Thursday, February 28, 2013

SCADA Training - Supervisory Control And Data Acquisition

Learn SCADA by attending SCADA Training Course at TONEX

SCADA (Supervisory Control And Data Acquisition) systems also known as  Industrial Control System (ICS) run mission critical infrastructure such as telecom, nuclear plants, manufacturing, oil and gas refining plants, wind and solar power generation, gas pipelines, power grid, water treatment, chemical manufacturing, airports, and transportation.


SCADA Training



The following is a list of the major control components of SCADA:

- Control Server. The control server hosts the DCS or PLC supervisory control software that is designed to communicate with lower-level control devices. The control server accesses subordinate control modules over an ICS network.

- SCADA Server or Master Terminal Unit (MTU) or Master Station. The SCADA Server is the device that acts as the master in a SCADA system. Remote terminal units and PLC devices (as described below) located at remote field sites usually act as slaves.

With SCADA systems, master station receives inputs from remote terminal units (RTU) that are connected to field instrumentation such as process ovens. When polled by the SCADA master, the RTUs transmit data to the central host for processing. SCADA software then logs alarms and displays the data graphically.

Our SCADA instructors have SCADA, SCADA security, Network Security and IT security expertise, a unique combination.

Tuesday, February 26, 2013

TOGAF Certification

TOGAF Certification Authorized by the Open Group



TONEX offers TOGAF 9 Training, a highly interactive learning experience with examples, case studies, simulations, workshops and practice exams.  

TONEX is an accredited TOGAF Certification company by the Open group and provides The Open Group Study Guides plus other homegrown  supplementary materials to prepare students for both Level 1 (Foundation) and Level 2 (Certification) exams.
TOGAF Certification


TONEX has provided TOGAF Certification since 2006 was the first company to offer TOGAF 9.


TONEX can provide and customize TOGAF 9 training to meet your organization’s requirements.


Systems Engineering Management Training - Master Course

Systems Engineering Management Training - Master Course Certificate



Systems Engineering Management Training Course
We are pleased to announce the creation of the Systems Engineering Management Training Master Course. The Systems Engineering Management Training covers all the aspects of Systems Engineering and Management (SEM). It has been designed to meet the need for formalized education in planning, design, engineering and management of increasingly complex systems and projects that involve many interconnected parts between many disciplines.

The program is designed to benefit engineers, systems engineers and managers, as well as other disciplines. 

The course includes 14 modules and 7 workshops.


Friday, February 22, 2013

Mobile App and Device Ethical Hacking




Mobile Ethical Hacking ,  Mobile Applications and Device Security Workshop




To secure mobile devices and application, organization need to establish mobile security policies and enforcement rules.


Android Ethical Hacking 

Learn about mobile devices and mobile applications significant threats, and key principles behind mobile network architecture.

iOS Ethical Hacking Training

Assess the vulnerabilities of the main iOS and Android platforms building blocks :


  • Device Hardware
  • Operating System
  • Application Run-time


Through the workshop, the attendees will learn about

  • Mobile security an mobile security strategy
  • Mobile device and application weaknesses, mobile threat models and mobile security policies
  • Mobile Device Management (MDM)
  • Mobile application and mobile device data authentication, encryption, integrity, and threats
  • Open Web Application Security Project (OWASP)  
  • Mobile application  and Mobile device vulnerability assessment
  • Exploit tools and attacks against mobile devices and tablets including iOS, Android, Blackberry and Windows 
  • Mobile Devices and Infrastructure

Bluetooth Vulnerabilities


Bluetooth Vulnerabilities and Bluetooth Security Mechanisms


Bluetooth is a peer-to-peer network and communication technology and usually lacks centralized administration, security policy and security enforcement infrastructure. 


Bluetooth Training

Bluetooth can be susceptible to a diverse set of security vulnerabilities including identity detection, location tracking, denial of service, unintended control and access of data and voice channels, and unauthorized device control and data access. 


SysML Training - Systems Modeling Language (SysML)

What is SysML? Systems Engineering with the SysML 



We just updated our training material on Model-Based Systems Engineering (MBSE) with the Object Management Group Systems Modeling Language (OMG SysML™). We now include case studies and group project on SysML.

SysML is a general-purpose graphical modeling language for specifying, analyzing, designing, verifying  and validating complex systems that may include hardware, software, information, personnel, procedures, and facilities. 



Systems Modeling Language (SysML) provides graphical representations with a semantic foundation for modeling system requirements, behavior, structure, and parametric equations that can integrate with a broad range of engineering analysis. 


