (CSSSP): Level 1

We are developing an overwhelming reliance on space technology – a trend not lost on cybercriminals.

This growing dependency on satellites and the like, puts organizations in a precarious position. In industries like transport and logistics, location data is routinely recorded in real time from GPS satellites and sent to back offices to allow teams to track drivers and assets.

Organizations which have remote outposts or oceangoing ships can’t exactly get online via a mobile or cable network, so they have to use communications satellites instead. On top of that, satellites store sensitive information they collect themselves, which might include images of sensitive military installations or critical infrastructure.

Of course all of these factors make for attractive targets to various types of cybercriminal. Although residing in the vacuum of deep space makes them less vulnerable to physical attacks, space-based systems are still ultimately controlled from computers on the ground. At issue is that data is transmitted by and stored on orbiting satellites more and more every year. Therefore, bad actors have them in their sites due to the high value of data stored on satellites and other space systems.

Particularly disturbing, space security specialists now tell us that cyber attackers don’t even need to be expert hackers from space-faring nations. And neither do they need direct, physical access to control systems belonging to organizations like NASA, ESA or Roscosmos.

For NASA, reliable communication between ground and spacecraft is central to mission success, especially in the realms of digital communication (data and command links). Unfortunately, these light communication links are vulnerable to malicious intrusion. If terrorists or hackers illegally listen to, or worse, modify communication content, disaster can occur.

Especially worrisome are the consequences of a nuclear powered spacecraft under control of a hacker or terrorist, which could be devastating. Obviously, all communications to and between spacecraft must be extremely secure and reliable.

Military satellites and space systems are also vulnerable since almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more. Aging IT systems, supply-chain vulnerabilities and other technological issues that leave military satellite communications open to disruption and tampering also need to be addressed according to space security personnel.

While navigational satellite systems like GPS (US), GLONASS (Russia) and Beidou (China) might not be the easiest targets to hack, there are dozens of other satellite owners of global communications. Additionally, thousands more companies rent bandwidth from satellite owners for selling services like satellite TV, phone and internet. Then there are hundreds of millions of businesses and individuals around the world which use them.

All told, it’s a pretty large potential attack surface which is connected directly to the internet.

Certified Space Security Specialist Professional (CSSSP) Course by Tonex

Although some of these issues are no different from other industries, space systems are met with a unique confluence of cybersecurity risks that complicates the sector’s remediation capabilities.

Governments, critical infrastructure and economies rely on space-dependent services—for example, the Global Positioning System (GPS)—that are vulnerable to hostile cyber operations. However, few space-faring states and companies have paid sufficient attention to the cybersecurity of satellites in outer space, creating a number of risks.

Accelerate your space cybersecurity career with the CSSSP certification.

Certified Space Security Specialist Professional (CSSSP) certification is ideal for space and security practitioners, analysts, engineers, managers and executives interested in proving their knowledge across space security practices and principles.

The CSSSP® (Certified Space Systems Security Professional) qualification is one of the most respected certifications in the space security industry, demonstrating an advanced knowledge of space cybersecurity.

Earning the CSSSP proves you have what it takes to effectively design, implement and manage a cybersecurity space program. With a CSSSP, you validate your expertise and become a Space Cyber member, unlocking a broad array of exclusive resources, educational tools, seminars, conferences and networking opportunities.

CSSSP certification also explores factors that led to the space sector’s poor cybersecurity posture, various cyberattacks against space systems, and existing mitigation techniques employed by the sector.

Analyzing the current state of the industry along with security practices across similar sectors, several security principles for satellites and space assets are proposed to help reorient the sector toward designing, developing, building and managing cyber secure systems. These security principles address both technical and policy issues in order to address all space system stakeholders.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

The CSSSP qualification has been developed and maintained jointly by SpaceCyber.org and Tonex.

CSSSP Domains (CBK) are:

  1. Space Systems Engineering
  2. Cybersecurity Principles for Space Systems
  3. Space Cybersecurity Foundation
  4. Space Security Planning, Policy and Leadership
  5. Space Security Architecture and Operation
  6. Space Threat and Vulnerability Analysis and Assessment
  7. Space Ethical Hacking, Penetration Testing and Defenses
  8. Space Intrusion Detection Analysis
  9. Space Network Penetration Testing and Ethical Hacking
  10. Space Embedded Systems Cybersecurity
  11. Space Defensible Security Architecture and Engineering
  12. Space Forensic Analysis
  13. Space Network and System Reverse Engineering
  14. Space Incident Response and Network Forensics
  15. MIL-STD-1553 Cybersecurity
  16. ARINC 429 Cybersecurity
  17. Artificial Intelligence(AI), Machine Learning (ML) and Deep Learning (DL) Integration with Space Cybersecurity
  18. Blockchain Integration with Space Cybersecurity
  19. Sensor Fusion Integration with Space Cybersecurity
  20. Electronic Warfare Capabilities in Space
  21. Use of Electromagnetic Pulses or Directed Energy (laser beams or microwave-bombardments)
  22. Space System Survivability and US War Fighting
  23. Electronic Warfare and Aircraft Survivability
  24. Cyber Warfare Capabilities in Space Missions
  25. Counter Communications System
  26. Electronic and Cyber Warfare in Outer Space
  27. Counter-space Capabilities
  28. Types of Counter-space Technology
  29. Measures and Their effectiveness in Addressing Counter-space Capabilities

For more information, questions, comments, contact us. 

Future related programs to Certified Space Security Specialist Professional (CSSSP) Certification are:

  • Space Cyber Infrastructure Specialist (SCIS)
  • Space Cyber Engineering Specialist (SCES)
  • Space Cyber Operations Specialist (SCOS)
  • Space Cyber Technology Professional (SCTP)
  • Space Cyber Operations Manager (SCOM)
  • Space Cyber Infrastructure Expert (SCIE)
  • Space Cyber Domain Expert (SCDE)
  • Space Cyber Manager (SCM)
  • Space Cyber Authority Expert (SCAE)
  • Space Cyber Application Specialist (SCAS)
  • Space Cyber Leadership Certificate (SCLC)
Oct
30
Mon
PCB Reverse Engineering Course @ Live online
Oct 30 @ 9:00 am – Oct 31 @ 4:00 pm
Print Friendly, PDF & Email

Live online. October 30 -31, 2023

The PCB Reverse Engineering Course provides participants with the knowledge and skills to de-process, analyze, and recreate design files of electronic devices. Participants will learn the techniques and tools required to reverse engineer printed circuit boards (PCBs) and assess legacy or obsolete devices. Through practical hands-on exercises and real-world examples, participants will gain expertise in reverse engineering methodologies, PCB analysis, and recreating design files for testing or manufacturing replacements.

Audience:

The course is suitable for electronics engineers, hardware designers, security professionals, and individuals involved in the assessment, testing, and manufacturing of electronic devices. It is beneficial for professionals seeking to enhance their knowledge and skills in PCB reverse engineering, particularly in the context of assessing legacy or obsolete devices and recreating design files for replacement or testing purposes. Basic knowledge of electronics, PCB design, and circuit analysis is recommended.

