Mastering IEC 61850 for Modern Power Systems Integration
You're under pressure. The grid is evolving. Legacy protocols are being retired. Stakeholders demand faster, smarter, and more secure integration – but you're navigating complexity without the tools to keep up. If you're not fluent in IEC 61850, you're not future-proof. Every delay in mastering this standard costs your projects time, budget, and credibility. Missed interoperability means field teams struggle, commissioning takes weeks longer, and system-wide diagnostics become a guessing game. The cost of not knowing Mastering IEC 61850 for Modern Power Systems Integration is measured in failed audits, rejected tenders, and lost promotions. This course is your bridge from uncertainty to authority. In just 28 days, you'll move from fragmented understanding to delivering a fully documented, board-ready substation automation integration plan using IEC 61850 compliant architecture – complete with SCL configuration, GOOSE messaging design, and functional decomposition aligned with utility best practices. Meet Ahmad Rahman, Protection Engineer at a major transmission operator. After completing this course, he led the retrofit of a 132kV substation using IEC 61850–9–2 process bus architecture, reducing cabling costs by 41% and cutting commissioning time in half. His proposal was fast-tracked because it demonstrated compliance clarity that stakeholders had never seen before. You don’t need more theory. You need real-world application, structured insight, and a proven methodology that eliminates guesswork. This course gives you all three – with precision, depth, and engineering rigor that reflects actual utility and EPC workflows. No fluff. No filler. Just battle-tested frameworks you can deploy immediately to accelerate integration, resolve interoperability disputes, and become the go-to expert in your organisation. You’re not just learning a protocol – you’re claiming a strategic advantage. Here’s how this course is structured to help you get there.Course Format & Delivery Details Self-Paced. Immediate Online Access. No Deadlines. No Pressure. This course is designed for professionals who work complex schedules, manage field deployments, and lead engineering teams. You begin the moment your enrollment is processed, studying when and where it suits you – whether that’s between site visits or during intensive project planning. What You Get – With Zero Risk
- On-Demand Access: Start anytime, pause, resume. No fixed dates or live sessions to miss.
- Lifetime Access: Once enrolled, you own the course forever – including all future updates and technical revisions at no extra cost.
- Mobile-Friendly Platform: Learn on your tablet during site walks or from your phone during transit. Full sync across devices.
- 24/7 Global Availability: Whether you're in Dubai, Oslo, or Santiago, your access is instantaneous and uninterrupted.
- Direct Instructor Support: Submit technical queries and receive detailed, engineer-reviewed responses within 48 business hours.
- Certificate of Completion issued by The Art of Service: A globally recognised credential trusted by engineering firms, utilities, and certification bodies – verifiable and career-advancing.
Transparent, One-Time Pricing – No Hidden Fees
Simple, straightforward investment. What you see is what you pay – with no surprise charges, recurring fees, or upsells. Secure checkout accepts Visa, Mastercard, and PayPal, ensuring global accessibility and peace of mind. Your Investment Is 100% Protected
We guarantee results. If, after completing the first two modules, you find the content does not meet your professional expectations, request a full refund – no questions asked. This is risk-free upskilling, engineered for confidence. This Works Even If…
You’ve read the IEC 61850 standard and still felt overwhelmed. You're experienced in substations but new to digital integration. Your team uses mixed vendors and proprietary extensions. Your company is transitioning to smart grids and you need to lead the change – fast. This course is built for engineers like you. It cuts through abstraction with real SCL file analysis, actual substation topology mappings, and configuration rules used in Tier-1 engineering projects. It doesn’t just teach concepts – it gives you the tools to prove compliance, design robust architectures, and document configurations that pass third-party audits. Role-specific examples include protection engineers integrating multi-vendor relays, automation leads designing scalable GOOSE logic, and project managers delivering IED schedules aligned with engineering milestones. The material reflects real tenders, as-built documentation, and FAT checklists – not academic abstractions. After enrolment, you’ll receive a confirmation email. Your access credentials and learning portal details are sent in a separate message once your account is fully provisioned – ensuring a smooth and secure onboarding experience.
Extensive and Detailed Course Curriculum
Module 1: Foundations of IEC 61850 and Digital Substation Architecture - Understanding the evolution of substation automation protocols
- Why IEC 61850 replaced legacy standards like IEC 60870–5–103 and DNP3
- Core benefits of IEC 61850 for interoperability and scalability
- Overview of key parts of the standard: Part 1 to Part 10
- Role of IEC 61850 in smart grid transformation
- Digital vs. conventional substation: architectural comparison
- Understanding Intelligent Electronic Devices (IEDs) in modern networks
- Definition of the station, process, and bay levels in IEC 61850
- Functional decomposition using logical nodes and logical devices
- Introduction to object-oriented modelling in power systems
- Understanding the role of Communication Networks and Systems
- Mapping physical devices to logical hierarchies
- Key stakeholders in IEC 61850 implementation
- Challenges in legacy system integration
- Understanding market adoption trends and vendor support
- How utilities are leveraging IEC 61850 for lifecycle cost reduction
- Overview of regional regulatory drivers for standardisation
Module 2: Logical Node Modelling and Functional Decomposition - Principles of logical node (LN) classification
- Understanding standardised LN prefixes (A, G, I, P, T, etc.)
- Decoding LN naming conventions: example analysis
- Defining protection functions using common LNs: PTOC, PDIR, PSCH
- Modelling control functions: CSWI, CILO, CSIG
- Modelling measurement and monitoring: MMXU, MMTR, MV
- Modelling interlocking and automation: GSIN, SPS, SIP
- Interpreting LN data and data attributes (DA)
- Understanding data sets and their role in reporting
- Defining logical devices (LD) within IEDs
- Naming conventions for LDs: RELAY, CTRL, PROT, CTRL
- Grouping LNs by functional purpose
- Differentiating standardised vs. manufacturer-specific LNs
- Analyzing real-world LN implementation in relay manuals
- Role of function constraints (FC) in data access
- Understanding the FC codes: ST, MX, CO, SP, SG, SE
- Using functional decomposition for IED configuration
- Mapping protection schemes to logical node models
- Example: Creating a complete overcurrent protection model
- Validating model completeness against protection requirements
Module 3: Substation Configuration Language (SCL) Structure and Syntax - Overview of SCL file types: ICD, CID, SSD, SCD, and IID
- Understanding the purpose and exchange use of each SCL type
- SCL file architecture: root elements and hierarchy
- Analyzing the header section of an SCL file
- Defining substation topology using the Substation element
- Modelling voltage levels and bays
- Defining power transformers and conducting equipment
- Using Connectivity Nodes for terminal connection management
- Mapping physical devices to the IED element
- Understanding the Communication section and subnet configuration
- Defining access points for client–server and GOOSE communication
- Modelling logical devices and logical nodes in SCL
- Declaring data sets in the DataSets section
- Configuring Reports and their triggers (dchg, qchg, dupd)
- Defining control blocks for GOOSE and SV communication
- Understanding GSEControl and SampledValueControl elements
- Using Address elements for MAC, APPID, and VLAN configuration
- Analysing a complete SCL file from a 220kV substation
- Using SCL for audit and compliance checking
- Validating SCL syntax using XSD schema rules
Module 4: Engineering Workflows and SCL-Based Project Lifecycle - End–to–end project flow using IEC 61850 tools
- Step 1: Receiving ICD files from multiple vendors
- Step 2: Creating the System Specification Description (SSD)
- Step 3: Generating the System Configuration Description (SCD)
- Using system configuration tools for topology design
- Merging ICD files while preserving vendor-specific features
- Resolving naming conflicts between IEDs
- Defining communication networks and subnets
- Configuring GOOSE and SV publisher–subscriber mappings
- Generating CID files for individual IEDs
- Version control for SCL files in engineering projects
- Role of the system integrator in IEC 61850 projects
- Using change logs and audit trails in SCL management
- Handover documentation deliverables for clients
- Understanding the role of the SCD as a single source of truth
- Factory Acceptance Testing (FAT) using SCD-based validation
- Site Acceptance Testing (SAT) and IED commissioning
- Troubleshooting version mismatches between CID and ICD
- Benchmarking engineering effort across project sizes
- Automating parts of the configuration workflow
Module 5: GOOSE Messaging – Principles, Configuration, and Applications - Understanding GOOSE (Generic Object Oriented Substation Event)
- Why GOOSE replaces hardwired tripping and interlocking
- GOOSE vs. traditional binary signalling: cost and reliability impact
- How GOOSE messages are structured and transmitted
- Role of publisher and subscriber in GOOSE communication
- Configuration of GOOSE control blocks in SCL
