Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
May
20
Mon
PPAP Training | Production Part Approval Process @ Tonex Site
May 20 @ 9:00 am – May 21 @ 4:00 pm
Print Friendly, PDF & Email

PPAP Training course, Production Part Approval Process Training discusses the requirements, procedures and protocols, and practices and activities specified by the PPAP manual.

ppap

Through this PPAP training, students prepare a sample PPAP package for submission, from the beginning to the end.

What is PPAP?

Production Part Approval Process (PPAP) is an analysis management to measure the capability of the system. Once the PPAP protocol is obeyed, the number of dysfunctional parts will reduce down to below a handful per million parts produced. This conclusive process will evaluate the performance of all the processes and steps involved in producing parts and it will assure that all the specifications and requirements are met.

This process assesses how well the processes used to produce parts will meet the specifications. Participants who complete this course They also know how to conduct and evaluate the processes, and

Added Value of the PPAP Training:

  • Learn how to evaluate a PPAP report
  • Review and prepare PPAP forms
  • Learn how to submit PPAP reports
  • Discuss the specific needs for part approval records or sample retention
  • Know when/where PPAP submissions are required
  • Recognize various levels of PPAP submission
  • Understand where and how the PPAP submissions can be incorporated into the APQP
  • Understand the statistics of process capability, process capability index, performance capability, and performance capability index (Cp, Cpk, Pp, and Ppk.)
  • Learn how to present the outcomes to the customer in a high-qualified format align with the customer’s expectation.

TONEX PPAP Training Will Also Cover:

  • The concepts and principals of the PPAP
  • All the components of PPAP
  • Review all the required documentation for each submission level
  • Real-life examples and case studies

TONEX PPAP Training Methodology

TONEX PPAP training course is in the form of an interactive workshop. The seminar includes many in-class activities including hands on exercises, case studies and workshops. During the PPAP training course, students can bring in their own sample projects and through our coaching, develop their own PPAP.

PPAP training, Production Part Approval Process Training

Audience

Production Part Approval Process Training, PPAP Training is a 2-day course designed for:

  • Internal auditors
  • Second-party auditors
  • The ISO/TS 16949 implementation team
  • Cross-functional team members
  • Project Managers, Engineers and Quality Department Personnel
  • All individuals involved in submitting PPAP report
  • All individuals involved in product quality planning activities
  • All individuals interested in learning more about PPAP

Training Objectives

Upon the completion of PPAP training course, the attendees are able to:

  • Understand the goals and objectives of PPAP
  • Understand the phases of PPAP
  • Explain why PPAP is applied
  • Discuss all components of the PPAP
  • Understand the customer specific requirements for submitting PPAP
  • Discuss the evidence required by customers to submit PPAP
  • Complete all phases and steps of a PPAP
  • Define the scope and purposes of the PPAP
  • Follow all the PPAP submission levels
  • Evaluate all PPAP reports
  • Prepare and fill out PPAP forms
  • Understand how to incorporate the PPAP submissions into APQP
  • Articulate and discuss the results of the PPAP

Course Outline

Overview of PPAP

  • PPAP definition
  • The purpose of PPAP
  • When is a PPAP required?
  • Benefits of PPAP submission
  • What are the elements of a PPAP submission?
  • What are the levels of PPAP?
  • What is “Significant Production Run”?
  • Run @ Rate
  • Definition of risk
  • PPAP status
  • Authorized Engineering Change Documents

PPAP Requirements

  • AIAG requirements
  • Design Records
  • Engineering Change Documents
  • Customer Engineering Approval, if required
  • Design Failure Modes & Effects Analysis (DFMEA) Process Flow Diagram
  • Process Failure Modes & Effects Analysis (PFMEA) Control Plan
  • Measurement Systems Analysis (MSA) Dimensional Results
  • Qualified Laboratory Documentation
  • Appearance Approval Report (AAR)
  • Sample Product
  • Master Sample
  • Checking Aids
  • Customer-Specific Requirements
  • Part Submission Warrant (PSW)
  • Internal, costumed, requirements

PPAP Levels

  • Level 1 – Warrant only and Appearance Approval Report as requested submitted to the customer
  • Level 2 – Warrant with samples and limited supporting data submitted to the customer
  • Level 3 – Warrant with product samples and complete supporting data submitted to customer
  • Level 4 – Warrant and other requirements as defined by the customer
  • Level 5 – Warrant with product samples and complete supporting data reviewed at the supplier’s manufacturing location
  • PPAP level table
  • New parts levels
  • Part changes levels

Production Warrant

  • Definition
  • Purpose
  • When to use it
  • Reviews checklist

Process Flow Diagram (PFD)

  • What is PFD
  • Purpose
  • Symbols
  • PFD example
  • Reviewers checklist

Process FMEA (PFMEA)

  • Origin of FMEA
  • Definition
  • Objectives
  • When to use it
  • Steps of PFMEA procedure
  • Ratings
    • Severity
    • Occurrence
    • Detection
  • Analyzing the results
  • PFMEA exercise

