Safety Critical Systems (SCS) technical training course

Focusing on the requirements for functional safety through in-depth discussions and practical training course exercises. This four-day course provides you with an exhaustive and authoritative description of the criteria for functional safety considering the rapidly increasing system complexity. The course will allow you to interpret and apply IEC 61508 understanding; combat specific issues for designing and managing safety systems and integrating cybersecurity into overall safety strategy.

Description

Part one: Introduction to functional safety

Part one - day one

08.55

Teams open

09.00

Introduction to the Course

  • Module 1: The basics of functional safety 1
  • Module 2: The basics of functional safety 2
  • Module 3: The basics of functional safety 3
  • Module 4: Safety Lifecycles & Compliance

Ron Bell, Functional Safety Specialist

Dave Green, Principal Consultant RPS | Consulting UK & Ireland

12.30

Lunch

13.20

  • Module 5: Random Hardware failures, Systematic Failures & Modes of operation
  • Module 6: Strategy to achieve Functional Safety: Hardware Safety Integrity: Part 1

Ron Bell, Functional Safety Specialist

Dave Green, Principal Consultant RPS | Consulting UK & Ireland

17.00

Open forum

17.30

Close

Part one - day two

08.55

Teams open

09.00

  • Module 7: Strategy to achieve Functional Safety: Hardware Safety Integrity: Part 2
  • Module 8: Strategy to achieve Functional Safety: Systematic Safety Integrity

Ron Bell, Functional Safety Specialist

Dave Green, Principal Consultant RPS | Consulting UK & Ireland

12.30

Lunch

13.20

  • Module 9: Functional Safety Assurance Measures
  • Module 10: Management of Functional Safety and Competence
  • Module 11: SIL Determination and ALARP Demonstration

Ron Bell, Functional Safety Specialist

Dave Green, Principal Consultant RPS | Consulting UK & Ireland

17.00

Open forum

17.30

Close

Part two - day three

08.55

Teams open

09.00

Introduction to the course

Ron Bell, Functional Safety Specialist

09.10

Session 1: Walkthrough example from Hazard and Risk Analysis to final design: Part 1

Esteban Bernechea, Principal Consultant | ORS Consulting (ORS)

10.25

Break

10.45

Session 2: Walkthrough example from Hazard and Risk Analysis to final design: Part 2

Chantal Sealey, Principal Consultant, ERM

11.45

Lunch

12.45

Session 3: Operation and Maintenance

Damian Marsden, Principal EC&I Engineer, ERM

13.45

Break

13.55

Session 4: Case Studies Including Interactive Examples

  • Case study 1: BP Texas City incident
  • Case study 2: CAPECO incident
  • Case study 3:  Boeing 737 Max
  • Case study 4:  Deepwater Horizon

Dave Green, Principal Consultant RPS | Consulting UK & Ireland

15.55

End of day open session Q & A

Chair: Ron Bell, Functional Safety Specialist 

16.00

Close

Part three - day four

08.55

Teams open

09.00

Session 5: Machinery Safety Applications, using IEC 62061

Dave Green, Principal Consultant RPS | Consulting UK & Ireland

10.00

Break

10.10

Session 6: IEC 61508: Software Requirements

Dewi Daniels, Director, Software Safety Limited

11.40

Break

12.00

Session 7: Complex Semiconductors and Functional Safety

Declan Staunton, Principal Engineer, Analog Devices

13.00

Lunch

14.00

Session 8: Cyber Security and Safety

Rhodri Morgan, Principle Safety Consultant, Atkins Realis.

15.00

Break

15.10

Session 9: Artificial Intelligence: The Challenges

Patrik Feth, Senior Safety Consultant

16.10

Break

16.20

End of course open session Q & A

Chair: Ron Bell, Functional Safety Specialist 

17.00

Close

Similar events

The Certified Information Security Manager (CISM) qualification is an international professional certification offered by ISACA for Information Security Managers. The certification recognises an individual's ability to design, implement and manage an information security programme.

More Information

The Practitioners Certificate in Information Assurance Architecture (PCIAA) course prepares the student for a career in security architecture. A Security Architect (SA) is a senior-level enterprise architect role, either within a dedicated security team or as part of a more general Enterprise Architecture (EA) team.

More Information

The Practitioner Certificate in Information Risk Management (PCiIRM) provides thorough guidance on building a business focused ISMS strategy. Demonstrate your ability to deliver a robust system in line with ISO 17799, ISO 27001 and BS 7799-3 standards and make sure you are up-to-date with UK legislation, as well as international frameworks. Over five days you will work with BCS qualified professionals, learning how to understand and prevent threats to data within specific technical business environments.

More Information

This introductory course is perfect for users who are looking to make a bigger impact with the way they report on data through visualisations. The course will be of particular benefit to team leaders, management at all levels, or anyone who needs to commission the production of reports or dashboards. Please note that this course does not cover PowerBI Pro, PowerBI accessed via Microsoft 365 or SharePoint Services.

More Information

This Power BI Data Analyst Training Course will discuss the various methods and best practices that align with business and technical requirements for modelling, visualising, and analysing data with Power BI. The course will also show how to access and process data from various sources, including relational and non-relational data.

More Information

NCSC Certified consultant training course will provide the latest understanding of the scope and requirements of the Cyber Essentials Standard. This will enable you to become a fully certified Cyber Essentials Consultant. The workshop-style training tasks and tips to ensure the participant leaves with practical knowledge to implement Cyber Essentials into businesses from within any industry and of any size.