- Setting up AppID, MAC address, and VLAN ID for GOOSE
- Understanding configurable parameters: MinTime, MaxTime
- Time–critical behaviour: 4 ms guarantee for protection signals
- GOOSE retransmission mechanisms and timing intervals
- Analysing GOOSE payload content using packet capture tools
- Using GOOSE for breaker failure protection schemes
- Designing busbar protection using GOOSE logic
- Implementing transfer trips and blocking signals over GOOSE
- Modelling breaker and disconnect interlocks via GOOSE
- Detecting GOOSE communication loss and failure responses
- Configuring GOOSE blocks with security attributes
- Troubleshooting misaligned GOOSE subscriptions
- Validating GOOSE mappings during integration testing
- Best practices for network segmentation to protect GOOSE traffic
Module 6: Sampled Values (SV) and Process Bus Architecture - Introduction to IEC 61850–9–2 Sampled Values
- Replacing copper current and voltage wiring with SV
- Difference between SV and traditional analogue inputs
- Architecture of the process bus: merging units and IEDs
- Role of the Merging Unit (MU) in data acquisition
- How MUs convert analogue signals to digital SV streams
- Understanding SV frame structure and payload
- Configuring SV control blocks in SCL files
- Setting APPID, VLAN, and destination MAC for SV
- Determining sample rates: 4 kHz, 8 kHz, and application limits
- Synchronisation requirements using IEEE 1588 or IRIG–B
- Impact of time accuracy on differential protection performance
- Designing redundancy for MUs: 1+1, hot standby, dual merging
- Troubleshooting SV data quality issues (invalid, substituted)
- Using monitored events to detect MU failures
- Analysing SV traffic patterns in a digital substation
- Benefits of fibre optic cabling for process bus
- Cost–benefit analysis: cabling reduction with SV implementation
- Interfacing legacy relays with SV via protocol converters
- Case study: retrofitting a 132 kV substation with SV
Module 7: Client–Server Communication and Reporting Services - Understanding client–server model in IEC 61850
- Role of the IED as server and HMI as client
- Overview of MMS (Manufacturing Message Specification)
- How MMS enables structured data access over TCP/IP
- Defining data set membership in reporting
- Configuring Report Control Blocks (RCB)
- Setting report triggers: dchg, qchg, dupd, integrity
- Understanding OptFields and inclusion of timestamp
- Setting MaxEnTRIES and buffers for event recording
- Managing sequence of events (SOE) via reporting
- Handling buffered reports during communication outages
- Using UR (Unbuffered Report) for real–time alarms
- Analysing report content in engineering tools
- Configuring Polling vs. unsolicited reporting
- Using event logs for fault analysis and maintenance
- Mapping alarm priorities to report configurations
- Integrating reports into SCADA systems
- Handling multiple report instances in large IEDs
- Best practices for bandwidth optimisation in reporting
- Security considerations for MMS data exposure
Module 8: Time Synchronisation and Network Performance - Importance of precise timing for GOOSE and SV
- Requirements for substation-wide time accuracy
- Overview of IRIG–B and its implementation
- Using GPS as primary time source
- IEEE 1588 Precision Time Protocol (PTP) fundamentals
- Differences between PTP Profiles: IEC 61850–9–3
- Understanding PTP message types: Sync, Follow_Up, Delay_Req
- Configuring Grandmaster and Boundary Clocks
- Network design for low jitter and latency
- Measuring time accuracy using packet analyzers
- Troubleshooting time desynchronisation events
- Impact of switch buffer delays on PTP performance
- Role of PTP transparent clocks in managed switches
- Redundant time sources and failover strategies
- Monitoring time quality flags in IEDs
- Assessing impact of time loss on protection schemes
- Selecting appropriate synchronisation method per voltage level
- Compliance testing of time distribution systems
- Maintaining timestamp integrity across multi–vendor systems
- Documentation of time architecture in SCD files
Module 9: Engineering Tools and Practical Configuration Exercises - Overview of industry-leading IEC 61850 engineering tools
- Using vendor configuration tools for IED setup
- Importing ICD files into system configurators
- Generating SCD files using example utility topology
- Performing GOOSE and SV mapping exercises
- Validating IED communication matrices
- Creating control schematics from SCL models
- Generating point lists for HMI and SCADA integration
- Using SCL-based tools for documentation automation
- Exporting single line diagrams with IEC 61850 tags
- Extracting relay setting templates from SCL
- Conducting gap analysis between design and as–built
- Using comparison tools for SCL version control
- Performing consistency checks across IED datasets
- Analysing communication load on substation network
- Testing configuration files using simulation environments
- Generating FAT and SAT test cases from SCL
- Using digital twins for integration validation
- Practising IED replacement using CID updates
- Exporting compliance reports for auditors
Module 10: Interoperability Testing and Certification Procedures - Importance of interoperability in multi–vendor projects
- Understanding KEMA, DNV, and UL certification schemes
- Overview of IEC 61850 conformance testing
- Defining the scope of interoperability test plans
- Test environment setup: IEDs, network, and tools
- Testing GOOSE publisher–subscriber communication
- Validating Sampled Values timing and content
- Testing Report services and buffer handling
- Verifying control operations via SBO and direct control
- Conducting time synchronisation validation
- Analyzing test results using packet capture tools
- Resolving communication failures during testing
- Generating test evidence for compliance audits
- Understanding IED Supplement to the User Requirements (ICD)
- Ensuring correctness of function constraints and access
- Testing configuration stability under network stress
- Handling undocumented extensions and vendor deviations
- Preparing IEDs for system integration testing
- Documenting test cases and results for handover
- Obtaining third–party certification for IEDs and systems
Module 11: Cybersecurity in IEC 61850 Environments - Security challenges in digital substations
- Understanding IEC 62351 for power system security
- Threat landscape: unauthorised access, spoofing, denial of service
- Segmentation strategies using VLANs and firewalls
- Implementing secure communication channels
- Role of encryption in protecting MMS, GOOSE, and SV
- Understanding GOOSE signing and Vlan priority tagging
- Defining security zones and conduits per IEC 62351–3
- Applying role–based access control (RBAC) in IEDs
- Using certificate–based authentication for clients
- Managing digital certificates and PKI infrastructure
- Secure configuration of access points and control blocks
- Protecting SCL files from unauthorised modification
- Monitoring for suspicious network behaviour
- Auditing access logs and control operations
- Hardening IED firmware and default password policies
- Conducting security gap assessments
- Integrating with utility-wide security operations
- Maintaining compliance with NERC CIP, ENISA, or equivalent
- Documenting security architecture in the SCD
Module 12: Project Integration, Commissioning, and Real-World Case Studies - Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts
Module 13: Career Advancement, Certification, and Next Steps - Positioning yourself as an IEC 61850 subject matter expert
- Adding value in tenders and technical proposals
- Using your Certificate of Completion in job applications
- How this credential strengthens consulting opportunities
- Leveraging IEC 61850 expertise for promotion
- Networking with other professionals in digital substation forums
- Preparing for advanced certification paths (e.g. CISSP–SCADA, PMP)
- Staying updated with IEC TC 57 working groups
- Accessing IEC 61850–10 test configuration repositories
- Publishing technical insights based on course projects
- Contributing to internal standards and best practice documents
- Leading IEC 61850 training sessions in your organisation
- Managing vendor relationships with technical confidence
- Participating in pilot projects for IEC 61868 (distribution)
- Transitioning to roles in system integration, consultancy, or design
- Tracking your professional development milestones
- Using progress tracking within the learning platform
- Receiving gamified badges for module completion
- Accessing downloadable templates and checklists
- Earning your Certificate of Completion issued by The Art of Service
Module 1: Foundations of IEC 61850 and Digital Substation Architecture - Understanding the evolution of substation automation protocols
- Why IEC 61850 replaced legacy standards like IEC 60870–5–103 and DNP3
- Core benefits of IEC 61850 for interoperability and scalability
- Overview of key parts of the standard: Part 1 to Part 10
- Role of IEC 61850 in smart grid transformation
- Digital vs. conventional substation: architectural comparison
- Understanding Intelligent Electronic Devices (IEDs) in modern networks
- Definition of the station, process, and bay levels in IEC 61850
- Functional decomposition using logical nodes and logical devices
- Introduction to object-oriented modelling in power systems
- Understanding the role of Communication Networks and Systems
- Mapping physical devices to logical hierarchies
- Key stakeholders in IEC 61850 implementation
- Challenges in legacy system integration
- Understanding market adoption trends and vendor support
- How utilities are leveraging IEC 61850 for lifecycle cost reduction
- Overview of regional regulatory drivers for standardisation
Module 2: Logical Node Modelling and Functional Decomposition - Principles of logical node (LN) classification
- Understanding standardised LN prefixes (A, G, I, P, T, etc.)
