Cyber Security in Manufacturing
Description
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain valuable insights of implementing controls to mitigate identified risks. Main concepts of this course will be delivered through lectures, readings, discussions and various videos. This is the eighth course in the Digital Manufacturing & Design Technology specialization that explores the many facets of manufacturing’s “Fourth Revolution,” and features a culminating project involving creation of a roadmap to achieve a self-established DMD-related professional goal. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/r-VHiwsg_t0
Who is this class for: This course is for anyone interested in how digital advances are changing the landscape and capabilities of manufacturing, from high school graduates exploring careers to operations managers and business owners hungry for an understanding of the newest manufacturing technologies.
Created by: University at Buffalo, The State University of New York-
Taught by: Shambhu Upadhyaya, Professor
Computer Science and Engineering
Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.
Help from your peersConnect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.
CertificatesEarn official recognition for your work, and share your success with friends, colleagues, and employers.
University at Buffalo The University at Buffalo (UB) team includes the School of Engineering and Applied Sciences, the most comprehensive public school of engineering in New York; the Center for Industrial Effectiveness (TCIE), an engineering outreach center that supports the business community; and the Center for Educational Innovation, which elevates pedagogical advancement and improved learning. UB, a research-intensive public university, is the largest institution of the State University of New York system. The State University of New York The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe.Syllabus
WEEK 1
Introduction to Digital Manufacturing Security
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.
9 videos, 7 readings, 4 practice quizzes expand
- Video: Course Introduction
- Video: Digital Manufacturing Security Part 1
- Reading: Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 1
- Video: Digital Manufacturing Security - Part 2
- Reading: Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 2
- Practice Quiz: Self-check
- Reading: Acknowledgements
- Video: Information Security Framework - Part 1
- Reading: Additional (optional) Resources: Information Security Framework, Part 1
- Video: Information Security Framework - Part 2
- Reading: Additional (optional) Resources: Information Security Framework, Part 2
- Practice Quiz: Self-check
- Video: Operational Technology and Informational Technology
- Video: Risk Management
- Practice Quiz: Self-check
- Video: Application of Information Security - Part 1
- Reading: Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 1
- Video: Application of Information Security - Part 2
- Reading: Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 2
- Practice Quiz: Self-check
Graded: Cyber Security in Manufacturing- Week 1 Quiz
WEEK 2
Guidance on Securing Digital Manufacturing Operations
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.
6 videos, 6 readings, 5 practice quizzes expand
- Video: Securing all Aspects of a Digital Manufacturing Operation
- Reading: Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics
- Practice Quiz: Self-check
- Video: Human-Machine and M2M Interactions
- Reading: Additional (optional) Resources: Human-Machine and Machine to Machine Interactions
- Practice Quiz: Self-check
- Video: Securing End to End Process via Security Development Life Cycle
- Reading: Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle
- Practice Quiz: Self-check
- Video: Software Security Flaws and Threats
- Reading: Additional (optional) Resources: Software Security and Secure Programming Practices
- Practice Quiz: Self-check
- Video: Network Security and Authentication - Part 1
- Reading: Additional (optional) Resources: Network Security and Authentication, Part 1
- Video: Network Security and Authentication - Part 2
- Reading: Additional (optional) Resources: Network Security and Authentication, Part 2
- Practice Quiz: Self-Check
- Discussion Prompt: Software Security
Graded: Cyber Security in Manufacturing- Week 2 Quiz
WEEK 3
Protecting Operational Technologies and Intellectual Property
The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.
7 videos, 7 readings, 5 practice quizzes expand
- Video: Protecting Operational Technologies and Intellectual Property - Part 1
- Reading: Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 1
- Video: Protecting Operational Technologies and Intellectual Property - Part 2
- Reading: Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 2
- Practice Quiz: Self-check
- Video: Supply Chain Security
- Reading: Additional (optional) Resources: Supply Chain Security (Hardware Security)
- Practice Quiz: Self-check
- Video: Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 1
- Reading: Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 1
- Video: Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 2
- Reading: Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 2
- Practice Quiz: Self-check
- Video: Data/Applications and Cloud Security
- Reading: Additional (optional) Resources: Data/Applications and Cloud Security
- Practice Quiz: Self-check
- Video: Intellectual Property Protection from Threats
- Reading: Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal
- Practice Quiz: Self-check
Graded: Cyber Security in Manufacturing- Week 3 Quiz
WEEK 4
Breach Response
The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.
7 videos, 9 readings, 5 practice quizzes expand
- Video: Breach Response
- Reading: Additional (optional) Resources: Breach Response
- Practice Quiz: Self-check
- Video: Reliability versus Security
- Reading: Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions
- Practice Quiz: Self-check
- Video: Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 1
- Reading: Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 1
- Video: Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 2
- Reading: Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 2
- Practice Quiz: Self-check
- Video: Monitoring, Intrusion Detection, and Network Hardening
- Reading: Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening
- Practice Quiz: Self-check
- Video: Intrusion Response, Recovery, and Forensics
- Reading: Additional (optional) Resources: Intrusion Response, Recovery, and Forensics
- Practice Quiz: Self-check
- Video: Your 4.0 Roadmap to Success
- Reading: Your 4.0 Roadmap to Success-- Resources
- Reading: Your Roadmap Project: Step 8
- Discussion Prompt: Your 4.0 Roadmap to Success in Digital Manufacturing and Design Technology
- Reading: Cyber Security in Manufacturing -- Key Takeways
Graded: Cyber Security in Manufacturing- Week 4 Quiz
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.