This course was developed in response to the extreme weather events experienced in Texas in early 2021. Students will learn how to prepare and protect generator equipment from each type of weather event. Historical data will be used to demonstrate potential risks. Students will then develop actionable plans to prepare for and manage those risks.
This 2-day course will cover important concepts in generator weatherization. It will be presented in person with live demonstrations and lab exercises.
Course Dates: August 09-10 2021
This course is presented in person:
Star Park Training Facility, Multipurpose Room 173
3055 Hunter Rd, San Marcos, TX, 78666
Due to the COVID-19 pandemic, we will be limiting the number of attendees to allow for safe social distancing during each presentation.
- Disaster Recovery
- Hot Weather Protection
- Cold Weather Protection
- Water and Storm Protection
- Assessing Criticality
- Risk Mangement
Who Should Attend
- Generator Owners
- Generator Operators
- Generator Technicians
- Generator Support Personnel
Day 1 Schedule
|Classifying and Rating Critical Systems||11:00a-12:15p|
|Disaster Recovery Planning||01:30p-03:00p|
|Hot Weather Protection||03:30p-05:00p|
Day 2 Schedule
|Cold Weather Protection||09:00a-10:30a|
|Water and Storm Protection||11:00a-12:15p|
Course Fee: $1,664.00 per person
Charles Payne has worked in Digital Forensics and Incident Response for the last five years. During this time, he has witnessed and actively participated in the identification and remediation of numerous exploits. He has actively led his team to hunt, teach, and explain the industry logic for controls that are implemented under frameworks such as NIST, DISA, and ISO. Charles spends much of his free time teaching others about cybersecurity and learning new methods to advance the community’s understanding. As an electrical engineer, Charles has firsthand experience with weatherizing generators.
Instructor Statement: “Alone we’re isolated. Together, we’re a community.”
“This mindset is a result of witnessing both sides work through their procedures. Blue teams, the defenders, are typically comprised of an internal group within a corporation, which tend to hold attack vector data well-guarded, unable to be shared with the community. On the other hand, red teams, the attackers, regularly share their failures and accomplishments within their community, enabling their target to become compromised that much faster. The solution is not always something novel or innovative, it is often just better and more regular communication within the community.”
This training is presented as a joint venture between Cyberkraft Training and Direct Line 2 Compliance in cooperation with CIEDAR and Texas State University.