2018 Training

Introduction to Overcurrent Protection – Theory and Application

8:30 a.m. – 3 p.m. Lunch Provided

This class is designed to give an overview of overcurrent protective theory and application of products.  It’s intended to give the participant a starting base of understanding faults on systems and how the equipment should be used and coordinated to improve reliability.  The class is a good starting point to continuing on to our 3-day seminar.

Course Outline:
  • Intro & Objectives – What is coordination
  • Reliability – Discussion of indices and how different utilities approach
  • Recloser Applications
  • Momentary Outages
  • Fuse Characteristics
  • Recloser – Fuse Coordination
  • Recloser – Recloser Coordination
  • Relay – Recloser Coordination
  • Inrush Currents
  • Transformer Protection
Instructor:  John Heath, Application Engineer – Eaton

John has worked for Eaton (formerly Cooper Power Systems) for just over 20 years in varying roles including Sales, Marketing and Engineering.  His current position based out of Waukesha, WI, is as an Application Engineer for the Central Sales region supporting the products and services that Eaton offers to the electric utilities.

Assessing Your Network the Way Your Adversaries Do

8 a.m. – 5 p.m. Lunch Provided

Attendees should bring a laptop

Understand reconnaissance techniques and tools so you can profile your network the same way an adversary would. Learn how to hunt for vulnerabilities in embedded systems within a network to identify places a threat actor might try to use to maintain access while hiding from traditional threat detection systems/techniques. Learn how to hunt for vulnerabilities in web applications that a bad actor might use to gain access or move laterally within your network. Learn how to take all of the material presented today and apply it to hunting an advanced actor that is utilizing multiple techniques for gaining access and lateral movement.

Course Outline:
  • Introduction to Vulnerability Assessment
  • Hands on Lab
  • Vulnerability Assessment of Embedded Systems
  • Hands on Lab
  • Lunch
  • Vulnerability Assessment of Web Applications
  • Hands on Lab
  • Advanced Hunting
  • Hands on Lab
  • Dismiss
Instructor: David Maynor & Joe Marshall

David Maynor leads the Cisco Talos EMEA Threat Intelligence and Interdiction team. Mr. Maynor builds relationships with key organization and intelligence partners, proactively hunting for and disrupting advanced adversaries. Mr. Maynor is an entrepreneur and technical expert with over 20 years experience in research, systems, offensive consulting, and a variety of other security related positions in the private sector. Joe Marshall is an industrial control systems and embedded systems expert from Cisco Talos. He specializes in critical infrastructure and device security for our electric and gas grids.