Acerca de este Curso

5,979 vistas recientes

Certificado para compartir

Obtén un certificado al finalizar

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 8 horas para completar

Inglés (English)

Subtítulos: Inglés (English)

Certificado para compartir

Obtén un certificado al finalizar

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 8 horas para completar

Inglés (English)

Subtítulos: Inglés (English)

ofrecido por

Logotipo de University at Buffalo

University at Buffalo

Logotipo de Universidad Estatal de Nueva York

Universidad Estatal de Nueva York

Programa - Qué aprenderás en este curso

Semana
1

Semana 1

5 horas para completar

Introduction to Digital Manufacturing Security

5 horas para completar
9 videos (Total 51 minutos), 7 lecturas, 5 cuestionarios
9 videos
Digital Manufacturing Security Part 15m
Digital Manufacturing Security - Part 24m
Information Security Framework - Part 14m
Information Security Framework - Part 27m
Operational Technology and Informational Technology4m
Risk Management8m
Application of Information Security - Part 15m
Application of Information Security - Part 25m
7 lecturas
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125m
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225m
Acknowledgements10m
Additional (optional) Resources: Information Security Framework, Part 130m
Additional (optional) Resources: Information Security Framework, Part 225m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230m
5 ejercicios de práctica
Self-check9m
Self-check6m
Self-check6m
Self-check6m
Cyber Security in Manufacturing- Week 1 Quiz30m
Semana
2

Semana 2

5 horas para completar

Guidance on Securing Digital Manufacturing Operations

5 horas para completar
6 videos (Total 43 minutos), 6 lecturas, 6 cuestionarios
6 videos
Human-Machine and M2M Interactions6m
Securing End to End Process via Security Development Life Cycle5m
Software Security Flaws and Threats8m
Network Security and Authentication - Part 18m
Network Security and Authentication - Part 27m
6 lecturas
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30m
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30m
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20m
Additional (optional) Resources: Software Security and Secure Programming Practices30m
Additional (optional) Resources: Network Security and Authentication, Part 130m
Additional (optional) Resources: Network Security and Authentication, Part 240m
6 ejercicios de práctica
Self-check9m
Self-check6m
Self-check9m
Self-check6m
Self-Check2m
Cyber Security in Manufacturing- Week 2 Quiz30m
Semana
3

Semana 3

5 horas para completar

Protecting Operational Technologies and Intellectual Property

5 horas para completar
7 videos (Total 45 minutos), 7 lecturas, 6 cuestionarios
7 videos
Protecting Operational Technologies and Intellectual Property - Part 25m
Supply Chain Security5m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26m
Data/Applications and Cloud Security8m
Intellectual Property Protection from Threats8m
7 lecturas
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130m
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230m
Additional (optional) Resources: Supply Chain Security (Hardware Security)20m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230m
Additional (optional) Resources: Data/Applications and Cloud Security30m
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30m
6 ejercicios de práctica
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Cyber Security in Manufacturing- Week 3 Quiz30m
Semana
4

Semana 4

5 horas para completar

Breach Response

5 horas para completar
8 videos (Total 43 minutos), 11 lecturas, 6 cuestionarios
8 videos
Reliability versus Security5m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26m
Monitoring, Intrusion Detection, and Network Hardening8m
Intrusion Response, Recovery, and Forensics6m
Your 4.0 Roadmap to Success2m
Your 4.0 Roadmap to Success2m
11 lecturas
Additional (optional) Resources: Breach Response30m
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230m
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30m
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 810m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 910m
Cyber Security in Manufacturing -- Key Takeways10m
6 ejercicios de práctica
Self-check6m
Self-check6m
Self-check6m
Self-check6m
Self-check4m
Cyber Security in Manufacturing- Week 4 Quiz30m

Revisiones

Principales revisiones sobre CYBER SECURITY IN MANUFACTURING
Ver todos los comentarios

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.