Do you want to learn more about SysML?

Thursday, February 21, 2013

iOS App Development

Learn how to develop iOS apps for iPhone, and iPad


Design and Develop iOS Applications 

  • What are the tools to create iOS apps?
  • What are the essential elements of creating iOS apps?
  • Objective-C to power iOS apps and frameworks; can you build an iOS app without Objective-C?
  • What are best practices for designing interfaces that provide  great user experiences?
  • What are the fundamental design patterns used in the frameworks?
  • What are the elements of creating intuitive interactive, and engaging iOS apps?




iOS App Development

IPv6 Basics

Learn IPv6 Basics


Internet Protocol version 6 (IPv6) is the new generation of the basic protocol of the Internet. IPv6 will be the
common language of the society, every device connected to the Internet has support it including cars, appliances, senros, computers, mobile users and even brains in the future. 

The legacy version of IP (IP version 4) has several shortcomings which has complicated, and in some cases presented difficulties and barrier for the further development of the networking.  IPv6 should remove many of these barriers and provide a feature-rich environment for the future of global networking.


IPv6 Basics

You need to be aware of  IPv6 security problems and identify known areas of weakness in IPv6 security, IPv6 attack tools and hacker skills. You need to:


  • Protect your IPv6 networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 
  • Secure mobile IPv6 networks
  • Secure transition mechanisms used in migration from IPv4 to IPv6
  • Learn the security implications of the IPv6 protocol
  • Learn issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats such as DDoS
  • Use perimeter filtering techniques on the firewalls and routers






Bluetooth Security

Is Bluetooth Secured? What are the Vulnerabilities in Bluetooth?


 Bluetooth introduces a number of potentially serious security vulnerabilities.  


Bluetooth uses optional pre-shared key authentication and encryption algorithms that are  considered strong when both implemented and used correctly. 

The strength of Bluetooth security relies primarily on the length and randomness of the passkey used for Bluetooth pairing, during which devices mutually authenticate each other for the first time and set up a link key for later authentication and encryption.  

Bluetooth is by design a peer-to-peer network technology and typically lacks centralized administration and security enforcement infrastructure. 

Bluetooth Security



Value of TOGAF Certification

Why should you become TOGAF Certified?

Enterprise Architecture (EA) will have a great  impact on the business to deliver  business value, according to Gartner, Inc.  

Enterprise Architecture Value Needs to Be Measured and Reported. According to OMB, the federal
executive branch  $75 billion was invested on information technology (IT) in fiscal
year 2012.


TOGAF, The Open Group Enterprise Architecture, acts as a blueprint for organizational change defined in models that describe (in both business and technology ) how the
entity operates today and how it intends to operate in the future.

TOGAF  also includes a plan for transitioning to this future state. Effective use of an
TOGAF as an enterprise architecture is a hallmark of successful organizations and can
be important to achieving operations and technology environments that
maximize institutional mission performance and outcomes. 

Realizing cost savings through consolidation and reuse of shared services and elimination of antiquated and redundant mission operations, enhancing information sharing through data
standardization and system integration, and optimizing service delivery through streamlining and normalization of business processes and mission operations.

Gartner Says Enterprise Architecture Must Become Business Outcome-Driven to Deliver Value


“Focusing on a standard EA framework doesn’t work,” said Brian Burke, research vice president at Gartner. “In the past EA practitioners focused on deliverables that were useful to enterprise architects but not valuable to senior management and/or did not respond to a specific business or IT need.“
 

 

Value of TOGAF Certification

 



Wednesday, February 20, 2013

Value of Systems Engineering

What are the Value of Systems Engineering



value of systems engineering

“…there is a strong case to be made for a  quantitative relationship between systems
engineering investment and the quality of  program performance.” – Eric Honour, Value of Systems
Engineering

How can we capture the value of  Systems Engineering?


Unsuccessful projects, in comparison to successful projects, expended:
– 50% less effort in mission definition
– 33% less effort in requirements engineering
– 33% less effort in scope management
– 40% more effort in systems architecting
– 60% more effort in implementation/integration
– 25% more effort in verification/validation


Bottom Line: Successful Projects Spent More Up Front in planning and understanding the problem, scope of management, and validating stakeholder's needs.



