An Interactive 5-Day Training Course

IED Protection Tools and Cyber Security

Defending Against Attacks on the Power Grid

22 - 26 Jun 2026
Dubai
| $5950
21 - 25 Sep 2026
Dubai
| $5950

Introduction

This training course addresses the critical need for power system professionals to master both protection applications and cybersecurity aspects of Intelligent Electronic Devices (IEDs), which form the backbone of modern power grid protection. To meet the energy and power needs of the modern world, power grid operators increasingly use an array of IED protection that include protective relays, circuit brakers, capacitor bank switches, recloser controllers and voltage regulators with high intelligence and increased levels of connectivity. As power systems become increasingly interconnected and digitalized, understanding the intricate relationship between protection functionality and cybersecurity is essential for maintaining grid reliability and security.

The training course delivers comprehensive, hands-on training that bridges the gap between traditional protection engineering and modern cybersecurity requirements. Participants will gain practical experience with IED configuration, protection scheme design, and security implementation through real-world scenarios and laboratory exercises. The training course combines advanced protection concepts with cutting-edge cybersecurity practices, ensuring participants can implement and maintain secure, reliable protection systems that meet both operational and security requirements in today's evolving power grid environment.

This GLOMACS IED Protection Tools and Cyber Security training course will highlight:

Key Learning Outcomes

At the end of this training course, you will learn to:                               

Training Methodology

This training course will utilize various proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. This includes many examples to clarify the concepts, standards, and communication protocols and also a set of practical breakout exercises to enable delegates working in groups active participation in discussions and sharing ideas and experiences towards the completions of the exercises.

IED Protection Tools and Cyber Security

Who Should Attend?

This specialized training course empowers organizations to enhance their power system reliability and cybersecurity through comprehensive understanding of modern IED protection and security practices in the following ways:

  • Improve power system reliability through better configuration and maintenance of protection systems
  • Reduce cybersecurity risks through enhanced protection system security implementation
  • Minimize system downtime by improving incident response and recovery capabilities
  • Achieve compliance with current protection, communication protocols, cybersecurity standards, and best practices
  • Optimize investment in protection systems through better specification and implementation
  • Strengthen organizational resilience through better-trained and more competent technical staff

Learning Journey Breakdown

  • Evolution of protection systems: From electromechanical to digital
  • IED architecture and components
  • Protection functions and characteristics
  • Communication protocols (IEC 61850, DNP3)
  • Real-time data processing and decision making
  • Setting and configuration basics
  • Distance protection implementation
  • Differential protection schemes
  • Advanced protection functions
  • Protection coordination principles
  • Fault recording and analysis
  • Network architecture for substations
  • IEC 61850 implementation
  • GOOSE and sampled values
  • Time synchronization
  • System integration challenges
  • Performance requirements
  • IEC 61850 configuration
  • Threat landscape for power system IEDs
  • Security standards (IEC 62443, IEC 62351, IEEE 1686)
  • Access control and authentication
  • Secure communication protocols
  • Security event monitoring
  • Firmware management and updates
  • Security testing methods
  • Defense in depth strategies
  • Security incident response
  • Patch management for IEDs
  • Backup and recovery procedures
  • Maintenance and testing procedures
  • Security assessment methods
  • Integration with security operations

Ready to Take the Next Step?

Reserve your slot today and start your learning journey with us.

Register Now

Got a Question?

Reach out to us anytime — we're here to help and guide you.

Contact Us

Related Courses

Course Finder

Quickly search and discover the most relevant governance courses for your needs.