IED Protection Tools and Cyber Security

IED Protection Tools and Cyber Security

Defending Against Attacks on the Power Grid

(36)
NASBA
Course Schedule
Register
Training course in IED Protection Tools and Cyber Security in 22-26 Jun 2026 - Dubai
22-26 Jun 2026
Dubai
$5,950
Register
Register
Training course in IED Protection Tools and Cyber Security in 21-25 Sep 2026 - Dubai
21-25 Sep 2026
Dubai
$5,950
Register

Course Overview

This training course addresses the critical need for power system professionals to master both protection applications and cybersecurity aspects of Intelligent Electronic Devices (IEDs), which form the backbone of modern power grid protection. To meet the energy and power needs of the modern world, power grid operators increasingly use an array of IED protection that include protective relays, circuit brakers, capacitor bank switches, recloser controllers and voltage regulators with high intelligence and increased levels of connectivity. As power systems become increasingly interconnected and digitalized, understanding the intricate relationship between protection functionality and cybersecurity is essential for maintaining grid reliability and security.

The training course delivers comprehensive, hands-on training that bridges the gap between traditional protection engineering and modern cybersecurity requirements. Participants will gain practical experience with IED configuration, protection scheme design, and security implementation through real-world scenarios and laboratory exercises. The training course combines advanced protection concepts with cutting-edge cybersecurity practices, ensuring participants can implement and maintain secure, reliable protection systems that meet both operational and security requirements in today's evolving power grid environment.

This GLOMACS IED Protection Tools and Cyber Security training course will highlight:

  • Master practical IED configuration and testing techniques using industry-standard tools
  • Develop expertise in implementing complex protection schemes while maintaining cybersecurity
  • Gain experience with IEC 61850 communications and security standards (IEC 62443, IEC 62351, IEEE 1686) 
  • Learn to integrate protection functions with modern cybersecurity requirements
  • Acquire practical skills in security assessment and incident response for protection systems

What are the Goals?

At the end of this training course, you will learn to:                               

  • Implement advanced protection schemes using modern IEDs
  • Analyze cyber threats to power system IEDs
  • Design secure communication architectures and cybersecurity controls for protection systems
  • Develop integrated protection and security testing procedures
  • Apply effective incident response and recovery strategies

Who is this Training Course for?

This GLOMACS training course is designed for professionals involved in the design, implementation, and maintenance of power system protection and control systems. It is particularly valuable for those working with modern IED-based protection systems and concerned with maintaining both reliability and security, such as:

  • Protection and Control Engineers
  • Substation Automation Specialists
  • Power System Engineers and Technicians
  • Electrical Engineers working with protection systems
  • Cybersecurity Professionals in power utilities
  • SCADA and Control System Engineers
  • Maintenance and Commissioning Engineers
  • System Integration Specialists
  • Technical Consultants and Field Service Engineers
  • Grid Operations Personnel

The training course content is structured to accommodate participants from various sectors including:

  • Electric Power Utilities
  • Industrial Power Systems
  • System Integrators
  • Engineering Consultancies
  • Equipment Manufacturers
  • Infrastructure Operators

How will this Training Course be Presented?

This training course will utilize various proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. This includes many examples to clarify the concepts, standards, and communication protocols and also a set of practical breakout exercises to enable delegates working in groups active participation in discussions and sharing ideas and experiences towards the completions of the exercises.

Course Outline

Day 1
  • Evolution of protection systems: From electromechanical to digital
  • IED architecture and components
  • Protection functions and characteristics
  • Communication protocols (IEC 61850, DNP3)
  • Real-time data processing and decision making
  • Setting and configuration basics
Day 2
  • Distance protection implementation
  • Differential protection schemes
  • Advanced protection functions
  • Protection coordination principles
  • Fault recording and analysis
Day 3
  • Network architecture for substations
  • IEC 61850 implementation
  • GOOSE and sampled values
  • Time synchronization
  • System integration challenges
  • Performance requirements
  • IEC 61850 configuration
Day 4
  • Threat landscape for power system IEDs
  • Security standards (IEC 62443, IEC 62351, IEEE 1686)
  • Access control and authentication
  • Secure communication protocols
  • Security event monitoring
  • Firmware management and updates
  • Security testing methods
Day 5
  • Defense in depth strategies
  • Security incident response
  • Patch management for IEDs
  • Backup and recovery procedures
  • Maintenance and testing procedures
  • Security assessment methods
  • Integration with security operations

Accreditation

GLOMACS is registered with NASBA as a sponsor of Continuing Professional Education (CPE) on the National Registry of CPE Sponsors. NASBA have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.

All Training Seminars delivered by GLOMACS by default are eligible for CPE Credit.

Would you like to take this course as a team?
Contact Us

Frequently Asked Questions

AI Academy offers a wide range of specialized training courses focused on Artificial Intelligence and emerging technologies. Our courses cover areas such as Machine Learning, Data Science, AI in Business Strategy, Digital Transformation, and Automation, designed to help professionals enhance their technical and strategic capabilities.

Our courses are open to professionals at all career levels — from beginners seeking to understand AI fundamentals to senior executives aiming to integrate AI into organizational strategy. Each course clearly outlines the ideal participant profile to help you choose the best fit for your goals.

You can easily register through our website by selecting your preferred course and completing the online registration form. Once your registration is confirmed, you’ll receive a confirmation email with course details, venue or online access information, and next steps.

Yes. AI Academy offers both online and classroom-based courses to provide flexibility and convenience. The mode of delivery depends on the specific course and its learning objectives, ensuring participants receive an engaging and effective learning experience.

Yes. Upon successful completion of any AI Academy training course, participants receive an official Certificate of Completion, recognizing their professional development and newly acquired AI competencies.

Each course description on our website includes detailed information about the learning outcomes, target audience, and objectives. You can also contact our support team for personalized guidance on selecting a course that aligns with your experience level and career ambitions.

Can’t find what you are looking for?

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam

Contact Us

Get Started Today.

Contact Us