- Decoding LN naming conventions: example analysis
- Defining protection functions using common LNs: PTOC, PDIR, PSCH
- Modelling control functions: CSWI, CILO, CSIG
- Modelling measurement and monitoring: MMXU, MMTR, MV
- Modelling interlocking and automation: GSIN, SPS, SIP
- Interpreting LN data and data attributes (DA)
- Understanding data sets and their role in reporting
- Defining logical devices (LD) within IEDs
- Naming conventions for LDs: RELAY, CTRL, PROT, CTRL
- Grouping LNs by functional purpose
- Differentiating standardised vs. manufacturer-specific LNs
- Analyzing real-world LN implementation in relay manuals
- Role of function constraints (FC) in data access
- Understanding the FC codes: ST, MX, CO, SP, SG, SE
- Using functional decomposition for IED configuration
- Mapping protection schemes to logical node models
- Example: Creating a complete overcurrent protection model
- Validating model completeness against protection requirements
Module 3: Substation Configuration Language (SCL) Structure and Syntax - Overview of SCL file types: ICD, CID, SSD, SCD, and IID
- Understanding the purpose and exchange use of each SCL type
- SCL file architecture: root elements and hierarchy
- Analyzing the header section of an SCL file
- Defining substation topology using the Substation element
- Modelling voltage levels and bays
- Defining power transformers and conducting equipment
- Using Connectivity Nodes for terminal connection management
- Mapping physical devices to the IED element
- Understanding the Communication section and subnet configuration
- Defining access points for client–server and GOOSE communication
- Modelling logical devices and logical nodes in SCL
- Declaring data sets in the DataSets section
- Configuring Reports and their triggers (dchg, qchg, dupd)
- Defining control blocks for GOOSE and SV communication
- Understanding GSEControl and SampledValueControl elements
- Using Address elements for MAC, APPID, and VLAN configuration
- Analysing a complete SCL file from a 220kV substation
- Using SCL for audit and compliance checking
- Validating SCL syntax using XSD schema rules
Module 4: Engineering Workflows and SCL-Based Project Lifecycle - End–to–end project flow using IEC 61850 tools
- Step 1: Receiving ICD files from multiple vendors
- Step 2: Creating the System Specification Description (SSD)
- Step 3: Generating the System Configuration Description (SCD)
- Using system configuration tools for topology design
- Merging ICD files while preserving vendor-specific features
- Resolving naming conflicts between IEDs
- Defining communication networks and subnets
- Configuring GOOSE and SV publisher–subscriber mappings
- Generating CID files for individual IEDs
- Version control for SCL files in engineering projects
- Role of the system integrator in IEC 61850 projects
- Using change logs and audit trails in SCL management
- Handover documentation deliverables for clients
- Understanding the role of the SCD as a single source of truth
- Factory Acceptance Testing (FAT) using SCD-based validation
- Site Acceptance Testing (SAT) and IED commissioning
- Troubleshooting version mismatches between CID and ICD
- Benchmarking engineering effort across project sizes
- Automating parts of the configuration workflow
Module 5: GOOSE Messaging – Principles, Configuration, and Applications - Understanding GOOSE (Generic Object Oriented Substation Event)
- Why GOOSE replaces hardwired tripping and interlocking
- GOOSE vs. traditional binary signalling: cost and reliability impact
- How GOOSE messages are structured and transmitted
- Role of publisher and subscriber in GOOSE communication
- Configuration of GOOSE control blocks in SCL
- Setting up AppID, MAC address, and VLAN ID for GOOSE
- Understanding configurable parameters: MinTime, MaxTime
- Time–critical behaviour: 4 ms guarantee for protection signals
- GOOSE retransmission mechanisms and timing intervals
- Analysing GOOSE payload content using packet capture tools
- Using GOOSE for breaker failure protection schemes
- Designing busbar protection using GOOSE logic
- Implementing transfer trips and blocking signals over GOOSE
- Modelling breaker and disconnect interlocks via GOOSE
- Detecting GOOSE communication loss and failure responses
- Configuring GOOSE blocks with security attributes
- Troubleshooting misaligned GOOSE subscriptions
- Validating GOOSE mappings during integration testing
- Best practices for network segmentation to protect GOOSE traffic
Module 6: Sampled Values (SV) and Process Bus Architecture - Introduction to IEC 61850–9–2 Sampled Values
- Replacing copper current and voltage wiring with SV
- Difference between SV and traditional analogue inputs
- Architecture of the process bus: merging units and IEDs
- Role of the Merging Unit (MU) in data acquisition
- How MUs convert analogue signals to digital SV streams
- Understanding SV frame structure and payload
- Configuring SV control blocks in SCL files
- Setting APPID, VLAN, and destination MAC for SV
- Determining sample rates: 4 kHz, 8 kHz, and application limits
- Synchronisation requirements using IEEE 1588 or IRIG–B
- Impact of time accuracy on differential protection performance
- Designing redundancy for MUs: 1+1, hot standby, dual merging
- Troubleshooting SV data quality issues (invalid, substituted)
- Using monitored events to detect MU failures
- Analysing SV traffic patterns in a digital substation
- Benefits of fibre optic cabling for process bus
- Cost–benefit analysis: cabling reduction with SV implementation
- Interfacing legacy relays with SV via protocol converters
- Case study: retrofitting a 132 kV substation with SV
Module 7: Client–Server Communication and Reporting Services - Understanding client–server model in IEC 61850
- Role of the IED as server and HMI as client
- Overview of MMS (Manufacturing Message Specification)
- How MMS enables structured data access over TCP/IP
- Defining data set membership in reporting
- Configuring Report Control Blocks (RCB)
- Setting report triggers: dchg, qchg, dupd, integrity
- Understanding OptFields and inclusion of timestamp
- Setting MaxEnTRIES and buffers for event recording
- Managing sequence of events (SOE) via reporting
- Handling buffered reports during communication outages
- Using UR (Unbuffered Report) for real–time alarms
- Analysing report content in engineering tools
- Configuring Polling vs. unsolicited reporting
- Using event logs for fault analysis and maintenance
- Mapping alarm priorities to report configurations
- Integrating reports into SCADA systems
- Handling multiple report instances in large IEDs
- Best practices for bandwidth optimisation in reporting
- Security considerations for MMS data exposure
Module 8: Time Synchronisation and Network Performance - Importance of precise timing for GOOSE and SV
- Requirements for substation-wide time accuracy
- Overview of IRIG–B and its implementation
- Using GPS as primary time source
- IEEE 1588 Precision Time Protocol (PTP) fundamentals
- Differences between PTP Profiles: IEC 61850–9–3
- Understanding PTP message types: Sync, Follow_Up, Delay_Req
- Configuring Grandmaster and Boundary Clocks
- Network design for low jitter and latency
- Measuring time accuracy using packet analyzers
- Troubleshooting time desynchronisation events
- Impact of switch buffer delays on PTP performance
- Role of PTP transparent clocks in managed switches
- Redundant time sources and failover strategies
- Monitoring time quality flags in IEDs
- Assessing impact of time loss on protection schemes
- Selecting appropriate synchronisation method per voltage level
- Compliance testing of time distribution systems
- Maintaining timestamp integrity across multi–vendor systems
- Documentation of time architecture in SCD files
Module 9: Engineering Tools and Practical Configuration Exercises - Overview of industry-leading IEC 61850 engineering tools
- Using vendor configuration tools for IED setup
- Importing ICD files into system configurators
- Generating SCD files using example utility topology
- Performing GOOSE and SV mapping exercises
- Validating IED communication matrices
- Creating control schematics from SCL models
- Generating point lists for HMI and SCADA integration
- Using SCL-based tools for documentation automation
- Exporting single line diagrams with IEC 61850 tags
- Extracting relay setting templates from SCL
- Conducting gap analysis between design and as–built
- Using comparison tools for SCL version control
- Performing consistency checks across IED datasets
- Analysing communication load on substation network
- Testing configuration files using simulation environments
- Generating FAT and SAT test cases from SCL
- Using digital twins for integration validation
- Practising IED replacement using CID updates
- Exporting compliance reports for auditors