Control Plan

  • Definition
  • Purposes
  • Application
  • Tool interaction
  • Phases
  • Process, tools, characteristics
  • Specifications, Measurement, Sample Size & Frequency
  • Control Method, Reaction Plan

Measurement Style Analysis (MSA)

  • Definition
  • Objective
  • Application
  • Who needs to be involved?
  • Attribute
  • Variable
  • Observed variation
  • Resolution
    • Error in resolution
    • Possible causes
  • Repeatability
  • Reproducibility
    • Error in resolution
    • Possible causes
  • Gage R&R study
  • Gage R&R steps
  1. Select 10 items that represent the full range of long-term process variation
  2. Identify the evaluators
  3. Calibrate the gage or verify that the last calibration date is valid
  4. Record data in the Gage R&R worksheet in the PPAP Playbook
  5. Have each appraiser assess each part 3 times (trials – first in order, second in reverse order, third random)
  6. Input data into the Gage R&R worksheet
  7. Enter the number of operators, trials, samples and specification limits
  8. Analyze data in the Gage R&R worksheet
  9. Assess MSA trust level
  10. Take actions for improvement if necessary
  • Gage R&R case study
  • Reviewer’s checklist

Dimensional Results

  • What is it?
  • Objectives
  • When is it applied?
  • Acceptance criteria
  • Reviewer’s checklist

Material & Performance Test Results

  • Material test results
  • Module test results
  • Performance test results

Initial Process Study

  • Definition
  • Purposes
  • Applications
  • Steps for Determining Process Capability
  1. Choose the product or process characteristic
  2. Validate the specification limits
  3. Validate the measurement system
  4. Collect data
  5. Analyze data characteristics
  6. Analyze process stability
  7. Calculate process capability
  • Variable data
  • Capability indices
    • CpK
    • PpK
    • Cp vs CpK
  • Reviewer’s checklist

Appearance Approval Report

  • Definition
  • Objective
  • Application
  • Sample report

Sample Production Parts

  • Definition
  • Purpose
  • Application
  • Labeling
  • Part label example

Completing the PPAP Submission

  • Electronic submission
  • Element 1 Part Submission Warrant
  • Element 2 Design Records and & Bubbled Part Prints
  • Element 3 Approved Engineering Change Documentation
  • Element 4 Customer Engineering Approvals
  • Element 5 Design FMEA (DFMEA)
  • Element 6 Process Flow Diagrams
  • Element 7 Process FMEA (PFMEA)
  • Element 8 Control Plan
  • Element 9 Measurement System Analysis (MSA)
  • Element 10 Dimensional Report
  • Element 11 Material, Performance Test Results
  • Element 12 Initial Process Study (Cpk/Ppk)
  • Element 13 Qualified Lab Documentation
  • Element 14 Appearance Approval report
  • Element 15 Sample Parts
  • Element 16 Master Sample
  • Element 17 Checking Aids
  • Element 18A Tooling Information Form
  • Element 18B Packaging Form 

Discussion for Successful Implementation

TONEX Hands-On Workshop Sample PPAP

  • Choose one case to conduct a PPAP on
  • Prepare all the elements of the report
  • Prepare required forms for submitting PPAP
  • Use data to provide specific requirements for part approval records and sample retention
  • Go through all the PPAP levels
  • Perform required statistics analysis including Cp, CpK, or PpK
  • Ensure the submission meet the customer’s specific requirements
  • Present your final report to an imaginary customer
Aug
19
Mon
Certified Space Security Specialist Professional (CSSSP) Training – Level I (Specialist) @ Live online
Aug 19 @ 9:00 am – Aug 22 @ 4:00 pm
Print Friendly, PDF & Email

Upcoming course: CSSSP Level 1 (Specialist)

  • Length: 4 Days
  • When: August 19-21 2024 (Live Online)
  • Where: Dallas, TX.

Learn more >>>

 

Certified Space Security Specialist Professional (CSSSP): Level 1

We are developing an overwhelming reliance on space technology – a trend not lost on cybercriminals.

This growing dependency on satellites and the like, puts organizations in a precarious position. In industries like transport and logistics, location data is routinely recorded in real time from GPS satellites and sent to back offices to allow teams to track drivers and assets.

Organizations which have remote outposts or oceangoing ships can’t exactly get online via a mobile or cable network, so they have to use communications satellites instead. On top of that, satellites store sensitive information they collect themselves, which might include images of sensitive military installations or critical infrastructure.

Of course all of these factors make for attractive targets to various types of cybercriminal. Although residing in the vacuum of deep space makes them less vulnerable to physical attacks, space-based systems are still ultimately controlled from computers on the ground. At issue is that data is transmitted by and stored on orbiting satellites more and more every year. Therefore, bad actors have them in their sites due to the high value of data stored on satellites and other space systems.

Particularly disturbing, space security specialists now tell us that cyber attackers don’t even need to be expert hackers from space-faring nations. And neither do they need direct, physical access to control systems belonging to organizations like NASA, ESA or Roscosmos.