Learning Objectives:

  • Understand the principles and applications of PCB reverse engineering.
  • De-process PCBs and identify individual components.
  • Analyze circuitry and trace signals on PCBs.
  • Reconstruct PCB layouts and generate design files.
  • Replace components and validate the functionality of recreated designs.
  • Utilize advanced techniques for complex PCB reverse engineering tasks.
  • Document the reverse engineering process and create comprehensive reports.
  • Communicate findings and recommendations effectively to stakeholders.

Course Outline:

Introduction to PCB Reverse Engineering

  • Overview of PCB reverse engineering and its applications
  • Legal and ethical considerations in reverse engineering
  • Tools and equipment for PCB analysis and de-processing

PCB De-Processing Techniques

  • PCB disassembly and component removal methods
  • PCB layer separation and identification
  • Techniques for non-destructive and destructive PCB de-processing

Component Identification and Analysis

  • Component identification methods (SMT, through-hole, custom)
  • Analyzing component datasheets and specifications
  • Evaluating component functionality and role in the circuit

Tracing PCB Signals and Analyzing Circuitry

  • Signal tracing techniques on PCBs
  • Analyzing circuitry and identifying functional blocks
  • Understanding the interconnections and signal paths

PCB Layout Reconstruction

  • Techniques for reverse engineering PCB layout
  • Tracing and recreating PCB schematic diagrams
  • Generating design files (schematics, Gerber files) for replacement

PCB Component Replacement and Testing

  • Identifying suitable replacement components
  • Replacing components and ensuring compatibility
  • Testing and validating the functionality of the recreated design

Advanced Techniques for PCB Reverse Engineering

  • Handling multilayer PCBs and blind vias
  • Decapsulating integrated circuits (ICs) for analysis
  • Reverse engineering custom or proprietary components

Documentation and Reporting

  • Documenting the reverse engineering process
  • Creating comprehensive reports and design documentation
  • Communicating findings and recommendations to stakeholders
Feb
19
Mon
Certified Space Security Specialist Professional (CSSSP) Training – Level I (Specialist) @ Live online
Feb 19 @ 9:00 am – Feb 22 @ 4:00 pm
Print Friendly, PDF & Email

Upcoming course: CSSSP Level 1 (Specialist)

  • Length: 4 Days
  • When: February 19 – 22, 2024 (Live Online or In-Person)
  • Where: Dallas, TX.

Learn more >>>

 

Certified Space Security Specialist Professional (CSSSP): Level 1

We are developing an overwhelming reliance on space technology – a trend not lost on cybercriminals.

This growing dependency on satellites and the like, puts organizations in a precarious position. In industries like transport and logistics, location data is routinely recorded in real time from GPS satellites and sent to back offices to allow teams to track drivers and assets.

Organizations which have remote outposts or oceangoing ships can’t exactly get online via a mobile or cable network, so they have to use communications satellites instead. On top of that, satellites store sensitive information they collect themselves, which might include images of sensitive military installations or critical infrastructure.

Of course all of these factors make for attractive targets to various types of cybercriminal. Although residing in the vacuum of deep space makes them less vulnerable to physical attacks, space-based systems are still ultimately controlled from computers on the ground. At issue is that data is transmitted by and stored on orbiting satellites more and more every year. Therefore, bad actors have them in their sites due to the high value of data stored on satellites and other space systems.

Particularly disturbing, space security specialists now tell us that cyber attackers don’t even need to be expert hackers from space-faring nations. And neither do they need direct, physical access to control systems belonging to organizations like NASA, ESA or Roscosmos.

For NASA, reliable communication between ground and spacecraft is central to mission success, especially in the realms of digital communication (data and command links). Unfortunately, these light communication links are vulnerable to malicious intrusion. If terrorists or hackers illegally listen to, or worse, modify communication content, disaster can occur.

Especially worrisome are the consequences of a nuclear powered spacecraft under control of a hacker or terrorist, which could be devastating. Obviously, all communications to and between spacecraft must be extremely secure and reliable.

Military satellites and space systems are also vulnerable since almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more. Aging IT systems, supply-chain vulnerabilities and other technological issues that leave military satellite communications open to disruption and tampering also need to be addressed according to space security personnel.

While navigational satellite systems like GPS (US), GLONASS (Russia) and Beidou (China) might not be the easiest targets to hack, there are dozens of other satellite owners of global communications. Additionally, thousands more companies rent bandwidth from satellite owners for selling services like satellite TV, phone and internet. Then there are hundreds of millions of businesses and individuals around the world which use them.

All told, it’s a pretty large potential attack surface which is connected directly to the internet.

Certified Space Security Specialist Professional (CSSSP) Course by Tonex

Although some of these issues are no different from other industries, space systems are met with a unique confluence of cybersecurity risks that complicates the sector’s remediation capabilities.

Governments, critical infrastructure and economies rely on space-dependent services—for example, the Global Positioning System (GPS)—that are vulnerable to hostile cyber operations. However, few space-faring states and companies have paid sufficient attention to the cybersecurity of satellites in outer space, creating a number of risks.

Accelerate your space cybersecurity career with the CSSSP certification.

Certified Space Security Specialist Professional (CSSSP) certification is ideal for space and security practitioners, analysts, engineers, managers and executives interested in proving their knowledge across space security practices and principles.

The CSSSP® (Certified Space Systems Security Professional) qualification is one of the most respected certifications in the space security industry, demonstrating an advanced knowledge of space cybersecurity.

Earning the CSSSP proves you have what it takes to effectively design, implement and manage a cybersecurity space program. With a CSSSP, you validate your expertise and become a Space Cyber member, unlocking a broad array of exclusive resources, educational tools, seminars, conferences and networking opportunities.

CSSSP certification also explores factors that led to the space sector’s poor cybersecurity posture, various cyberattacks against space systems, and existing mitigation techniques employed by the sector.

Analyzing the current state of the industry along with security practices across similar sectors, several security principles for satellites and space assets are proposed to help reorient the sector toward designing, developing, building and managing cyber secure systems. These security principles address both technical and policy issues in order to address all space system stakeholders.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

The CSSSP qualification has been developed and maintained jointly by SpaceCyber.org and Tonex.

CSSSP Domains (CBK) are:

  1. Space Systems Engineering
  2. Cybersecurity Principles for Space Systems
  3. Space Cybersecurity Foundation
  4. Space Security Planning, Policy and Leadership
  5. Space Security Architecture and Operation
  6. Space Threat and Vulnerability Analysis and Assessment
  7. Space Ethical Hacking, Penetration Testing and Defenses
  8. Space Intrusion Detection Analysis
  9. Space Network Penetration Testing and Ethical Hacking
  10. Space Embedded Systems Cybersecurity
  11. Space Defensible Security Architecture and Engineering
  12. Space Forensic Analysis
  13. Space Network and System Reverse Engineering
  14. Space Incident Response and Network Forensics
  15. MIL-STD-1553 Cybersecurity
  16. ARINC 429 Cybersecurity
  17. Artificial Intelligence(AI), Machine Learning (ML) and Deep Learning (DL) Integration with Space Cybersecurity
  18. Blockchain Integration with Space Cybersecurity
  19. Sensor Fusion Integration with Space Cybersecurity
  20. Electronic Warfare Capabilities in Space
  21. Use of Electromagnetic Pulses or Directed Energy (laser beams or microwave-bombardments)
  22. Space System Survivability and US War Fighting
  23. Electronic Warfare and Aircraft Survivability
  24. Cyber Warfare Capabilities in Space Missions
  25. Counter Communications System
  26. Electronic and Cyber Warfare in Outer Space
  27. Counter-space Capabilities
  28. Types of Counter-space Technology
  29. Measures and Their effectiveness in Addressing Counter-space Capabilities

For more information, questions, comments, contact us. 