Module 10: Interoperability Testing and Certification Procedures - Importance of interoperability in multi–vendor projects
- Understanding KEMA, DNV, and UL certification schemes
- Overview of IEC 61850 conformance testing
- Defining the scope of interoperability test plans
- Test environment setup: IEDs, network, and tools
- Testing GOOSE publisher–subscriber communication
- Validating Sampled Values timing and content
- Testing Report services and buffer handling
- Verifying control operations via SBO and direct control
- Conducting time synchronisation validation
- Analyzing test results using packet capture tools
- Resolving communication failures during testing
- Generating test evidence for compliance audits
- Understanding IED Supplement to the User Requirements (ICD)
- Ensuring correctness of function constraints and access
- Testing configuration stability under network stress
- Handling undocumented extensions and vendor deviations
- Preparing IEDs for system integration testing
- Documenting test cases and results for handover
- Obtaining third–party certification for IEDs and systems
Module 11: Cybersecurity in IEC 61850 Environments - Security challenges in digital substations
- Understanding IEC 62351 for power system security
- Threat landscape: unauthorised access, spoofing, denial of service
- Segmentation strategies using VLANs and firewalls
- Implementing secure communication channels
- Role of encryption in protecting MMS, GOOSE, and SV
- Understanding GOOSE signing and Vlan priority tagging
- Defining security zones and conduits per IEC 62351–3
- Applying role–based access control (RBAC) in IEDs
- Using certificate–based authentication for clients
- Managing digital certificates and PKI infrastructure
- Secure configuration of access points and control blocks
- Protecting SCL files from unauthorised modification
- Monitoring for suspicious network behaviour
- Auditing access logs and control operations
- Hardening IED firmware and default password policies
- Conducting security gap assessments
- Integrating with utility-wide security operations
- Maintaining compliance with NERC CIP, ENISA, or equivalent
- Documenting security architecture in the SCD
Module 12: Project Integration, Commissioning, and Real-World Case Studies - Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts
Module 13: Career Advancement, Certification, and Next Steps - Positioning yourself as an IEC 61850 subject matter expert
- Adding value in tenders and technical proposals
- Using your Certificate of Completion in job applications
- How this credential strengthens consulting opportunities
- Leveraging IEC 61850 expertise for promotion
- Networking with other professionals in digital substation forums
- Preparing for advanced certification paths (e.g. CISSP–SCADA, PMP)
- Staying updated with IEC TC 57 working groups
- Accessing IEC 61850–10 test configuration repositories
- Publishing technical insights based on course projects
- Contributing to internal standards and best practice documents
- Leading IEC 61850 training sessions in your organisation
- Managing vendor relationships with technical confidence
- Participating in pilot projects for IEC 61868 (distribution)
- Transitioning to roles in system integration, consultancy, or design
- Tracking your professional development milestones
- Using progress tracking within the learning platform
- Receiving gamified badges for module completion
- Accessing downloadable templates and checklists
- Earning your Certificate of Completion issued by The Art of Service
- Principles of logical node (LN) classification
- Understanding standardised LN prefixes (A, G, I, P, T, etc.)
- Decoding LN naming conventions: example analysis
- Defining protection functions using common LNs: PTOC, PDIR, PSCH
- Modelling control functions: CSWI, CILO, CSIG
- Modelling measurement and monitoring: MMXU, MMTR, MV
- Modelling interlocking and automation: GSIN, SPS, SIP
- Interpreting LN data and data attributes (DA)
- Understanding data sets and their role in reporting
- Defining logical devices (LD) within IEDs
- Naming conventions for LDs: RELAY, CTRL, PROT, CTRL
- Grouping LNs by functional purpose
- Differentiating standardised vs. manufacturer-specific LNs
- Analyzing real-world LN implementation in relay manuals
- Role of function constraints (FC) in data access
- Understanding the FC codes: ST, MX, CO, SP, SG, SE
- Using functional decomposition for IED configuration
- Mapping protection schemes to logical node models
- Example: Creating a complete overcurrent protection model
- Validating model completeness against protection requirements
Module 3: Substation Configuration Language (SCL) Structure and Syntax - Overview of SCL file types: ICD, CID, SSD, SCD, and IID
- Understanding the purpose and exchange use of each SCL type
- SCL file architecture: root elements and hierarchy
- Analyzing the header section of an SCL file
- Defining substation topology using the Substation element
- Modelling voltage levels and bays
- Defining power transformers and conducting equipment
- Using Connectivity Nodes for terminal connection management
- Mapping physical devices to the IED element
- Understanding the Communication section and subnet configuration
- Defining access points for client–server and GOOSE communication
- Modelling logical devices and logical nodes in SCL
- Declaring data sets in the DataSets section
- Configuring Reports and their triggers (dchg, qchg, dupd)
- Defining control blocks for GOOSE and SV communication
- Understanding GSEControl and SampledValueControl elements
- Using Address elements for MAC, APPID, and VLAN configuration
- Analysing a complete SCL file from a 220kV substation
- Using SCL for audit and compliance checking
- Validating SCL syntax using XSD schema rules
Module 4: Engineering Workflows and SCL-Based Project Lifecycle - End–to–end project flow using IEC 61850 tools
- Step 1: Receiving ICD files from multiple vendors
- Step 2: Creating the System Specification Description (SSD)
- Step 3: Generating the System Configuration Description (SCD)
- Using system configuration tools for topology design
- Merging ICD files while preserving vendor-specific features
- Resolving naming conflicts between IEDs
- Defining communication networks and subnets
- Configuring GOOSE and SV publisher–subscriber mappings
- Generating CID files for individual IEDs
- Version control for SCL files in engineering projects
- Role of the system integrator in IEC 61850 projects
- Using change logs and audit trails in SCL management
- Handover documentation deliverables for clients
- Understanding the role of the SCD as a single source of truth
- Factory Acceptance Testing (FAT) using SCD-based validation
- Site Acceptance Testing (SAT) and IED commissioning
- Troubleshooting version mismatches between CID and ICD
- Benchmarking engineering effort across project sizes
- Automating parts of the configuration workflow
Module 5: GOOSE Messaging – Principles, Configuration, and Applications - Understanding GOOSE (Generic Object Oriented Substation Event)
- Why GOOSE replaces hardwired tripping and interlocking
- GOOSE vs. traditional binary signalling: cost and reliability impact
- How GOOSE messages are structured and transmitted
- Role of publisher and subscriber in GOOSE communication
- Configuration of GOOSE control blocks in SCL
- Setting up AppID, MAC address, and VLAN ID for GOOSE
- Understanding configurable parameters: MinTime, MaxTime
- Time–critical behaviour: 4 ms guarantee for protection signals
- GOOSE retransmission mechanisms and timing intervals
- Analysing GOOSE payload content using packet capture tools
- Using GOOSE for breaker failure protection schemes
- Designing busbar protection using GOOSE logic
- Implementing transfer trips and blocking signals over GOOSE
- Modelling breaker and disconnect interlocks via GOOSE
- Detecting GOOSE communication loss and failure responses
- Configuring GOOSE blocks with security attributes
- Troubleshooting misaligned GOOSE subscriptions
- Validating GOOSE mappings during integration testing
- Best practices for network segmentation to protect GOOSE traffic
Module 6: Sampled Values (SV) and Process Bus Architecture - Introduction to IEC 61850–9–2 Sampled Values
- Replacing copper current and voltage wiring with SV
- Difference between SV and traditional analogue inputs
- Architecture of the process bus: merging units and IEDs
- Role of the Merging Unit (MU) in data acquisition
- How MUs convert analogue signals to digital SV streams
- Understanding SV frame structure and payload
- Configuring SV control blocks in SCL files
- Setting APPID, VLAN, and destination MAC for SV
- Determining sample rates: 4 kHz, 8 kHz, and application limits
- Synchronisation requirements using IEEE 1588 or IRIG–B
- Impact of time accuracy on differential protection performance
