Acerca de este Curso
4.6
52 calificaciones
11 revisiones
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 7 horas para completar

Sugerido: 4 weeks of study, 3 ½ hours per week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 7 horas para completar

Sugerido: 4 weeks of study, 3 ½ hours per week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
5 horas para completar

Introduction to Digital Manufacturing Security

The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure....
Reading
9 videos (Total 51 min), 7 readings, 5 quizzes
Video9 videos
Digital Manufacturing Security Part 15m
Digital Manufacturing Security - Part 24m
Information Security Framework - Part 14m
Information Security Framework - Part 27m
Operational Technology and Informational Technology4m
Risk Management8m
Application of Information Security - Part 15m
Application of Information Security - Part 25m
Reading7 lecturas
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125m
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225m
Acknowledgements10m
Additional (optional) Resources: Information Security Framework, Part 130m
Additional (optional) Resources: Information Security Framework, Part 225m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230m
Quiz5 ejercicios de práctica
Self-check9m
Self-check6m
Self-check6m
Self-check6m
Cyber Security in Manufacturing- Week 1 Quiz30m
Semana
2
Horas para completar
5 horas para completar

Guidance on Securing Digital Manufacturing Operations

The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components....
Reading
6 videos (Total 43 min), 6 readings, 6 quizzes
Video6 videos
Human-Machine and M2M Interactions6m
Securing End to End Process via Security Development Life Cycle5m
Software Security Flaws and Threats8m
Network Security and Authentication - Part 18m
Network Security and Authentication - Part 27m
Reading6 lecturas
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30m
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30m
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20m
Additional (optional) Resources: Software Security and Secure Programming Practices30m
Additional (optional) Resources: Network Security and Authentication, Part 130m
Additional (optional) Resources: Network Security and Authentication, Part 240m
Quiz6 ejercicios de práctica
Self-check9m
Self-check6m
Self-check9m
Self-check6m
Self-Check2m
Cyber Security in Manufacturing- Week 2 Quiz30m
Semana
3
Horas para completar
5 horas para completar

Protecting Operational Technologies and Intellectual Property

The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design. ...
Reading
7 videos (Total 45 min), 7 readings, 6 quizzes
Video7 videos
Protecting Operational Technologies and Intellectual Property - Part 25m
Supply Chain Security5m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26m
Data/Applications and Cloud Security8m
Intellectual Property Protection from Threats8m
Reading7 lecturas
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130m
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230m
Additional (optional) Resources: Supply Chain Security (Hardware Security)20m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230m
Additional (optional) Resources: Data/Applications and Cloud Security30m
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30m
Quiz6 ejercicios de práctica
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Cyber Security in Manufacturing- Week 3 Quiz30m
Semana
4
Horas para completar
5 horas para completar

Breach Response

The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described....
Reading
8 videos (Total 43 min), 11 readings, 6 quizzes
Video8 videos
Reliability versus Security5m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26m
Monitoring, Intrusion Detection, and Network Hardening8m
Intrusion Response, Recovery, and Forensics6m
Your 4.0 Roadmap to Success2m
Your 4.0 Roadmap to Success2m
Reading11 lecturas
Additional (optional) Resources: Breach Response30m
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230m
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30m
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 810m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 910m
Cyber Security in Manufacturing -- Key Takeways10m
Quiz6 ejercicios de práctica
Self-check6m
Self-check6m
Self-check6m
Self-check6m
Self-check4m
Cyber Security in Manufacturing- Week 4 Quiz30m
4.6
11 revisionesChevron Right

Principales revisiones

por DCJan 28th 2018

Excellent course with a ton of great information and resources. Learned a lot about cybersecurity and its role in digital manufacturing systems.

por VDJan 24th 2018

great material and course as part of the DMD specialization!

Instructores

Avatar

Shambhu Upadhyaya

Professor
Computer Science and Engineering

Acerca de University at Buffalo

The University at Buffalo (UB) is a premier, research-intensive public university and the largest, most comprehensive institution of the State University of New York (SUNY) system. UB offers more than 100 undergraduate degrees and nearly 300 graduate and professional programs....

Acerca de The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

Acerca del programa especializado Digital Manufacturing & Design Technology

Whether you’re a high school graduate exploring manufacturing careers, or an operations manager hungry for an understanding of the newest manufacturing technologies, this specialization will provide a foundation in how digital advances are changing the landscape and capabilities of factories. Nine courses – developed with input from the manufacturing industry – touch on Industry 4.0 and its components, including digital manufacturing and design practices, the concept of the digital thread, the Internet of Things and Big Data. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA...
Digital Manufacturing & Design Technology

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.