More Information

This course is for Experienced Software Developers who are completely new to C++ programming or those with elementary skills in C++, who need to gain hands-on experience of developing commercial applications.

More Information

Our ITIL® 4 Foundation training course will enable you to understand a new way to look at IT Service Management (ITSM) through a Service Value System (SVS). Our ITIL® 4 Foundation training course will educate you on how to manage IT services and achieve business value within an enterprise. It is a widely accepted approach in IT Service Management (ITSM) and will introduce you to the core principles of ITIL® best practices and concepts.

More Information

CM2 is the global enterprise standard for enterprise change and configuration management and provides a comprehensive methodology for managing the configuration of a product, system, and/or service throughout its life. It provides the most robust framework and quality management platform for creating and maintaining a digital enterprise with complete end-to-end ecosystem traceability.

More Information

This course introduces the technology fundamentals of most SAP applications (incl. SAP S/4HANA and SAP Business Suite), how SAP systems function, as well as an introduction to different user interfaces, such as SAP Fiori or SAP GUI. The training contains hands-on exercises in an SAP S/4HANA system and other SAP applications. The course will also introduce learners to the SAP strategy and provides an overview of cloud topics.

More Information

This course provides you with fundamental knowledge on how to ensure a smooth operation of SAP systems running on Application Server ABAP (AS ABAP). AS ABAP is the technological foundation of SAP S/4HANA as well as SAP Business Suite systems. In this five-day training, you will learn how to perform various administrative tasks to keep the SAP system running.

More Information

This course provides learners with a thorough overview of the deployment options available with the GROW and RISE with SAP offerings, including the platforms, processes, services and tools available to them as a customer and/or an SAP implementer. The learner will explore Business Transformation as a Service, SAP Digital Discovery Assessment, sell and delivery qualifications (e.g. PartnerEdge), and the Partner Demonstration Landscape.

More Information

This course guides learners through the fundamental requirements and knowledge necessary for customer project team key users, IT Professionals, Solution Architects, and Project Managers who are beginning their journey into RISE with SAP S/4HANA Cloud, private edition implementations.

More Information

The Certified DPO training course enables you to develop the necessary knowledge, skills and competence to effectively implement and manage a compliance framework with regard to the protection of personal data.

More Information

This is the Adobe Authorised course for new users of Adobe Photoshop. Produce and edit images to meet professional industry standards.

More Information

Please register on any session showing, this will not be the date the course takes place. Upon registration your e-learning will then be booked and all of the log in details sent to you. You can undertake the training as soon as you have received this..

More Information

Learn everything you need to start working as a Systems Engineer. While saving you hours every week. Learn the full systems engineering product development lifecycle, understand all of the jargon and have confidence in producing deliverables on your project from Day 1.

More Information

Elevate your software testing career with our ISTQB Foundation in Software Testing (CTFL) v4.0 course. This comprehensive program provides a solid foundation in software testing principles, preparing you for the globally recognized ISTQB CTFL certification. Ideal for professionals in the UK and worldwide, this course aligns with various software development methodologies, including Waterfall, Agile, DevOps, and Continuous Delivery.

More Information

The NIST Cybersecurity Framework 800-53 Practitioner course, is an overlay course, based on the NIST Cyber Security Framework, a publication of the National Institute of Standards and Technology.

More Information

The NIST Cybersecurity Framework Foundation course, is an overlay course, based on the NIST Cyber Security Framework (NIST-CSF), a publication of the National Institute of Standards and Technology.

More Information

This course is for Experienced C++ programmers, who are looking to gain advanced skills and programming techniques using C++

More Information

Gain core knowledge and experience to successfully implement and manage security programs and prepare for the 2024 CISSP certification. This 2024 updated course is the most comprehensive review of information security concepts and industry best practices, focusing on the eight domains of the CISSP-CBK (Common Body of Knowledge) that are covered in the CISSP exam.

More Information

This course is an introduction to Python and its main data analysis libraries, Pandas and Matplotlib for delegates with some understanding of programming concepts. It is a two-part course, the first is an introduction to Python programming, the second introduces Python's data analysis tools. For the programming environment we use JupyterLab on the Anaconda platform. Anaconda is one of the most, if not the most, popular Data Science platforms.

More Information

Python is a multi-paradigm programming language which has become the language of choice for data analysis, data visualisation and machine learning. This Data Analysis with Python course provides a concrete first step in learning data analysis.

More Information

This course is designed for delegates who have covered the basic course on the python programming. The course is for professionals/students who want to further enhance their knowledge on python and see how python is well integrated with other languages.

More Information

This course is designed for beginners who wish to learn Python, a widely used general-purpose, high-level programming language. It covers the essential topics for starting to program with Python. This course is also ideal for anyone who wants to become a Python developer, a data analyst, or a data scientist or wants to use Python for any work.

More Information

This course is designed to provide students with the knowledge and skills needed to perform data science using Python programming language. Students will learn to apply machine learning libraries such as Pandas, Seaborn and scikit-learn. The course will cover topics such as data cleaning, exploratory data analysis, machine learning algorithms, model evaluation, and selecting the appropriate model for business use.

More Information

C Programming for Embedded Systems teaches the C programming language in the context of embedded systems. As well as giving delegates a full grounding in the C programming language, this course teaches delegates how to program a modern embedded microcontroller using real-time development tools. The syllabus, examples and exercises are tuned to the practical requirements of embedded microcontroller programming.

More Information