Future related programs to Certified Space Security Specialist Professional (CSSSP) Certification are:

  • Space Cyber Infrastructure Specialist (SCIS)
  • Space Cyber Engineering Specialist (SCES)
  • Space Cyber Operations Specialist (SCOS)
  • Space Cyber Technology Professional (SCTP)
  • Space Cyber Operations Manager (SCOM)
  • Space Cyber Infrastructure Expert (SCIE)
  • Space Cyber Domain Expert (SCDE)
  • Space Cyber Manager (SCM)
  • Space Cyber Authority Expert (SCAE)
  • Space Cyber Application Specialist (SCAS)
  • Space Cyber Leadership Certificate (SCLC)
Feb
26
Mon
Fundamentals of Battery Energy Storage System (BESS) @ Tonex Dallas Site and Live online
Feb 26 @ 9:00 am – Feb 28 @ 4:00 pm
Print Friendly, PDF & Email

Fundamentals of Battery Energy Storage System (BESS)

Live online January 3-5, 2024

Fundamentals of Battery Energy Storage System (BESS) is a 3-day course that evaluates the costs and investment benefits of using a BESS system.

Participants will also learn best practices for energy storage engineering and installation.

Battery Energy Storage Systems (BESS) are supercharged with benefits such as providing a way to store excess energy generated by renewable energy sources like wind and solar.

This benefit of Battery Energy Storage Systems is particularly germane because renewable energy sources tend to be intermittent. It’s common for their output not to meet their energy demand.

By storing excess energy that becomes available during peak hours, a Battery Energy Storage System location can ensure that energy will be available when needed most.

Additionally, load management helps reduce energy costs and improve grid stability.

Many energy professionals feel that battery energy storage is especially effective in combination with solar energy. The reasoning is this:

Solar energy storage mitigates the intermittent nature of renewable power and guarantees a steady supply of electricity.

Generally speaking, batteries for a home or business solar energy system include a built-in inverter to change the DC current generated by solar panels into the AC current needed to power appliances or equipment.

Consequently, a solar battery storage works with an energy management system that manages the charge and discharge cycles based on real-time needs and availability.

Battery Energy Storage Systems consist of one or more batteries and can be used to balance the electric grid, provide backup power and improve grid stability.

Battery storage systems offer many benefits over traditional grid storage solutions, including:

  • Greater flexibility
  • Higher efficiency
  • Lower Costs
  • Greater scalability

The most popular type of battery for Battery Energy Storage Systems is lithium-ion batteries. These batteries offer a high energy density and are relatively lightweight, making them easy to transport and install.

Another common BESS battery is the lead-acid battery. The upside here is that they normally are less expensive than lithium-ion batteries. The downside is that they typically have a shorter life span and are not as efficient.

Flow batteries are a newer type of BESS that offer a longer life span than traditional lead-acid or lithium-ion batteries.

Fundamentals of Battery Energy Storage System (BESS) Course by Tonex

Fundamentals of Battery Energy Storage System (BESS) is a 3-day training course. A Battery Energy Storage System (BESS) is a technology developed for storing electric charge by using specially developed batteries.

Battery storage is a technology that enables power system operators and utilities to store energy for later use. A BESS is an electrochemical device that charges (or collects energy) from the grid or a power plant and then discharges that energy at a later time to provide electricity or other grid services when needed.

Fundamentals of Battery Energy Storage System (BESS) training should be suitable for engineers, managers, supervisors as well as professional and technical personnel.

Audience

Fundamentals of Battery Energy Storage System (BESS) training is suitable for engineers, managers, supervisors as well as professional and technical personnel.

Course Outline

Overview of Battery Energy Storage System (BESS)

  • ESS (Energy Storage System)
  • Classification of energy storage technologies
  • Parameters
  • Unit Parameters
  • Main Electrical Parameters
  • Tests and testing methods
  • Load Management (Energy Demand Management)
  • Energy Time-Shift (Arbitrage)
  • Backup Power
  • Black-Start Capability
  • Frequency Control
  • Renewable Energy Integration
  • Transmission and Distribution (T&D) Deferral
  • Microgrids

Battery Chemistry Types

  • Mechanical Storage
  • Pumped Hydro Storage (PHS)
  • Gravity Storage Technologies
  • Compressed Air Energy Storage (CAES)
  • Flywheel Energy Storage (FES)
  • Electrochemical storage
  • Lead–Acid (PbA) Battery
  • Nickel–Cadmium (Ni–Cd) Battery
  • Lithium-Ion (Li-Ion) Battery
  • Sodium–Sulfur (Na–S) Battery
  • Redox Flow Battery (RFB)
  • Sodium-sulfur batteries (NAS)
  • Flow batteries
  • Zn-air batteries
  • Supercapacitors
  • Hydrogen Storage Technologies (Power-to-Gas)

Key Characteristics of Battery Storage Systems

  • Rated power capacity
  • Energy capacity
  • Storage duration
  • Cycle life/lifetime .
  • Self-discharge
  • State of charge
  • Round-trip efficiency

Why BESS over other Storage Technologies

  • BESS advantage over other storage technologies
  • Footprint and no restrictions on geographical locations
  • Pumped hydro storage (PHS) and Compressed air energy storage (CAES)
  • Water and siting-related restrictions and transmission constraints
  • Energy and power densities
  • Calculating the cost and revenue generated by the applications for a BESS
  • Evaluating the investment and building

BESS System Capabilities

  • Common BESS Terminology
  • Capacity [Ah]
  • Nominal Energy [Wh]
  • Power [W]
  • Specific Energy [Wh/kg]
  • C Rate
  • Cycle
  • Cycle Life
  • Depth of Discharge (DoD)
  • State-of-charge (SoC, %)
  • Coulombic efficiency
  • Specific Energy [Wh/kg]
  • Capacity [Ah]
  • Nominal Energy [Wh]
  • Five Categories of Energy Storage Applications
  • Electric Supply
  • Ancillary Services
  • Grid System
  • End User/Utility Customer
  • Grid and Renewable Integration
  • Electric Energy Time-Shift
  • Load Following
  • Renewables Energy Time-Shift
  • Renewables Capacity Firming

BESS Architecture

  • Components of a Battery Energy Storage System (BESS)
  • Energy Storage System Components
  • Grid Connection for Utility-Scale BESS Projects
  • Grid Storage Solution (GSS)
  • Direct current (dc) system
  • Power conversion system (PCS)
  • BMS, SSC, and a grid connection
  • Stationary battery energy storage system (BESS)
  • Mobile BESS
  • Carrier of BESS
  • Lead acid battery
  • Lithium-ion battery
  • Flow battery
  • Sodium-sulfur battery
  • BESS used in electric power systems (EPS)
  • Alternatives for connection (including DR interconnection)
  • Design, operation, and maintenance of stationary or mobile BESS used in EPS
  • Fire suppression system
  • Fire detection system
  • HVAC system
  • Batteries
  • Inverters
  • Transformers
  • MV interconnection
  • The Balance Of System (BOS)
  • Equipment required to handle the energy exchange
  • Inverters, cable, switchgear, etc.