Learn more about Systems Engineering Values in our Systems Engineering Crash Course, Bootcamp Style Training. Find out how to define, create and measure Metrics, Project Exit Interviews and Lessons Learned

Sunday, February 17, 2013

BPM Training - Business Process Management Training

Learn Business Process Management (BPM) Real Time


BPM Training workshop - 3 days


Learn about Business process management (BPM) and understand how you can use BPM as a set of management disciplines to contribute to performance of your enterprise. BPM training will show you how to enhance business processes to drive operational excellence and business agility.

 Learn about the building blocks of BPM including:
  • Business process modeling 
  • Creating Business process metrics and KPIs
  • Bsiness processes analysis
  • Business process change management

BPM Training Course will help you to understand your business and drive business goals, objectives and strategies.

Work with TONEX BPM framework to drive the processes GPS ( Goals, Plans and Objectives)

BPM Training




Saturday, February 16, 2013

Bluetooth Training


Learn Bluetooth from the Experts

Bluetooth 4.0 introduces low energy technology applicable to Smart devices, Bluetooth LE

What is new in Bluetooth v4.0? It introduced Low Energy (LE)  technology to the Bluetooth Core Specification, enabling smart devices to have long lasting operation with tiny, coin-cell batteries. Markets that benefit from Bluetooth LE  includes: health care, entertainment, sports and fitness, mobility, security, lighting, signage, and home.



Bluetooth Training

Key features of Bluetooth low energy wireless technology include:
  • Ultra-low peak
  • Long lifetime with standard, coin-cell batteries
  • Lower cost of development and low costs products to consumers
  • Openness and Interoperability
  • Range and coverage enhancement

Friday, February 15, 2013

LTE Training - Long Term Evolution (LTE) Training

Long Term Evolution (LTE) Training

Long Term Evolution (LTE) Learning

by ADMIN on FEBRUARY 18, 2013

One interesting facet of the convergence of mobile broadband and IP world is this new emerging LTE , Long Term Evolution, technology that will take the place of traditional mobile networks globally in the near future. TONEX actually started its LTE Training in 2004 , which really has surprised many people. It’s better to learn LTE, VoLTE, LTE RF Engineering and LTE-Advanced now and become an expert in this field so you can have a leg up on the rest of the engineers when it’s time to get a job.

We also offer a LTE RF Planning and Engineering course where it teaches you LTE propagation modeling, planing and RF Optimization. It might seem complicated to you but these courses look pretty good.  The bottom line is that knowing LTE as a project manager, or being a LTE systems engineer can make for a very lucrative career choice.  

Thursday, February 14, 2013

ISR Training, Intelligence, Surveillance, and Reconnaissance Training

What is ISR (Intelligence, Surveillance, and Reconnaissance) ?


Learn about  Intelligence, Surveillance and Reconnaissance (ISR) and explore how to develop and leverage advanced technologies for applications in future intelligence, surveillance and reconnaissance systems.  



ISR's training also covers areas such as :

  • Sensor Fields: Sensor data collection and networking 
  • Situational Information on Demand: Tactical processing of sensor data in order to enable indications and warnings including tagging, tracking and locating (TTL)
  • Intelligence for Expeditionary and Irregular Warfare: Translation of information to actionable intelligence


Learn about ISR Science and Technologies:

  • Tactical Sensors Networks
  • Electro-optical and Infrared
  • Biometrics techniques including body, face, voice, iris and fingerprint matching
  • System Architectures 
  • Video and Imaging
  • Modeling and Simulation
  • SIGINT (Signals Intelligence), ELINT (Electronic Intelligence), COMINT (Communications Intelligence), Measurements and Signatures Intelligence (MASINT), GEOINT (GEO Intelligence), EW (Electronic Warfare), EA (Electronic Attack), ECM (Electronic Countermeasures) 
  • Decision Prediction
  • Active and passive electronically scanned array radars
  • Advanced analytics
  • Tactical intelligence systems and unmanned systems technology
  • Targeting

Learn more about ISR (Intelligence, Surveillance, and Reconnaissance) Training

Systems Engineering Approaches


Learn the Systems Engineering from the Experts 

Systems Engineering Definition by INCOSE:
Systems Engineering integrates all the disciplines and specialty groups into a team effort forming a structured development process that proceeds from concept to production to operation. Systems Engineering considers both the business and the technical needs of all customers with the goal of providing a quality product that meets the user needs. International Council on Systems Engineering (INCOSE)

Systems Engineering Definition by DoD/DAU:

The term “systems engineering” was first coined in the early 1940s, and DoD began practicing the concept later that decade with the initial development of missiles and missile-defense systems. Systems engineering started gaining momentum following World War II. Because of its role in acquiring and developing large-scale, complex systems, DoD led the way in codifying the fledgling discipline by developing and releasing the first systems engineering standard in 1969. The principles in that baseline military standard (and later revisions) are still valid. Efforts aimed at revitalizing systems engineering have retained those aspects of the discipline that have proven successful in developing complex systems in the past in a framework that has evolved over time.