For NASA, reliable communication between ground and spacecraft is central to mission success, especially in the realms of digital communication (data and command links). Unfortunately, these light communication links are vulnerable to malicious intrusion. If terrorists or hackers illegally listen to, or worse, modify communication content, disaster can occur.

Especially worrisome are the consequences of a nuclear powered spacecraft under control of a hacker or terrorist, which could be devastating. Obviously, all communications to and between spacecraft must be extremely secure and reliable.

Military satellites and space systems are also vulnerable since almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more. Aging IT systems, supply-chain vulnerabilities and other technological issues that leave military satellite communications open to disruption and tampering also need to be addressed according to space security personnel.

While navigational satellite systems like GPS (US), GLONASS (Russia) and Beidou (China) might not be the easiest targets to hack, there are dozens of other satellite owners of global communications. Additionally, thousands more companies rent bandwidth from satellite owners for selling services like satellite TV, phone and internet. Then there are hundreds of millions of businesses and individuals around the world which use them.

All told, it’s a pretty large potential attack surface which is connected directly to the internet.

Certified Space Security Specialist Professional (CSSSP) Course by Tonex

Although some of these issues are no different from other industries, space systems are met with a unique confluence of cybersecurity risks that complicates the sector’s remediation capabilities.

Governments, critical infrastructure and economies rely on space-dependent services—for example, the Global Positioning System (GPS)—that are vulnerable to hostile cyber operations. However, few space-faring states and companies have paid sufficient attention to the cybersecurity of satellites in outer space, creating a number of risks.

Accelerate your space cybersecurity career with the CSSSP certification.

Certified Space Security Specialist Professional (CSSSP) certification is ideal for space and security practitioners, analysts, engineers, managers and executives interested in proving their knowledge across space security practices and principles.

The CSSSP® (Certified Space Systems Security Professional) qualification is one of the most respected certifications in the space security industry, demonstrating an advanced knowledge of space cybersecurity.

Earning the CSSSP proves you have what it takes to effectively design, implement and manage a cybersecurity space program. With a CSSSP, you validate your expertise and become a Space Cyber member, unlocking a broad array of exclusive resources, educational tools, seminars, conferences and networking opportunities.

CSSSP certification also explores factors that led to the space sector’s poor cybersecurity posture, various cyberattacks against space systems, and existing mitigation techniques employed by the sector.

Analyzing the current state of the industry along with security practices across similar sectors, several security principles for satellites and space assets are proposed to help reorient the sector toward designing, developing, building and managing cyber secure systems. These security principles address both technical and policy issues in order to address all space system stakeholders.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

The CSSSP qualification has been developed and maintained jointly by SpaceCyber.org and Tonex.

CSSSP Domains (CBK) are:

  1. Space Systems Engineering
  2. Cybersecurity Principles for Space Systems
  3. Space Cybersecurity Foundation
  4. Space Security Planning, Policy and Leadership
  5. Space Security Architecture and Operation
  6. Space Threat and Vulnerability Analysis and Assessment
  7. Space Ethical Hacking, Penetration Testing and Defenses
  8. Space Intrusion Detection Analysis
  9. Space Network Penetration Testing and Ethical Hacking
  10. Space Embedded Systems Cybersecurity
  11. Space Defensible Security Architecture and Engineering
  12. Space Forensic Analysis
  13. Space Network and System Reverse Engineering
  14. Space Incident Response and Network Forensics
  15. MIL-STD-1553 Cybersecurity
  16. ARINC 429 Cybersecurity
  17. Artificial Intelligence(AI), Machine Learning (ML) and Deep Learning (DL) Integration with Space Cybersecurity
  18. Blockchain Integration with Space Cybersecurity
  19. Sensor Fusion Integration with Space Cybersecurity
  20. Electronic Warfare Capabilities in Space
  21. Use of Electromagnetic Pulses or Directed Energy (laser beams or microwave-bombardments)
  22. Space System Survivability and US War Fighting
  23. Electronic Warfare and Aircraft Survivability
  24. Cyber Warfare Capabilities in Space Missions
  25. Counter Communications System
  26. Electronic and Cyber Warfare in Outer Space
  27. Counter-space Capabilities
  28. Types of Counter-space Technology
  29. Measures and Their effectiveness in Addressing Counter-space Capabilities

For more information, questions, comments, contact us. 

Future related programs to Certified Space Security Specialist Professional (CSSSP) Certification are:

  • Space Cyber Infrastructure Specialist (SCIS)
  • Space Cyber Engineering Specialist (SCES)
  • Space Cyber Operations Specialist (SCOS)
  • Space Cyber Technology Professional (SCTP)
  • Space Cyber Operations Manager (SCOM)
  • Space Cyber Infrastructure Expert (SCIE)
  • Space Cyber Domain Expert (SCDE)
  • Space Cyber Manager (SCM)
  • Space Cyber Authority Expert (SCAE)
  • Space Cyber Application Specialist (SCAS)
  • Space Cyber Leadership Certificate (SCLC)