Operational Case Studies

Battery Energy Storage System Implementation

  • Comparison of Operational Characteristics of Energy Storage System Applications
  • Frequency Regulation
  • Renewable Energy Integration
  • Microgrids Case Study
  • Case Study of Energy Storage System Operation Project
  • Case Study of a Wind Power plus Energy Storage System Project
  • Battery Energy Storage System (BESS) and Battery Management System (BMS) for Grid-Scale Applications

Grid Applications of Battery Energy Storage Systems

  • Scoping of BESS Use Cases
  • General Grid Applications of BESS
  • Round-Trip Efficiency
  • Response Time
  • Lifetime and Cycling
  • Frequency Regulation
  • Peak Shaving and Load Leveling

Management and Controls (on site & remote)

  • Timely operation and maintenance of the facility
  • Methods to minimize loss of energy yield, damage to property, safety concerns, and disruption of electric power supply
  • Function Definition
  • Operation Monitoring system management
  • Operation status check and repair
  • Management and reporting
  • Facility infrastructure (communications and control, environmental control, grid interconnection, etc.)
  • Remote monitoring
  • Operation procedures
  • Operational parameters
  • Alarms and warnings
  • Remote fault location

BESS Placement

  • Power losses minimization
  • Power line voltage limits

SCADA and Software Tools

  • SCADA functionalities
  • BMS and EMS
  • Human interfaces and function
  • Predictive tools

Challenges and Risks

  • Battery Safety
  • Battery Reuse and Recycling
  • Recycling Process
  • Policy Recommendations
  • Frequency Regulation
  • Distribution Grids
  • Transmission Grids
  • Peak Shaving and Load Leveling
  • Microgrids

Diagnostic Procedures

  • Fault detection (i.e. battery module)
  • Alarms/warnings/diagnosis/ corrective: troubleshooting guides for more common errors

Electrical Maneuvers

  • Energization
  • De-energization
  • Isolation
  • Grounding
  • LOTO procedures

Maintenance and Corrective Actions

  • Normal maintenance methods and procedures
  • Repairs and replacement
  • Equipment calibration
  • Component and equipment-wise checks and repair, repair work (following
  • expiration of EPC warranty period), verification of repairs, documentation
  • Environmental management Vegetation abatement, waste and garbage dumping, battery disposal
  • Safety management Protection of the ESS facility against criminal
  • Vandalism, theft, and trespassing
  • Transmission-line management
  • Transmission-line check and repair work
  • Spare parts Ample storage of on-site spares with suitable safeguards
  • availability agreement
  • BESS (batteries, power converters, etc.)

Testing

  • Special tests
  • Special tools
  • Recycling and waste management
  • Storage of battery modules

Optional Workshops

Best Practices

  • Best practices for Energy Storage Engineering and Installation
  • Requirements for comparing offers between different manufacturers (i.e. Efficiency, BOL/EOL, self-discharge rate, cycling, etc.)
  • Battery Energy Storage System Selection
  • Battery modules
  • thermal management.
  • Power conversion system (PCS)
  • Battery management system (BMS),
  • voltage, temperature, fire warning and state of charge (SOC) of the battery
  • Energy management system (EMS)
  • BESS System Components:
  • Cells, Modules and Racks
  • Battery Management System (BMS)
  • Monitoring and safety components
  • Balance of System (BOS) equipment

Root Cause Analysis  

  • Define problem statement in a clear way without any ambiguity
  • Use proper tools and resources to gather data
  • Describe root cause analysis step by step
  • Use brainstorming methods to identify all potential causes
  • Monitor the implemented solution(s) to evaluate its effectiveness
  • Develop an effective action plan
  • Develop an effective and sufficient preventive plan
  • Determine common limitations of root cause analysis and find ways to remove those barriers
  • Construct “whys” and “hows” trees
  • Think laterally to explore all the causes of a problem
  • Form an effective work environment

Guidelines For Developing Bess Technical Standards

  • System Sizing and Selection
  • Sizing
  • Selection
  • Functional System Performance
  • Characteristics of Grid-Connected ESSs
  • Communication Interface
  • Performance Assessments
  • Installation Phase
  • Commissioning Phase
  • Performance Monitoring Phase

Overview of BESS Codes and Technical Standards

  • NFPA 855
  • National Fire Protection Association (NFPA) 855-2020: Standard for The Installation of Stationary Energy Storage Systems.
  • National Fire Protection Association (NFPA) 69-2019: Standard on Explosion Prevention Systems.
  • National Fire Protection Association (NFPA) 68-2018: Standard on Explosion Protection by Deflagration Venting.
  • UL 9540A and UL9540
  • UL 1642
  • UL 1973
  • UL 1741
  • UL 2596
  • UL 62109-1
  • UL 1741, “Standard for Static Inverters and Charge, Converters, Controllers and Interconnection System Equipment for Use with Distributed Energy Resources”
  • UL 62109-1 “Safety of power converters for use in photovoltaic power systems – Part 1: General requirements”
  • Battery cell: UL 1642 “Standard for Lithium Batteries”
  • Battery module: UL 1973 “Batteries for Use in Light Electric Rail Applications and Stationary Applications”
  • Battery system: UL 9540 “Energy Storage Systems and Equipment” , UL 9540A “Test Method for Evaluating Thermal Runaway Fire Propagation in Battery Energy Storage Systems”
  • IEC 62933
  • IEC 62619
  • IEC 63056
  • NERC Interconnection Standards
  • UN 38.3 “Certification for Lithium Batteries” (Transportation)
  • American National Standards Institute (ANSI) C12.1 (electricity metering)
  • American Society of Civil Engineers (ASCE)-7 Minimum Design Loads for Buildings and Other Structures
  • IEEE 2030.2, Guide for the Interoperability of Energy Storage Systems Integrated with the Electric Power Infrastructure
  • NFPA 855, “Standard for the Installation of Stationary Energy Storage Systems”
  • NFPA 855 (Standard for the Installation of Stationary Energy Storage Systems): Provides the minimum requirements for mitigating the hazards associated with BESS.
  • Grid interconnection standards, as applicable to the project as a whole:
  • Institute of Electrical and Electronics Engineers (IEEE) 1547
  • IEEE 2030.2, Guide for the Interoperability of Energy Storage Systems Integrated with the Electric Power Infrastructure
  • ANSI Z535 (Standards for Safety Signs and Colors): Provides the specifications and requirements to establish uniformity of safety color coding, environmental/facility safety signs and communicating safety symbols.
  • IEEE 693 (Recommended Practice for Seismic Design of Substations): Provides seismic design recommendations for substations, including qualification of different equipment types.
  • IEEE 1578 (Recommended Practice for Stationary Battery Electrolyte Spill Containment and Management): Provides descriptions of products, methods, and procedures relating to stationary batteries, battery electrolyte spill mechanisms, electrolyte containment and control methodologies, and firefighting considerations.
  • NFPA 13 (Standard for the Installation of Sprinkler Systems): Addresses sprinkler system design approaches, system installation, and component options to prevent fire deaths and property loss.
  • NFPA 69 (Standard on Explosion Prevention Systems): Provides requirements for installing systems for the prevention and control of explosions in enclosures that contain flammable concentrations of flammable gases, vapors, mists, dusts, or hybrid mixtures.
  • NFPA 68 (Standard on Explosion Protection by Deflagration Venting): Addresses the installation and use of devices and systems that vent the combustion gases and pressures resulting from a deflagration within an enclosure, so that structural and mechanical damage is minimized.
  • NFPA 70 (National Electrical Code (NEC)): Provides the benchmark for safe electrical design, installation, and inspection to protect people and property from electrical hazards.
  • NFPA 704 (Standard System for the Identification of the Hazards of Materials for Emergency Response): Presents a simple, readily recognized, and easily understood system of markings (commonly referred to as the “NFPA hazard diamond”) that provides an immediate general sense of the hazards of a material and the severity of these hazards as they relate to emergency response.
  • NFPA 780 (Standard for the Installation of Lightning Protection Systems): Provides lightning protection system installation requirements in buildings to safeguard people and property from fire risk and related hazards associated with lightning exposure.
  • UL 1973 (Standard for Batteries for Use in Stationary, Vehicle Auxiliary Power and Light Electric Rail (LER) Applications): Provides requirements for battery systems as defined by this standard for use as energy storage for stationary applications such as for PV, wind turbine storage or for UPS, etc. applications.
  • UL 1642 (Standard for Lithium Batteries): Provides requirements for primary, e., non-rechargeable, and secondary, i.e., rechargeable, lithium batteries for use as power sources in products.
  • UL 1741 (Standard for Inverters, Converters, Controllers and Interconnection System Equipment for Use with Distributed Energy Resources): Provides requirements for inverters, converters, charge controllers, and interconnection system equipment intended for use in standalone (not grid connected) or utility-interactive (grid-connected) power systems.
  • UL 9540 (Standard for Energy Storage Systems and Equipment): Provides requirements for energy storage systems that are intended to receive electric energy and then store the energy in some form so that the energy storage system can provide electrical energy to loads or to the local/area electric power system (EPS) up to the utility grid when needed.
  • UL 62109 (Standard for Safety of Power Converters for Use in Photovoltaic Power Systems): Provides requirements for the design and manufacture of power conversion efficiency (PCE) for protection against electric shock, energy, fire, mechanical, and other hazards.
Mar
4
Mon
RF Engineering Training | Bootcamp Style @ Tonex Location
Mar 4 @ 9:00 am – Mar 7 @ 3:00 pm
Print Friendly, PDF & Email