- Designing redundancy for MUs: 1+1, hot standby, dual merging
- Troubleshooting SV data quality issues (invalid, substituted)
- Using monitored events to detect MU failures
- Analysing SV traffic patterns in a digital substation
- Benefits of fibre optic cabling for process bus
- Cost–benefit analysis: cabling reduction with SV implementation
- Interfacing legacy relays with SV via protocol converters
- Case study: retrofitting a 132 kV substation with SV
Module 7: Client–Server Communication and Reporting Services - Understanding client–server model in IEC 61850
- Role of the IED as server and HMI as client
- Overview of MMS (Manufacturing Message Specification)
- How MMS enables structured data access over TCP/IP
- Defining data set membership in reporting
- Configuring Report Control Blocks (RCB)
- Setting report triggers: dchg, qchg, dupd, integrity
- Understanding OptFields and inclusion of timestamp
- Setting MaxEnTRIES and buffers for event recording
- Managing sequence of events (SOE) via reporting
- Handling buffered reports during communication outages
- Using UR (Unbuffered Report) for real–time alarms
- Analysing report content in engineering tools
- Configuring Polling vs. unsolicited reporting
- Using event logs for fault analysis and maintenance
- Mapping alarm priorities to report configurations
- Integrating reports into SCADA systems
- Handling multiple report instances in large IEDs
- Best practices for bandwidth optimisation in reporting
- Security considerations for MMS data exposure
Module 8: Time Synchronisation and Network Performance - Importance of precise timing for GOOSE and SV
- Requirements for substation-wide time accuracy
- Overview of IRIG–B and its implementation
- Using GPS as primary time source
- IEEE 1588 Precision Time Protocol (PTP) fundamentals
- Differences between PTP Profiles: IEC 61850–9–3
- Understanding PTP message types: Sync, Follow_Up, Delay_Req
- Configuring Grandmaster and Boundary Clocks
- Network design for low jitter and latency
- Measuring time accuracy using packet analyzers
- Troubleshooting time desynchronisation events
- Impact of switch buffer delays on PTP performance
- Role of PTP transparent clocks in managed switches
- Redundant time sources and failover strategies
- Monitoring time quality flags in IEDs
- Assessing impact of time loss on protection schemes
- Selecting appropriate synchronisation method per voltage level
- Compliance testing of time distribution systems
- Maintaining timestamp integrity across multi–vendor systems
- Documentation of time architecture in SCD files
Module 9: Engineering Tools and Practical Configuration Exercises - Overview of industry-leading IEC 61850 engineering tools
- Using vendor configuration tools for IED setup
- Importing ICD files into system configurators
- Generating SCD files using example utility topology
- Performing GOOSE and SV mapping exercises
- Validating IED communication matrices
- Creating control schematics from SCL models
- Generating point lists for HMI and SCADA integration
- Using SCL-based tools for documentation automation
- Exporting single line diagrams with IEC 61850 tags
- Extracting relay setting templates from SCL
- Conducting gap analysis between design and as–built
- Using comparison tools for SCL version control
- Performing consistency checks across IED datasets
- Analysing communication load on substation network
- Testing configuration files using simulation environments
- Generating FAT and SAT test cases from SCL
- Using digital twins for integration validation
- Practising IED replacement using CID updates
- Exporting compliance reports for auditors
Module 10: Interoperability Testing and Certification Procedures - Importance of interoperability in multi–vendor projects
- Understanding KEMA, DNV, and UL certification schemes
- Overview of IEC 61850 conformance testing
- Defining the scope of interoperability test plans
- Test environment setup: IEDs, network, and tools
- Testing GOOSE publisher–subscriber communication
- Validating Sampled Values timing and content
- Testing Report services and buffer handling
- Verifying control operations via SBO and direct control
- Conducting time synchronisation validation
- Analyzing test results using packet capture tools
- Resolving communication failures during testing
- Generating test evidence for compliance audits
- Understanding IED Supplement to the User Requirements (ICD)
- Ensuring correctness of function constraints and access
- Testing configuration stability under network stress
- Handling undocumented extensions and vendor deviations
- Preparing IEDs for system integration testing
- Documenting test cases and results for handover
- Obtaining third–party certification for IEDs and systems
Module 11: Cybersecurity in IEC 61850 Environments - Security challenges in digital substations
- Understanding IEC 62351 for power system security
- Threat landscape: unauthorised access, spoofing, denial of service
- Segmentation strategies using VLANs and firewalls
- Implementing secure communication channels
- Role of encryption in protecting MMS, GOOSE, and SV
- Understanding GOOSE signing and Vlan priority tagging
- Defining security zones and conduits per IEC 62351–3
- Applying role–based access control (RBAC) in IEDs
- Using certificate–based authentication for clients
- Managing digital certificates and PKI infrastructure
- Secure configuration of access points and control blocks
- Protecting SCL files from unauthorised modification
- Monitoring for suspicious network behaviour
- Auditing access logs and control operations
- Hardening IED firmware and default password policies
- Conducting security gap assessments
- Integrating with utility-wide security operations
- Maintaining compliance with NERC CIP, ENISA, or equivalent
- Documenting security architecture in the SCD
Module 12: Project Integration, Commissioning, and Real-World Case Studies - Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts
Module 13: Career Advancement, Certification, and Next Steps - Positioning yourself as an IEC 61850 subject matter expert
- Adding value in tenders and technical proposals
- Using your Certificate of Completion in job applications
- How this credential strengthens consulting opportunities
- Leveraging IEC 61850 expertise for promotion
- Networking with other professionals in digital substation forums
- Preparing for advanced certification paths (e.g. CISSP–SCADA, PMP)
- Staying updated with IEC TC 57 working groups
- Accessing IEC 61850–10 test configuration repositories
- Publishing technical insights based on course projects
- Contributing to internal standards and best practice documents
- Leading IEC 61850 training sessions in your organisation
- Managing vendor relationships with technical confidence
- Participating in pilot projects for IEC 61868 (distribution)
- Transitioning to roles in system integration, consultancy, or design
- Tracking your professional development milestones
- Using progress tracking within the learning platform
- Receiving gamified badges for module completion
- Accessing downloadable templates and checklists
- Earning your Certificate of Completion issued by The Art of Service
- End–to–end project flow using IEC 61850 tools
- Step 1: Receiving ICD files from multiple vendors
- Step 2: Creating the System Specification Description (SSD)
- Step 3: Generating the System Configuration Description (SCD)
- Using system configuration tools for topology design
- Merging ICD files while preserving vendor-specific features
- Resolving naming conflicts between IEDs
- Defining communication networks and subnets
- Configuring GOOSE and SV publisher–subscriber mappings
- Generating CID files for individual IEDs
- Version control for SCL files in engineering projects
- Role of the system integrator in IEC 61850 projects
- Using change logs and audit trails in SCL management
- Handover documentation deliverables for clients
- Understanding the role of the SCD as a single source of truth
- Factory Acceptance Testing (FAT) using SCD-based validation
- Site Acceptance Testing (SAT) and IED commissioning
- Troubleshooting version mismatches between CID and ICD
- Benchmarking engineering effort across project sizes
- Automating parts of the configuration workflow
Module 5: GOOSE Messaging – Principles, Configuration, and Applications - Understanding GOOSE (Generic Object Oriented Substation Event)
- Why GOOSE replaces hardwired tripping and interlocking
- GOOSE vs. traditional binary signalling: cost and reliability impact
- How GOOSE messages are structured and transmitted
- Role of publisher and subscriber in GOOSE communication
- Configuration of GOOSE control blocks in SCL
- Setting up AppID, MAC address, and VLAN ID for GOOSE
- Understanding configurable parameters: MinTime, MaxTime
- Time–critical behaviour: 4 ms guarantee for protection signals