Systems Engineering Definition by NASA:
Systems engineering is a methodical, disciplined approach for the design, realization, technical management, operations, and retirement of a system.

Systems Engineering Definition by FHWA:
An inter-disciplinary approach and a means to enable the realization of successful systems. Systems engineering requires a broad knowledge, a mindset that keeps the big picture in mind, a facilitator, and a skilled conductor of a team.

Learn about RF Safety: Non-Ionizing Radiation


WHAT IS NON-IONIZING RADIATION?

"Ionization" is a process by which electrons are stripped from atoms and molecules.  This process can produce molecular changes that can lead to damage in biological tissue, including effects on DNA, the genetic material of living organisms.  This process requires interaction with high levels of electromagnetic energy.  Those types of electromagnetic radiation with enough energy to ionize biological material include X-radiation and gamma radiation.  Therefore, X-rays and gamma rays are examples of ionizing radiation.

The energy levels associated with RF and microwave radiation, on the other hand, are not great enough to cause the ionization of atoms and molecules, and RF energy is, therefore, is a type of non-ionizing radiation.

Other types of non-ionizing radiation include visible and infrared light.  Often the term "radiation" is used, colloquially, to imply that ionizing radiation (radioactivity), such as that associated with nuclear power plants, is present.  Ionizing radiation should not be confused with the lower-energy, non-ionizing radiation with respect to possible biological effects, since the mechanisms of action are quite different.

Attendees attending this class will receive a completion certificate and card complying with OSHA reporting requirements in 29 CFR1910.268.



Wednesday, February 13, 2013

What is SCADA? Supervisory Control and Data Acquisition


SCADA (Supervisory Control And Data Acquisition) 


SCADA, Supervisory Control And Data Acquisition systems refer to the combination of telemetry and data acquisition. It consists of collecting information, transferring it back to a central site, carrying out necessary analysis and control, and then displaying this data on a number of operator screens. 

The SCADA system is used to monitor and control a plant or equipment. Control may be automatic or can be initiated by operator commands.

Primary functions of SCADA system:
·         Data acquisition
·         Data communication
·         Data presentation
·         Control

Points of SCADA Vulnerability are:

·         The IT Infrastructure
·         Leased Infrastructure; Frame Relay and Other Services
·         The Sensor/Fieldbus Networks
·         Wireless Systems
·         Rogue (Undocumented) Dial and Wireless Links
·         Infected/Compromised Portable Equipment
·         Network Management Systems 


Tuesday, February 12, 2013

Long Term Evolution Training Courses

LTE, Long Term Evolution, What is it?

Long Term Evolution - LTE



Learn all the Concepts behind Long Term Evolution (LTE) and EPC. LTE (Long Term Evolution) delivers true mobile broadband for the masses with a superior user experience. LTE provides improved performance, lower total cost of ownership and enables a new era of personalized services. TONEX “LTE” (3GPP Long Term Evolution) covers the technical details of the next-generation network beyond 3G.


LTE, Long Term Evolution or the E-UTRAN (Evolved Universal Terrestrial Access Network) is the access part of the Evolved Packet System (EPS). The main requirements for the new access network are high spectral efficiency, high peak data rates, short round trip time and frequency flexibility.

TONEX LTE training 4-day course is a unique crash course, bootcamp style that covers all aspects of LTE.

Topics Included: Motivation behind LTE, major key features, system requirements, network architecture, network engineering, RF planning, security, coverage, performance, required enhancements in HSPA/HSPA+ and migration strategies for LTE deployment.

 LTE Training


Monday, February 11, 2013

RF Safety - Radio Frequency Safety

You will actually be surprised!

RF Radiofrequency (RF) and microwave (MW) radiation are electromagnetic radiation in the frequency ranges 3 kilohertz (kHz) - 300 Megahertz (MHz), and 300 MHz - 300 gigahertz (GHz), respectively. Research continues on possible biological effects of exposure to RF/MW radiation from radios, cellular phones, the processing and cooking of foods, heat sealers, vinyl welders, high frequency welders, induction heaters, flow solder machines, communications transmitters, radar transmitters, ion implant equipment, microwave drying equipment, sputtering equipment and glue curing.