RF Engineering Training Course covers all aspects of Radio Frequency Engineering, a subset of electrical engineering. The course incorporates theory and practices to illustrate the role of RF into almost everything that transmits or receives a radio wave which includes: RF planning, cellular networks including 2G GSM, 3G UMTS, 4G LTE, 5G, mmWave, 6G, Radar, EW, AIGINT, Wi-Fi, Satellite Communications, GPS, VSAT, two-way radio, Point-to-point microwave, Point-to-Multi-Point Radio Links, Public Safety, Testing, Modeling  and Simulation.

RF Engineering Boot Camp provides participants with a solid understanding of RF surveys and planning, electromagnetic modeling and simulation, interference analysis and resolution, coverage analysis, propagation models, RF engineering, system specifications and performance, modulation, antenna theory, link design, traffic engineering, optimization, benchmarking, safety, RF testing and system integration and measurements. Design and production engineers and technicians interested in improving RF engineering skills through a practical approach will benefit from this course.

 

Learn about RF engineering principles defined by ITU-T and 3GPP.

A Radio Frequency (RF) Engineer is an electrical engineer who specializes in devices that receive or transmit radio waves.

All our wireless and mobile devices operate on radio waves, so our tech-centered society would not be possible without the work of RF Engineers. These Engineers often work in a collaborative environment both with other RF Engineers and stakeholders in other disciplines, including things like:

  • Designing RF schematics for new wireless networks
  • Ensuring regulatory standards are met
  • Communicating data using digital software
  • Optimizing the performance of existing wireless networks
  • Analyzing equipment and identifying areas of improvement

For most RF engineers, it all starts with an understanding of antenna theory. The fundamentals of antenna theory requires that the antenna be “impedance matched” to the transmission line or the antenna will not radiate.

An antenna is an array of conductors (elements), electrically connected to the receiver or transmitter. Antennas can be designed to transmit and receive radio waves in all horizontal directions equally (omnidirectional antennas), or preferentially in a particular direction (directional, or high-gain or “beam” antennas).

An antenna may include components not connected to the transmitter, parabolic reflectors, horns, or parasitic elements, which serve to direct the radio waves into a beam or other desired radiation pattern.

In truth, RF engineering can be both challenging and frustrating.

Communication is a key part of being a radio frequency engineer. A lack of communication can cause a lot of problems in radio frequency engineering because there are so many little details that could change at any time, and if someone does not catch the changes, an entire product could get damaged or completed incorrectly.

Being able to prioritize is also essential. RF engineers often have multiple roles and responsibilities. Quite often a RF engineer will have up to 10 tasks at once. Being able to sort out what tasks take priority over others is a very important skill. Deadlines and importance of the task must be considered to know where to spend the correct amount of time and when.

RF Engineers are a part of a highly specialized field and are an integral part of wireless solutions. Their expertise is needed to design effective and reliable solutions to produce quality results, an in-depth knowledge of math, physics and general electronics theory is required.

RF Engineers are specialists in their respective field and assist in both the planning, design, implementation, and maintenance of different RF solutions. To produce quality results in RF Engineering Training Bootcamp, the program covers an in-depth knowledge of math, physics, general electronics theory as well as specialized modules in propagation and microstrip design may be required.

WHO SHOULD ATTEND?

This course is designed for engineers, scientists, technicians, managers, testers, evaluators, and others who plan, specify, design, test, operate or work with RF systems.

WHAT WILL YOU LEARN?

  • An overview of RF theory and operations
  • Explore the latest commercial wireless technologies including Bluetooth, WiFi, LTE, 5G, 6G  and SATCOM
  • An overview of RF spectrum and propagation models
  • Free Space Path Loss: details & calculation
  • How to validate feasibility of custom RF and microwave links
  • How to plan, design, simulate and test various RF and Microwave systems
  • Basics of RF Link Budget
  • Basics of RF systems performance that drive test and evaluation requirements
  • Transmitter and receiver testing
  • An overview of modulation
  • An overview of antenna theory
  • Test and Evaluation (T&E) of RF systems
  • Everything else you need to know

RF Engineering Bootcamp Agenda/Modules

RF 101

  • Radio Milestones
  • RF applications, services, and technologies
  • Types of Electromagnetic Spectrum (EM)
  • Electromagnetic radiation
  • EM Spectrum and wavelength
  • Frequency vs. wavelength example
  • The Radio spectrum
  • Wireless generations and data speeds

Overview of Radio Spectrum and Bands

  • ELF
  • SLF
  • ULF
  • VLF
  • LF
  • MF
  • HF
  • VHF
  • UHF
  • SHF
  • EHF
  • THF
  • Civilian names for various frequency bands
  • Military Names for various Frequency Bands
  • Popular bands
  • L band
  • S band
  • C band
  • X band
  • Ku band
  • K band
  • Ka band
  • Q band
  • U band
  • V band
  • W band
  • F band
  • D band

