Cyber Security in Manufacturing

Product type

Cyber Security in Manufacturing

Coursera (CC)
Logo Coursera (CC)
Provider rating: starstarstarstar_halfstar_border 7.2 Coursera (CC) has an average rating of 7.2 (out of 6 reviews)

Need more information? Get more details on the site of the provider.

Description

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain valuable insights of implementing controls to mitigate identified risks. Main concepts of this course will be delivered through lectures, readings, discussions and various videos. This is the eighth course in the Digital Manufacturing & Design Technology specialization that explores the many facets of manufacturing’s “Fourth Revolution,” and features a culminating project involving creation of a roadmap to achieve a self-established DMD-related professional goal. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/r-VHiwsg_t0

Who is this class for: This course is for anyone interested in how digital advances are changing the landscape and capabilities of manufacturing, from high school graduates exploring careers to operations managers and business owners hungry for an understanding of the newest manufacturing technologies.

Created by:  University at Buffalo, The State University of New York
  • Taught by:  Shambhu Upadhyaya, Professor

    Computer Science and Engineering
Basic Info Course 8 of 10 in the Digital Manufacturing & Design Technology Specialization Level Beginner Commitment 4 weeks of study, 3 ½ hours per week Language English How To Pass Pass all graded assignments to complete the course. User Ratings 4.7 stars Average User Rating 4.7See what learners said Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from your peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

University at Buffalo The University at Buffalo (UB) team includes the School of Engineering and Applied Sciences, the most comprehensive public school of engineering in New York; the Center for Industrial Effectiveness (TCIE), an engineering outreach center that supports the business community; and the Center for Educational Innovation, which elevates pedagogical advancement and improved learning. UB, a research-intensive public university, is the largest institution of the State University of New York system. The State University of New York The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe.

Syllabus


WEEK 1


Introduction to Digital Manufacturing Security
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.


9 videos, 7 readings, 4 practice quizzes expand


  1. Video: Course Introduction
  2. Video: Digital Manufacturing Security Part 1
  3. Reading: Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 1
  4. Video: Digital Manufacturing Security - Part 2
  5. Reading: Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 2
  6. Practice Quiz: Self-check
  7. Reading: Acknowledgements
  8. Video: Information Security Framework - Part 1
  9. Reading: Additional (optional) Resources: Information Security Framework, Part 1
  10. Video: Information Security Framework - Part 2
  11. Reading: Additional (optional) Resources: Information Security Framework, Part 2
  12. Practice Quiz: Self-check
  13. Video: Operational Technology and Informational Technology
  14. Video: Risk Management
  15. Practice Quiz: Self-check
  16. Video: Application of Information Security - Part 1
  17. Reading: Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 1
  18. Video: Application of Information Security - Part 2
  19. Reading: Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 2
  20. Practice Quiz: Self-check

Graded: Cyber Security in Manufacturing- Week 1 Quiz

WEEK 2


Guidance on Securing Digital Manufacturing Operations
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.


6 videos, 6 readings, 5 practice quizzes expand


  1. Video: Securing all Aspects of a Digital Manufacturing Operation
  2. Reading: Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics
  3. Practice Quiz: Self-check
  4. Video: Human-Machine and M2M Interactions
  5. Reading: Additional (optional) Resources: Human-Machine and Machine to Machine Interactions
  6. Practice Quiz: Self-check
  7. Video: Securing End to End Process via Security Development Life Cycle
  8. Reading: Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle
  9. Practice Quiz: Self-check
  10. Video: Software Security Flaws and Threats
  11. Reading: Additional (optional) Resources: Software Security and Secure Programming Practices
  12. Practice Quiz: Self-check
  13. Video: Network Security and Authentication - Part 1
  14. Reading: Additional (optional) Resources: Network Security and Authentication, Part 1
  15. Video: Network Security and Authentication - Part 2
  16. Reading: Additional (optional) Resources: Network Security and Authentication, Part 2
  17. Practice Quiz: Self-Check
  18. Discussion Prompt: Software Security

Graded: Cyber Security in Manufacturing- Week 2 Quiz

WEEK 3


Protecting Operational Technologies and Intellectual Property



The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.


7 videos, 7 readings, 5 practice quizzes expand


  1. Video: Protecting Operational Technologies and Intellectual Property - Part 1
  2. Reading: Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 1
  3. Video: Protecting Operational Technologies and Intellectual Property - Part 2
  4. Reading: Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 2
  5. Practice Quiz: Self-check
  6. Video: Supply Chain Security
  7. Reading: Additional (optional) Resources: Supply Chain Security (Hardware Security)
  8. Practice Quiz: Self-check
  9. Video: Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 1
  10. Reading: Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 1
  11. Video: Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 2
  12. Reading: Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 2
  13. Practice Quiz: Self-check
  14. Video: Data/Applications and Cloud Security
  15. Reading: Additional (optional) Resources: Data/Applications and Cloud Security
  16. Practice Quiz: Self-check
  17. Video: Intellectual Property Protection from Threats
  18. Reading: Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal
  19. Practice Quiz: Self-check

Graded: Cyber Security in Manufacturing- Week 3 Quiz

WEEK 4


Breach Response



The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.


7 videos, 9 readings, 5 practice quizzes expand


  1. Video: Breach Response
  2. Reading: Additional (optional) Resources: Breach Response
  3. Practice Quiz: Self-check
  4. Video: Reliability versus Security
  5. Reading: Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions
  6. Practice Quiz: Self-check
  7. Video: Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 1
  8. Reading: Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 1
  9. Video: Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 2
  10. Reading: Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 2
  11. Practice Quiz: Self-check
  12. Video: Monitoring, Intrusion Detection, and Network Hardening
  13. Reading: Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening
  14. Practice Quiz: Self-check
  15. Video: Intrusion Response, Recovery, and Forensics
  16. Reading: Additional (optional) Resources: Intrusion Response, Recovery, and Forensics
  17. Practice Quiz: Self-check
  18. Video: Your 4.0 Roadmap to Success
  19. Reading: Your 4.0 Roadmap to Success-- Resources
  20. Reading: Your Roadmap Project: Step 8
  21. Discussion Prompt: Your 4.0 Roadmap to Success in Digital Manufacturing and Design Technology
  22. Reading: Cyber Security in Manufacturing -- Key Takeways

Graded: Cyber Security in Manufacturing- Week 4 Quiz
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.