WHAT ARE "RADIOFREQUENCY" AND MICROWAVE RADIATION?
Electromagnetic radiation consists of waves of electric and magnetic energy moving together (i.e., radiating) through space at the speed of light.  Taken together, all forms of electromagnetic energy are referred to as the electromagnetic "spectrum."

Radio waves and microwaves emitted by transmitting antennas are one form of electromagnetic energy.  They are collectively referred to as "radiofrequency" or "RF" energy or radiation.  Note that the term “radiation” does not mean “radioactive.”

Often, the terms "electromagnetic field" or "radiofrequency field" may be used to indicate the presence of electromagnetic or RF energy.

The RF waves emanating from an antenna are generated by the movement of electrical charges in the antenna.  Electromagnetic waves can be characterized by a wavelength and a frequency.  The wavelength is the distance covered by one complete cycle of the electromagnetic wave, while the frequency is the number of electromagnetic waves passing a given point in one second.  The frequency of an RF signal is usually expressed in terms of a unit called the "hertz" (abbreviated "Hz").  One Hz equals one cycle per second.  One megahertz ("MHz") equals one million cycles per second.

Different forms of electromagnetic energy are categorized by their wavelengths and frequencies.  The RF part of the electromagnetic spectrum is generally defined as that part of the spectrum where electromagnetic waves have frequencies in the range of about 3 kilohertz (3 kHz) to 300 gigahertz (300 GHz).

Microwaves are a specific category of radio waves that can be loosely defined as radiofrequency energy at frequencies ranging from about 1 GHz upward.


Learn about RF Safety




IPv6 Security Training

We just updated our IPv6 Security Training

 IPv6 Security Training

TONEX IPv6 Security Training is now aligned with IPv6 Security Training Certification. 

We are IPv6 Forum Certified.

IPv6 Security Topics Covered:
  • Major security issues faced when upgrading to IPv6 network
  • IPv6 Packet Structures and Vulnerability
  • Issues with IPv6 Packets over IPv4 Networks
  • Issues with Embedding an IPv4 Address in an IPv6 Header
  • IPv6 Forensics
  • IPv6 Security Testing Tools
  • Vulnerability Testing
  • Running Fuzz Testing against IPv6 Devices and Applications
  • IPv6 Attacker Tools
  • IPv6 Security Incidents
  • Sources of Incidents
  • Types of IPv6 Security Incidents
  • Probes
  • Scan
  • Account Compromise
  • Root Compromise
  • Packet Sniffer
  • Denial of Service (DoS) and Distributed DoS (DDoS)
  • Exploitation of Trust in IPv6
  • Malicious Code in IPv6

 

Sunday, February 10, 2013

New DoDAF Workshop - DoDAF 2.0 Training

DoDAF Workshop – Business Process Management with DoDAF 2.0 Training 


We just created a new DoDAF workshop due to the many requests from our customers. Here is some basic description of this new workwhop


DoDAF Workshop, Business process management (BPM) applied to DoDAF covers all aspects of BPM applied to DoDAF 2.0′s All, Capability, Operational, Systems, Services viewpoints and Data and Information Viewpoints.



Who Should Attend

  • Business Analysts
  • Enterprise Archietcts
  • DoDAF Process improvement team members
  • DoDAF Managers and supervisors

Thursday, February 7, 2013

LTE-Advanced Training Course

LTE-Advanced Training Course by TONEX: The true 4G based on ITU's  IMT-Advanced


TONEX Advanced-LTE training 2-day course is a unique crash course, bootcamp style that covers all aspects of  Advanced-LTE

Topics Included: Motivation behind LTE-advanced, major new key features such as as carrier aggregation, enhanced advanced antenna techniques for the DL/ UL, relay repeaters, and coordinated multipoint (CoMP) transmission and reception, requirements, network architecture, security, coverage, performance, required enhancements in LTE and migration strategies for LTE-Advanced deployment.

 LTE-Advanced


LTE–Advanced provides higher bitrates in a cost efficient way and, at the same time, completely fulfill the requirements set by ITU for IMT Advanced, also referred to as 4G.
4G LTE or LTE-Advanced was specified initially in Release 10 of the 3GPP standard in 2010.

LTE-Advanced supports wider frequency bandwidths (40MHz or more). Carrier aggregation was introduced in Release 10 to allow combining multiple pipelines together to create a larger single pipeline (provide backward compatibility with LTE ) . This is very similar to 802.11n and 802.11ac/ad or concept of channel bonding for wireline broadband networks.