RF Engineering Principles

  • Fundamentals of RF Systems
  • RF 101
  • History of RF
  • Basic Building Blocks in Radio and Microwave Planning and Design
  • RF Principles, Design, and Deployment
  • RF Propagation, Fading, and Link Budget Analysis
  • Intro to Radio Planning for Mobile and Fixed Networks
  • RF Planning and Design for GSM, CDMA, UMTS/HSPA/HSPA+, LTE, LTE-Advanced 5G NR, mmWave, 6G and other Networks
  • RF Planning and Design for Satellite Communications and VSAT
  • RF Planning and Design for 2-way Radio Communications
  • RF Planning and Design for Radar and Jammers Path Survey
  • RF Impairments
  • Noise and Distortion
  • Antennas and Propagation for Wireless Systems
  • Filters
  • Amplifiers
  • Mixers
  • Transistor Oscillators and Frequency Synthesizers
  • Modulation Techniques
  • Receiver Design
  • Eb/No vs. SNR, BER vs. noise, Bandwidth Limitations
  • Modulation Schemes and Bandwidth
  • RF Technology Fundamentals
  • Types of Modulation: AM, FM, FSK, PSK, QPSK and QAM
  • RF Engineering Principals applied
  • Cellular and Mobile RF
  • Fixed Wireless RF (802.11, 802.16, HF, UHF, Microwave, Satellite, VSAT, Radar and GPS)

A Basic RF System

  • Block diagram of a radio link
  • Basic RF considerations
  • Link use
  • Point to Point (backbone)
  • Point to multi-point (fixed users)
  • Point to multi-point (mobile users)
  • Mesh (any-to-any, peer-to-peer, ad-hoc)
  • Link Type
  • Line of Sight (LOS)
  • Near Line of Sight (nLOS)
  • Non-Line of Sight (NLOS)
  • System gains and loses
  • Overview of modulation
  • Antenna
  • Gain
  • Configuration
  • Height
  • Transmitter
  • Overview of Link Budget

RF Propagation Principles

  • Radio propagation basics
  • Radio signal path loss
  • The atmosphere & radio propagation
  • The Physics of Propagation: Free Space, Reflection, Diffraction
  • Free space propagation & path loss
  • Diffraction, wave bending, ducting
  • Multipath propagation
  • Multipath fading
  • Rayleigh fading
  • Free-Space Propagation Technical Details
  • Propagation Effects of Earth’s Atmosphere
  • Attenuation at Microwave Frequencies
  • Estimating Path Loss
  • VHF/UHF/Microwave Radio Propagation
  • Physics and Propagation Mechanisms
  • Propagation Models and Link Budgets
  • Link Budgets and High-Level System Design
  • Link Budget Basics and Application Principles
  • Traffic Considerations
  • Commercial Propagation Prediction Software

Atmospheric Propagation Effects

  • Attenuation at Microwave, mmWave and THz Frequencies
  • Rain droplets
  • Rain attenuations
  • Reliability calculations during path design
  • Diffraction, Wave Bending, Ducting

Signal Generation and Modulation

  • Overview of Modulation
  • Modulation Types
  • Baseband Signal
  • Amplitude Modulation
  • Frequency Modulation
  • Phase Modulation
  • Digital Modulation
  • ASK, MSK and PSK
  • Example PSK Modulation
  • Overview of BPSK, QPSK, QAM-16, QAM-64 and QAM-256
  • Code Rate
  • Frequency Spectrum Usage as a Result of Modulation
  • Generating Signals
  • Digital Modulation
  • Overview of IQ modulation

Antenna Theory

  • Basic antenna operation
  • Understanding antenna radiation
  • The Principle of current moments
  • What are the antenna parameters?
  • Transmitted power, gain, bandwidth, radiation pattern, beamwidth, polarization,
  • VSWR, Return Loss and impedance
  • Physical parameters
  • Electrical parameters
  • Gain (dBi or dbd)
  • Beamwidth (in radians or degrees)
  • Radiation Pattern (hor & vert)
  • Antenna radiation patterns
  • Patterns in polar and cartesian coordinates
  • 3-dB beamwidth
  • Cross Polarization Discrimination (XPD – dB)
  • Front to Back Ratio (F/B)
  • Voltage Standing Wave Ratio (VSWR)
  • Return Loss (RL – dB)
  • What is Effective Radiated Power?
  • EIRP compared with Isotropic antenna
  • How Antennas Achieve “Gain”
  • Quasi-Optical Techniques (reflection, focusing)
  • Array techniques (discrete elements)
  • “Dish” and other Antennas using Reflectors
  • Aperture Antennas
  • Downtilt: Electrical or Mechanical
  • Directional antenna types
  • Parabolic
  • Multiple element patch

Antenna Theory & Design Principles

  • Principle of Antennas and Wave Propagation
  • Antenna properties
  • Impedance, directivity, radiation patterns, polarization
  • Types of Antennas, Radiation Mechanism (Single Wire, Two-Wires, Dipole)
  • Current Distribution on Thin Wire Antenna
  • Radiation Pattern
  • Gain Antenna types, composition and operational principles
  • ERP and EIRP
  • Antenna gains, patterns, and selection principles
  • Antenna system testing
  • Fundamental Parameters of Antennas
  • Radiation Pattern and types
  • Radiation Intensity and Power Density
  • Directivity, Gain, Half Power Beamwidth
  • Beam Efficiency, Antenna Efficiency
  • Bandwidth, Polarization (Linear, Circular and Elliptical)
  • Polarization Loss Factor
  • Input Impedance
  • Antenna Radiation Efficiency
  • Effective Length, Friis Transmission Equation
  • Antenna Temperature
  • Infinitesimal Dipole
  • Small Dipole
  • Region Separation
  • Finite Length Dipole
  • Half Wavelength Dipole
  • Ground Effects
  • Loop Antennas
  • Small Circular Loop
  • Circular Loop of Constant Current
  • Circular Loop with Non-uniform Current
  • Ground and Earth Curvature Effects
  • Mobile Communication Systems Application
  • Types of Antennas
    • Resonant antennas
    • Traveling wave antennas
    • Frequency Independent antennas
    • Aperture antennas
    • Phased arrays
    • Electrically small antennas
    • Circularly polarized antennas
    • Elementary Antenna Elements
    • Omnidirectional Antennas
    • Microstrip Antennas
    • Achieving circular polarization
    • The helix antenna
    • Electrically Small Antennas
    • Fractal Antennas
    • Ultra Wideband (UWB) Antennas

RF and Microwave System Specifications

  • Fundamentals of wireless communications
  • RF Systems
  • Introduction to microwave communication systems
  • Transmitters and receivers
  • Antennas and the RF Link
  • Modulation
  • RF Surveys and Planning
  • Radio Wave Propagation and Modeling
  • Frequency Planning
  • Traffic Dimensioning
  • Cell Planning Principals
  • Coverage Analysis
  • RF Optimization
  • RF Benchmarking
  • RF Performance
  • RF Safety
  • RF Simulation
  • RF Testing
  • RF System Integration and Measurements

Planning of Radio Networks

  • Advanced topics in cell planning
  • Advanced topics in RF planning and architecture
  • Voice and data traffic engineering
  • Cellular and RAN optimization
  • Overview of 1G, 2G, 3G, 4G/LTE, 5G and 6G wireless and mobile communications
  • Microwave and mmWave systems
  • RF modeling and simulation
  • RF measurements
  • Basic radar systems
  • Phased-array systems
  • RF trends