- GOOSE retransmission mechanisms and timing intervals
- Analysing GOOSE payload content using packet capture tools
- Using GOOSE for breaker failure protection schemes
- Designing busbar protection using GOOSE logic
- Implementing transfer trips and blocking signals over GOOSE
- Modelling breaker and disconnect interlocks via GOOSE
- Detecting GOOSE communication loss and failure responses
- Configuring GOOSE blocks with security attributes
- Troubleshooting misaligned GOOSE subscriptions
- Validating GOOSE mappings during integration testing
- Best practices for network segmentation to protect GOOSE traffic
Module 6: Sampled Values (SV) and Process Bus Architecture - Introduction to IEC 61850–9–2 Sampled Values
- Replacing copper current and voltage wiring with SV
- Difference between SV and traditional analogue inputs
- Architecture of the process bus: merging units and IEDs
- Role of the Merging Unit (MU) in data acquisition
- How MUs convert analogue signals to digital SV streams
- Understanding SV frame structure and payload
- Configuring SV control blocks in SCL files
- Setting APPID, VLAN, and destination MAC for SV
- Determining sample rates: 4 kHz, 8 kHz, and application limits
- Synchronisation requirements using IEEE 1588 or IRIG–B
- Impact of time accuracy on differential protection performance
- Designing redundancy for MUs: 1+1, hot standby, dual merging
- Troubleshooting SV data quality issues (invalid, substituted)
- Using monitored events to detect MU failures
- Analysing SV traffic patterns in a digital substation
- Benefits of fibre optic cabling for process bus
- Cost–benefit analysis: cabling reduction with SV implementation
- Interfacing legacy relays with SV via protocol converters
- Case study: retrofitting a 132 kV substation with SV
Module 7: Client–Server Communication and Reporting Services - Understanding client–server model in IEC 61850
- Role of the IED as server and HMI as client
- Overview of MMS (Manufacturing Message Specification)
- How MMS enables structured data access over TCP/IP
- Defining data set membership in reporting
- Configuring Report Control Blocks (RCB)
- Setting report triggers: dchg, qchg, dupd, integrity
- Understanding OptFields and inclusion of timestamp
- Setting MaxEnTRIES and buffers for event recording
- Managing sequence of events (SOE) via reporting
- Handling buffered reports during communication outages
- Using UR (Unbuffered Report) for real–time alarms
- Analysing report content in engineering tools
- Configuring Polling vs. unsolicited reporting
- Using event logs for fault analysis and maintenance
- Mapping alarm priorities to report configurations
- Integrating reports into SCADA systems
- Handling multiple report instances in large IEDs
- Best practices for bandwidth optimisation in reporting
- Security considerations for MMS data exposure
Module 8: Time Synchronisation and Network Performance - Importance of precise timing for GOOSE and SV
- Requirements for substation-wide time accuracy
- Overview of IRIG–B and its implementation
- Using GPS as primary time source
- IEEE 1588 Precision Time Protocol (PTP) fundamentals
- Differences between PTP Profiles: IEC 61850–9–3
- Understanding PTP message types: Sync, Follow_Up, Delay_Req
- Configuring Grandmaster and Boundary Clocks
- Network design for low jitter and latency
- Measuring time accuracy using packet analyzers
- Troubleshooting time desynchronisation events
- Impact of switch buffer delays on PTP performance
- Role of PTP transparent clocks in managed switches
- Redundant time sources and failover strategies
- Monitoring time quality flags in IEDs
- Assessing impact of time loss on protection schemes
- Selecting appropriate synchronisation method per voltage level
- Compliance testing of time distribution systems
- Maintaining timestamp integrity across multi–vendor systems
- Documentation of time architecture in SCD files
Module 9: Engineering Tools and Practical Configuration Exercises - Overview of industry-leading IEC 61850 engineering tools
- Using vendor configuration tools for IED setup
- Importing ICD files into system configurators
- Generating SCD files using example utility topology
- Performing GOOSE and SV mapping exercises
- Validating IED communication matrices
- Creating control schematics from SCL models
- Generating point lists for HMI and SCADA integration
- Using SCL-based tools for documentation automation
- Exporting single line diagrams with IEC 61850 tags
- Extracting relay setting templates from SCL
- Conducting gap analysis between design and as–built
- Using comparison tools for SCL version control
- Performing consistency checks across IED datasets
- Analysing communication load on substation network
- Testing configuration files using simulation environments
- Generating FAT and SAT test cases from SCL
- Using digital twins for integration validation
- Practising IED replacement using CID updates
- Exporting compliance reports for auditors
Module 10: Interoperability Testing and Certification Procedures - Importance of interoperability in multi–vendor projects
- Understanding KEMA, DNV, and UL certification schemes
- Overview of IEC 61850 conformance testing
- Defining the scope of interoperability test plans
- Test environment setup: IEDs, network, and tools
- Testing GOOSE publisher–subscriber communication
- Validating Sampled Values timing and content
- Testing Report services and buffer handling
- Verifying control operations via SBO and direct control
- Conducting time synchronisation validation
- Analyzing test results using packet capture tools
- Resolving communication failures during testing
- Generating test evidence for compliance audits
- Understanding IED Supplement to the User Requirements (ICD)
- Ensuring correctness of function constraints and access
- Testing configuration stability under network stress
- Handling undocumented extensions and vendor deviations
- Preparing IEDs for system integration testing
- Documenting test cases and results for handover
- Obtaining third–party certification for IEDs and systems
Module 11: Cybersecurity in IEC 61850 Environments - Security challenges in digital substations
- Understanding IEC 62351 for power system security
- Threat landscape: unauthorised access, spoofing, denial of service
- Segmentation strategies using VLANs and firewalls
- Implementing secure communication channels
- Role of encryption in protecting MMS, GOOSE, and SV
- Understanding GOOSE signing and Vlan priority tagging
- Defining security zones and conduits per IEC 62351–3
- Applying role–based access control (RBAC) in IEDs
- Using certificate–based authentication for clients
- Managing digital certificates and PKI infrastructure
- Secure configuration of access points and control blocks
- Protecting SCL files from unauthorised modification
- Monitoring for suspicious network behaviour
- Auditing access logs and control operations
- Hardening IED firmware and default password policies
- Conducting security gap assessments
- Integrating with utility-wide security operations
- Maintaining compliance with NERC CIP, ENISA, or equivalent
- Documenting security architecture in the SCD
Module 12: Project Integration, Commissioning, and Real-World Case Studies - Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts
Module 13: Career Advancement, Certification, and Next Steps - Positioning yourself as an IEC 61850 subject matter expert
- Adding value in tenders and technical proposals
- Using your Certificate of Completion in job applications
- How this credential strengthens consulting opportunities
- Leveraging IEC 61850 expertise for promotion
- Networking with other professionals in digital substation forums
- Preparing for advanced certification paths (e.g. CISSP–SCADA, PMP)
- Staying updated with IEC TC 57 working groups
- Accessing IEC 61850–10 test configuration repositories
- Publishing technical insights based on course projects
- Contributing to internal standards and best practice documents
- Leading IEC 61850 training sessions in your organisation
- Managing vendor relationships with technical confidence
- Participating in pilot projects for IEC 61868 (distribution)
- Transitioning to roles in system integration, consultancy, or design
- Tracking your professional development milestones
- Using progress tracking within the learning platform
- Receiving gamified badges for module completion
- Accessing downloadable templates and checklists
- Earning your Certificate of Completion issued by The Art of Service
- Introduction to IEC 61850–9–2 Sampled Values
- Replacing copper current and voltage wiring with SV
- Difference between SV and traditional analogue inputs
- Architecture of the process bus: merging units and IEDs
- Role of the Merging Unit (MU) in data acquisition
- How MUs convert analogue signals to digital SV streams