Advanced RF Systems Concepts and Designs

  • RF Signals and systems
  • Fundamentals of digital communication for wireless and RF systems
  • RF parameters
  • RF passive and active components
  • RF devices
  • RF noise and system impairments
  • RF system design for wireless and mobile communications
  • Overview OFDM/OFDMA and 4G/5G and 6G systems
  • Overview of MIMO and MU-MIMO for 4G/5G and 6G systems
  • Microwave transmission engineering
  • Optional modules; Software Defined Radio (SDR) and TDLs

RF and Microwave Systems Simulation, Testing and Feasibility Analysis

  • Design of high-quality RF and microwave communication systems
  • RF planning
  • Wi-Fi
  • Cellular networks including 2G GSM, 3G UMTS, 4G LTE, 5G and 6G
  • mmWave
  • Radar
  • Satellite Communications, GPS, VSAT
  • Two-way radio
  • Point-to-point microwave
  • Point-to-Multi-Point Radio Links
  • Public Safety
  • RF Testing
  • RF modeling and simulation
  • Link budget analysis
  • RF and microwave feasibility analysis

VHF/UHF/Microwave/mmWave/Sub THz Radio Propagation

  • Estimating Path Loss
  • Free Space Propagation
  • Path Loss on Line of Sight Links
  • Diffraction and Fresnel Zones
  • Ground Reflections
  • Effects of Rain, Snow and Fog
  • Path Loss on Non-Line of Sight Paths
  • Diffraction Losses
  • Attenuation from Trees and Forests
  • General Non-LOS Propagation Models

RF Optimization Principles

  • Site Acquisition
  • Design, analysis and optimization of wireless networks
  • Verification of network deployments for wireless networks
  • RF engineering principals
  • Good quality network and services
  • Network planning resources
  • Link budgets, scheduling and resource allocation
  • Preparation and Report generation
  • Real-time coverage maps
  • True-up RF modeling software

RF System Optimization

  • RF coverage and service performance measurements
  • System Setting
  • Initial optimization testing of installed networks
  • Antenna and Transmission Line Considerations
  • System field-testing and parameter optimization
  • Functional testing and optimization for implemented sites
  • Test plan development
  • System drive test and data analysis
  • System parameter settings and interference control

Key RF Performance Indicators

  • FER, Mobile Receive Power, Ec/Io, Mobile Transmit Power
  • System accessibility analysis
  • System parameter optimization
  • Regression analysis to measure benefits
  • Frequency/PN offset planning
  • Self-generated system interference
  • Cell site integration
  • Construction coordination
  • Equipment installation/antenna system verification
  • RF parameter datafills
  • Radio testing
  • Initial drive testing
  • Performance monitoring
  • Site migration planning and testing
  • ERP changes
  • Orientation changes

RF Troubleshooting

  • Safety
  • Basic troubleshooting steps
  • Signal tracing
  • Signal injection
  • Lead dress
  • Heat sinks

Labs and Calculations

  • Wireless Network Link Analysis
  • System Operating Margin (SOM)
  • Free Space Loss
  • Freznel Clearance Zone
  • Latitude/Longitude Bearing
  • Microwave Radio Path Analysis
  • Line-of-Sight Path Analysis
  • Longley-Rice Path Loss Analysis
  • United States Elevation Analysis
  • Parabolic Reflector Gain and Focal Point Calculator
  • Urban Area Path Loss
  • Antenna Up/Down Tilt Calculator
  • Distance & Bearing Calculator
  • Omnidirectional Antenna Beamwidth Analysis
  • Return Loss Calculator
  • Knife Edge Diffraction Loss Calculator
  • Scattering: gamma in/out from s-parameters
  • Lumped Component Wilkinson Splitter / Combiner Designer
  • Pi & Tee Network Resistive Attenuation Calculator
  • RF Safety Compliance Calculation
  • Microstripline Analysis & Design
  • Calculating Phase Line Length
  • 3-Pole Butterworth Characteristic Bandpass Filter Calculation
  • RF Pi Network Design
  • PLL 3rd Order Passive Loop Filter Calculation
  • Antenna Isolation Calculator

Radio frequency engineering helps drive the world across many applications in both the public and private sectors.

It’s amazing how far we’ve come in such a short time, and there is no sign of the demand for advanced RF engineering technologies slowing down.

Private companies, governments and militaries around the world are competing to have the latest in radio frequency innovation.

RF engineering’s role in 5G technology is well documented and is expected to increase as standalone 5G becomes common place. By 2027, it’s a safe bet that we can expect 5G networks to have been up and running for some time, and consumer expectations for mobile speed and performance will be radically higher than today.

With more and more people embracing smartphones around the world, the demand for data will continue to rise, and legacy bandwidth ranges, which run below 6GHZ, will simply not be sufficient to meet this challenge.

RF engineering and 5G networks will play an integral part in speeding up wireless communications, perfecting virtual reality, and connecting billions of devices we use today. Electronics, wearable devices, robotics, sensors, self-driving vehicles and more will be connected through the Internet of Things pushed on by RF engineering principles.

The demand for professionals in the RF engineering field has never been greater.

Some of the responsibilities of RF engineer include ensuring RF test equipment is calibrated to industry standards as well as analyzing RF broadcasting equipment and suggesting improvements. Other common jobs:

  • Testing the performance of existing wireless networks
  • Ensuring regulatory standards are met
  • Conducting laboratory tests on RF equipment
  • Using computer software to design RF installations for new wireless networks
  • Troubleshooting network issues

Today’s ideal RF engineer has experience with critical components of a wireless communications network and understands that the primary purpose of RF is to deliver data between two points while providing quality customer experience. These critical components include:

  • Antenna
  • RF front end module, which includes amplification, filtering and switching
  • RF transceiver signal processor

Most experts in this area predict that the demand for qualified RF engineers will continue to grow across all segments of the supply chain from carrier to chip manufactures. This in large part is due to the exponential growth of sensors related to IoT (wearables, home automation, connected cars, etc.)

Also, for RF engineers employed at telecom service providers, the need to find service disrupting interference is more critical than ever. As the spectrum becomes more crowded, and more relied upon for critical applications, telecoms need to ensure that connectivity is fast, stable, and uninterrupted.

May
20
Mon
PPAP Training | Production Part Approval Process @ Tonex Site
May 20 @ 9:00 am – May 21 @ 4:00 pm
Print Friendly, PDF & Email

PPAP Training course, Production Part Approval Process Training discusses the requirements, procedures and protocols, and practices and activities specified by the PPAP manual.

ppap

Through this PPAP training, students prepare a sample PPAP package for submission, from the beginning to the end.

What is PPAP?

Production Part Approval Process (PPAP) is an analysis management to measure the capability of the system. Once the PPAP protocol is obeyed, the number of dysfunctional parts will reduce down to below a handful per million parts produced. This conclusive process will evaluate the performance of all the processes and steps involved in producing parts and it will assure that all the specifications and requirements are met.

This process assesses how well the processes used to produce parts will meet the specifications. Participants who complete this course They also know how to conduct and evaluate the processes, and

Added Value of the PPAP Training:

  • Learn how to evaluate a PPAP report
  • Review and prepare PPAP forms
  • Learn how to submit PPAP reports
  • Discuss the specific needs for part approval records or sample retention
  • Know when/where PPAP submissions are required
  • Recognize various levels of PPAP submission
  • Understand where and how the PPAP submissions can be incorporated into the APQP
  • Understand the statistics of process capability, process capability index, performance capability, and performance capability index (Cp, Cpk, Pp, and Ppk.)
  • Learn how to present the outcomes to the customer in a high-qualified format align with the customer’s expectation.

TONEX PPAP Training Will Also Cover:

  • The concepts and principals of the PPAP
  • All the components of PPAP
  • Review all the required documentation for each submission level
  • Real-life examples and case studies

TONEX PPAP Training Methodology

TONEX PPAP training course is in the form of an interactive workshop. The seminar includes many in-class activities including hands on exercises, case studies and workshops. During the PPAP training course, students can bring in their own sample projects and through our coaching, develop their own PPAP.

PPAP training, Production Part Approval Process Training

Audience

Production Part Approval Process Training, PPAP Training is a 2-day course designed for:

  • Internal auditors
  • Second-party auditors
  • The ISO/TS 16949 implementation team
  • Cross-functional team members
  • Project Managers, Engineers and Quality Department Personnel
  • All individuals involved in submitting PPAP report
  • All individuals involved in product quality planning activities
  • All individuals interested in learning more about PPAP

Training Objectives

Upon the completion of PPAP training course, the attendees are able to:

  • Understand the goals and objectives of PPAP
  • Understand the phases of PPAP
  • Explain why PPAP is applied
  • Discuss all components of the PPAP
  • Understand the customer specific requirements for submitting PPAP
  • Discuss the evidence required by customers to submit PPAP
  • Complete all phases and steps of a PPAP
  • Define the scope and purposes of the PPAP
  • Follow all the PPAP submission levels
  • Evaluate all PPAP reports
  • Prepare and fill out PPAP forms
  • Understand how to incorporate the PPAP submissions into APQP
  • Articulate and discuss the results of the PPAP

Course Outline

Overview of PPAP

  • PPAP definition
  • The purpose of PPAP
  • When is a PPAP required?
  • Benefits of PPAP submission
  • What are the elements of a PPAP submission?
  • What are the levels of PPAP?
  • What is “Significant Production Run”?
  • Run @ Rate
  • Definition of risk
  • PPAP status
  • Authorized Engineering Change Documents

PPAP Requirements

  • AIAG requirements
  • Design Records
  • Engineering Change Documents
  • Customer Engineering Approval, if required
  • Design Failure Modes & Effects Analysis (DFMEA) Process Flow Diagram
  • Process Failure Modes & Effects Analysis (PFMEA) Control Plan
  • Measurement Systems Analysis (MSA) Dimensional Results
  • Qualified Laboratory Documentation
  • Appearance Approval Report (AAR)
  • Sample Product
  • Master Sample
  • Checking Aids
  • Customer-Specific Requirements
  • Part Submission Warrant (PSW)
  • Internal, costumed, requirements

PPAP Levels

  • Level 1 – Warrant only and Appearance Approval Report as requested submitted to the customer
  • Level 2 – Warrant with samples and limited supporting data submitted to the customer
  • Level 3 – Warrant with product samples and complete supporting data submitted to customer
  • Level 4 – Warrant and other requirements as defined by the customer
  • Level 5 – Warrant with product samples and complete supporting data reviewed at the supplier’s manufacturing location
  • PPAP level table
  • New parts levels
  • Part changes levels

Production Warrant

  • Definition
  • Purpose
  • When to use it
  • Reviews checklist

Process Flow Diagram (PFD)

  • What is PFD
  • Purpose
  • Symbols
  • PFD example
  • Reviewers checklist

Process FMEA (PFMEA)

  • Origin of FMEA
  • Definition
  • Objectives
  • When to use it
  • Steps of PFMEA procedure
  • Ratings
    • Severity
    • Occurrence
    • Detection
  • Analyzing the results
  • PFMEA exercise

Control Plan

  • Definition
  • Purposes
  • Application
  • Tool interaction
  • Phases
  • Process, tools, characteristics
  • Specifications, Measurement, Sample Size & Frequency
  • Control Method, Reaction Plan

Measurement Style Analysis (MSA)

  • Definition
  • Objective
  • Application
  • Who needs to be involved?
  • Attribute
  • Variable
  • Observed variation
  • Resolution
    • Error in resolution
    • Possible causes
  • Repeatability
  • Reproducibility
    • Error in resolution
    • Possible causes
  • Gage R&R study
  • Gage R&R steps
  1. Select 10 items that represent the full range of long-term process variation
  2. Identify the evaluators
  3. Calibrate the gage or verify that the last calibration date is valid
  4. Record data in the Gage R&R worksheet in the PPAP Playbook
  5. Have each appraiser assess each part 3 times (trials – first in order, second in reverse order, third random)
  6. Input data into the Gage R&R worksheet
  7. Enter the number of operators, trials, samples and specification limits
  8. Analyze data in the Gage R&R worksheet
  9. Assess MSA trust level
  10. Take actions for improvement if necessary
  • Gage R&R case study
  • Reviewer’s checklist

Dimensional Results

  • What is it?
  • Objectives
  • When is it applied?
  • Acceptance criteria
  • Reviewer’s checklist

Material & Performance Test Results

  • Material test results
  • Module test results
  • Performance test results

Initial Process Study

  • Definition
  • Purposes
  • Applications
  • Steps for Determining Process Capability
  1. Choose the product or process characteristic
  2. Validate the specification limits
  3. Validate the measurement system
  4. Collect data
  5. Analyze data characteristics
  6. Analyze process stability
  7. Calculate process capability
  • Variable data
  • Capability indices
    • CpK
    • PpK
    • Cp vs CpK
  • Reviewer’s checklist

Appearance Approval Report

  • Definition
  • Objective
  • Application
  • Sample report

Sample Production Parts

  • Definition
  • Purpose
  • Application
  • Labeling
  • Part label example

Completing the PPAP Submission

  • Electronic submission
  • Element 1 Part Submission Warrant
  • Element 2 Design Records and & Bubbled Part Prints
  • Element 3 Approved Engineering Change Documentation
  • Element 4 Customer Engineering Approvals
  • Element 5 Design FMEA (DFMEA)
  • Element 6 Process Flow Diagrams
  • Element 7 Process FMEA (PFMEA)
  • Element 8 Control Plan
  • Element 9 Measurement System Analysis (MSA)
  • Element 10 Dimensional Report
  • Element 11 Material, Performance Test Results
  • Element 12 Initial Process Study (Cpk/Ppk)
  • Element 13 Qualified Lab Documentation
  • Element 14 Appearance Approval report
  • Element 15 Sample Parts
  • Element 16 Master Sample
  • Element 17 Checking Aids
  • Element 18A Tooling Information Form
  • Element 18B Packaging Form 

Discussion for Successful Implementation

TONEX Hands-On Workshop Sample PPAP

  • Choose one case to conduct a PPAP on
  • Prepare all the elements of the report
  • Prepare required forms for submitting PPAP
  • Use data to provide specific requirements for part approval records and sample retention
  • Go through all the PPAP levels
  • Perform required statistics analysis including Cp, CpK, or PpK
  • Ensure the submission meet the customer’s specific requirements
  • Present your final report to an imaginary customer