- Understanding SV frame structure and payload
- Configuring SV control blocks in SCL files
- Setting APPID, VLAN, and destination MAC for SV
- Determining sample rates: 4 kHz, 8 kHz, and application limits
- Synchronisation requirements using IEEE 1588 or IRIG–B
- Impact of time accuracy on differential protection performance
- Designing redundancy for MUs: 1+1, hot standby, dual merging
- Troubleshooting SV data quality issues (invalid, substituted)
- Using monitored events to detect MU failures
- Analysing SV traffic patterns in a digital substation
- Benefits of fibre optic cabling for process bus
- Cost–benefit analysis: cabling reduction with SV implementation
- Interfacing legacy relays with SV via protocol converters
- Case study: retrofitting a 132 kV substation with SV
Module 7: Client–Server Communication and Reporting Services - Understanding client–server model in IEC 61850
- Role of the IED as server and HMI as client
- Overview of MMS (Manufacturing Message Specification)
- How MMS enables structured data access over TCP/IP
- Defining data set membership in reporting
- Configuring Report Control Blocks (RCB)
- Setting report triggers: dchg, qchg, dupd, integrity
- Understanding OptFields and inclusion of timestamp
- Setting MaxEnTRIES and buffers for event recording
- Managing sequence of events (SOE) via reporting
- Handling buffered reports during communication outages
- Using UR (Unbuffered Report) for real–time alarms
- Analysing report content in engineering tools
- Configuring Polling vs. unsolicited reporting
- Using event logs for fault analysis and maintenance
- Mapping alarm priorities to report configurations
- Integrating reports into SCADA systems
- Handling multiple report instances in large IEDs
- Best practices for bandwidth optimisation in reporting
- Security considerations for MMS data exposure
Module 8: Time Synchronisation and Network Performance - Importance of precise timing for GOOSE and SV
- Requirements for substation-wide time accuracy
- Overview of IRIG–B and its implementation
- Using GPS as primary time source
- IEEE 1588 Precision Time Protocol (PTP) fundamentals
- Differences between PTP Profiles: IEC 61850–9–3
- Understanding PTP message types: Sync, Follow_Up, Delay_Req
- Configuring Grandmaster and Boundary Clocks
- Network design for low jitter and latency
- Measuring time accuracy using packet analyzers
- Troubleshooting time desynchronisation events
- Impact of switch buffer delays on PTP performance
- Role of PTP transparent clocks in managed switches
- Redundant time sources and failover strategies
- Monitoring time quality flags in IEDs
- Assessing impact of time loss on protection schemes
- Selecting appropriate synchronisation method per voltage level
- Compliance testing of time distribution systems
- Maintaining timestamp integrity across multi–vendor systems
- Documentation of time architecture in SCD files
Module 9: Engineering Tools and Practical Configuration Exercises - Overview of industry-leading IEC 61850 engineering tools
- Using vendor configuration tools for IED setup
- Importing ICD files into system configurators
- Generating SCD files using example utility topology
- Performing GOOSE and SV mapping exercises
- Validating IED communication matrices
- Creating control schematics from SCL models
- Generating point lists for HMI and SCADA integration
- Using SCL-based tools for documentation automation
- Exporting single line diagrams with IEC 61850 tags
- Extracting relay setting templates from SCL
- Conducting gap analysis between design and as–built
- Using comparison tools for SCL version control
- Performing consistency checks across IED datasets
- Analysing communication load on substation network
- Testing configuration files using simulation environments
- Generating FAT and SAT test cases from SCL
- Using digital twins for integration validation
- Practising IED replacement using CID updates
- Exporting compliance reports for auditors
Module 10: Interoperability Testing and Certification Procedures - Importance of interoperability in multi–vendor projects
- Understanding KEMA, DNV, and UL certification schemes
- Overview of IEC 61850 conformance testing
- Defining the scope of interoperability test plans
- Test environment setup: IEDs, network, and tools
- Testing GOOSE publisher–subscriber communication
- Validating Sampled Values timing and content
- Testing Report services and buffer handling
- Verifying control operations via SBO and direct control
- Conducting time synchronisation validation
- Analyzing test results using packet capture tools
- Resolving communication failures during testing
- Generating test evidence for compliance audits
- Understanding IED Supplement to the User Requirements (ICD)
- Ensuring correctness of function constraints and access
- Testing configuration stability under network stress
- Handling undocumented extensions and vendor deviations
- Preparing IEDs for system integration testing
- Documenting test cases and results for handover
- Obtaining third–party certification for IEDs and systems
Module 11: Cybersecurity in IEC 61850 Environments - Security challenges in digital substations
- Understanding IEC 62351 for power system security
- Threat landscape: unauthorised access, spoofing, denial of service
- Segmentation strategies using VLANs and firewalls
- Implementing secure communication channels
- Role of encryption in protecting MMS, GOOSE, and SV
- Understanding GOOSE signing and Vlan priority tagging
- Defining security zones and conduits per IEC 62351–3
- Applying role–based access control (RBAC) in IEDs
- Using certificate–based authentication for clients
- Managing digital certificates and PKI infrastructure
- Secure configuration of access points and control blocks
- Protecting SCL files from unauthorised modification
- Monitoring for suspicious network behaviour
- Auditing access logs and control operations
- Hardening IED firmware and default password policies
- Conducting security gap assessments
- Integrating with utility-wide security operations
- Maintaining compliance with NERC CIP, ENISA, or equivalent
- Documenting security architecture in the SCD
Module 12: Project Integration, Commissioning, and Real-World Case Studies - Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts
Module 13: Career Advancement, Certification, and Next Steps - Positioning yourself as an IEC 61850 subject matter expert
- Adding value in tenders and technical proposals
- Using your Certificate of Completion in job applications
- How this credential strengthens consulting opportunities
- Leveraging IEC 61850 expertise for promotion
- Networking with other professionals in digital substation forums
- Preparing for advanced certification paths (e.g. CISSP–SCADA, PMP)
- Staying updated with IEC TC 57 working groups
- Accessing IEC 61850–10 test configuration repositories
- Publishing technical insights based on course projects
- Contributing to internal standards and best practice documents
- Leading IEC 61850 training sessions in your organisation
- Managing vendor relationships with technical confidence
- Participating in pilot projects for IEC 61868 (distribution)
- Transitioning to roles in system integration, consultancy, or design
- Tracking your professional development milestones
- Using progress tracking within the learning platform
- Receiving gamified badges for module completion
- Accessing downloadable templates and checklists
- Earning your Certificate of Completion issued by The Art of Service
- Importance of precise timing for GOOSE and SV
- Requirements for substation-wide time accuracy
- Overview of IRIG–B and its implementation
- Using GPS as primary time source
- IEEE 1588 Precision Time Protocol (PTP) fundamentals
- Differences between PTP Profiles: IEC 61850–9–3
- Understanding PTP message types: Sync, Follow_Up, Delay_Req
- Configuring Grandmaster and Boundary Clocks
- Network design for low jitter and latency
- Measuring time accuracy using packet analyzers
- Troubleshooting time desynchronisation events
- Impact of switch buffer delays on PTP performance
- Role of PTP transparent clocks in managed switches
- Redundant time sources and failover strategies
- Monitoring time quality flags in IEDs
- Assessing impact of time loss on protection schemes
- Selecting appropriate synchronisation method per voltage level
- Compliance testing of time distribution systems
- Maintaining timestamp integrity across multi–vendor systems
- Documentation of time architecture in SCD files
Module 9: Engineering Tools and Practical Configuration Exercises - Overview of industry-leading IEC 61850 engineering tools
- Using vendor configuration tools for IED setup
- Importing ICD files into system configurators
- Generating SCD files using example utility topology
- Performing GOOSE and SV mapping exercises
- Validating IED communication matrices
- Creating control schematics from SCL models
- Generating point lists for HMI and SCADA integration
- Using SCL-based tools for documentation automation
- Exporting single line diagrams with IEC 61850 tags
- Extracting relay setting templates from SCL
- Conducting gap analysis between design and as–built
- Using comparison tools for SCL version control
- Performing consistency checks across IED datasets
- Analysing communication load on substation network
- Testing configuration files using simulation environments
- Generating FAT and SAT test cases from SCL
- Using digital twins for integration validation
- Practising IED replacement using CID updates
- Exporting compliance reports for auditors
Module 10: Interoperability Testing and Certification Procedures - Importance of interoperability in multi–vendor projects
- Understanding KEMA, DNV, and UL certification schemes
- Overview of IEC 61850 conformance testing
- Defining the scope of interoperability test plans
- Test environment setup: IEDs, network, and tools
- Testing GOOSE publisher–subscriber communication
- Validating Sampled Values timing and content
- Testing Report services and buffer handling
- Verifying control operations via SBO and direct control
- Conducting time synchronisation validation
- Analyzing test results using packet capture tools
- Resolving communication failures during testing
- Generating test evidence for compliance audits
- Understanding IED Supplement to the User Requirements (ICD)
- Ensuring correctness of function constraints and access
- Testing configuration stability under network stress
- Handling undocumented extensions and vendor deviations
- Preparing IEDs for system integration testing
- Documenting test cases and results for handover
- Obtaining third–party certification for IEDs and systems
Module 11: Cybersecurity in IEC 61850 Environments - Security challenges in digital substations
- Understanding IEC 62351 for power system security
- Threat landscape: unauthorised access, spoofing, denial of service
- Segmentation strategies using VLANs and firewalls
- Implementing secure communication channels
- Role of encryption in protecting MMS, GOOSE, and SV
- Understanding GOOSE signing and Vlan priority tagging
- Defining security zones and conduits per IEC 62351–3
- Applying role–based access control (RBAC) in IEDs
- Using certificate–based authentication for clients
- Managing digital certificates and PKI infrastructure
- Secure configuration of access points and control blocks
- Protecting SCL files from unauthorised modification
- Monitoring for suspicious network behaviour
- Auditing access logs and control operations
- Hardening IED firmware and default password policies
- Conducting security gap assessments
- Integrating with utility-wide security operations
- Maintaining compliance with NERC CIP, ENISA, or equivalent
- Documenting security architecture in the SCD
Module 12: Project Integration, Commissioning, and Real-World Case Studies - Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts
Module 13: Career Advancement, Certification, and Next Steps - Positioning yourself as an IEC 61850 subject matter expert
- Adding value in tenders and technical proposals
- Using your Certificate of Completion in job applications
- How this credential strengthens consulting opportunities
- Leveraging IEC 61850 expertise for promotion
- Networking with other professionals in digital substation forums
- Preparing for advanced certification paths (e.g. CISSP–SCADA, PMP)
- Staying updated with IEC TC 57 working groups
- Accessing IEC 61850–10 test configuration repositories
- Publishing technical insights based on course projects
- Contributing to internal standards and best practice documents
- Leading IEC 61850 training sessions in your organisation
- Managing vendor relationships with technical confidence
- Participating in pilot projects for IEC 61868 (distribution)
- Transitioning to roles in system integration, consultancy, or design
- Tracking your professional development milestones
- Using progress tracking within the learning platform
- Receiving gamified badges for module completion
- Accessing downloadable templates and checklists
- Earning your Certificate of Completion issued by The Art of Service
- Importance of interoperability in multi–vendor projects
- Understanding KEMA, DNV, and UL certification schemes
- Overview of IEC 61850 conformance testing
- Defining the scope of interoperability test plans
- Test environment setup: IEDs, network, and tools
- Testing GOOSE publisher–subscriber communication
- Validating Sampled Values timing and content
- Testing Report services and buffer handling
- Verifying control operations via SBO and direct control
- Conducting time synchronisation validation
- Analyzing test results using packet capture tools
- Resolving communication failures during testing
- Generating test evidence for compliance audits
- Understanding IED Supplement to the User Requirements (ICD)
- Ensuring correctness of function constraints and access
- Testing configuration stability under network stress
- Handling undocumented extensions and vendor deviations
- Preparing IEDs for system integration testing
- Documenting test cases and results for handover
- Obtaining third–party certification for IEDs and systems
Module 11: Cybersecurity in IEC 61850 Environments - Security challenges in digital substations
- Understanding IEC 62351 for power system security
- Threat landscape: unauthorised access, spoofing, denial of service
- Segmentation strategies using VLANs and firewalls
- Implementing secure communication channels
- Role of encryption in protecting MMS, GOOSE, and SV
- Understanding GOOSE signing and Vlan priority tagging
- Defining security zones and conduits per IEC 62351–3
- Applying role–based access control (RBAC) in IEDs
- Using certificate–based authentication for clients
- Managing digital certificates and PKI infrastructure
- Secure configuration of access points and control blocks
- Protecting SCL files from unauthorised modification
- Monitoring for suspicious network behaviour
- Auditing access logs and control operations
- Hardening IED firmware and default password policies
- Conducting security gap assessments
- Integrating with utility-wide security operations
- Maintaining compliance with NERC CIP, ENISA, or equivalent
- Documenting security architecture in the SCD
Module 12: Project Integration, Commissioning, and Real-World Case Studies - Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts
Module 13: Career Advancement, Certification, and Next Steps - Positioning yourself as an IEC 61850 subject matter expert
- Adding value in tenders and technical proposals
- Using your Certificate of Completion in job applications
- How this credential strengthens consulting opportunities
- Leveraging IEC 61850 expertise for promotion
- Networking with other professionals in digital substation forums
- Preparing for advanced certification paths (e.g. CISSP–SCADA, PMP)
- Staying updated with IEC TC 57 working groups
- Accessing IEC 61850–10 test configuration repositories
- Publishing technical insights based on course projects
- Contributing to internal standards and best practice documents
- Leading IEC 61850 training sessions in your organisation
- Managing vendor relationships with technical confidence
- Participating in pilot projects for IEC 61868 (distribution)
- Transitioning to roles in system integration, consultancy, or design
- Tracking your professional development milestones
- Using progress tracking within the learning platform
- Receiving gamified badges for module completion
- Accessing downloadable templates and checklists
- Earning your Certificate of Completion issued by The Art of Service
- Transitioning from design to field commissioning
- Site preparation checklist for IEC 61850 integration
- Validating network infrastructure: cabling, switches, and SPF
- Uploading CID files to IEDs and verifying configuration
- Testing GOOSE communication with digital simulators
- Verifying Sampled Values using test sets and analysers
- Performing end–to–end protection scheme testing
- Conducting GOOSE stress tests under network load
- Testing time synchronisation fallback mechanisms
- Documenting as–built SCL files and configuration records
- Handover procedures to operations and maintenance teams
- Creating O&M manuals with IEC 61850 references
- Case Study: Greenfield 400 kV substation with full IEC 61850
- Case Study: Brownfield upgrade with mixed protocol environment
- Case Study: Offshore wind farm using GOOSE for interlocking
- Case Study: Railway traction substation using process bus
- Troubleshooting communication blackouts in live networks
- Resolving VLAN misconfiguration across subnetworks
- Handling firmware mismatch between IEDs
- Lessons learned from failed integration attempts