Acerca de este Curso

28,333 vistas recientes
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 22 horas para completar
Inglés (English)

Instructor

Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 22 horas para completar
Inglés (English)

ofrecido por

Placeholder

University at Buffalo

Placeholder

Universidad Estatal de Nueva York

Programa - Qué aprenderás en este curso

Calificación del contenidoThumbs Up97%(2,220 calificaciones)Info
Semana
1

Semana 1

5 horas para completar

Introduction to Digital Manufacturing Security

5 horas para completar
9 videos (Total 51 minutos), 7 lecturas, 5 cuestionarios
9 videos
Digital Manufacturing Security Part 15m
Digital Manufacturing Security - Part 24m
Information Security Framework - Part 14m
Information Security Framework - Part 27m
Operational Technology and Informational Technology4m
Risk Management8m
Application of Information Security - Part 15m
Application of Information Security - Part 25m
7 lecturas
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125m
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225m
Acknowledgements10m
Additional (optional) Resources: Information Security Framework, Part 130m
Additional (optional) Resources: Information Security Framework, Part 225m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230m
5 ejercicios de práctica
Self-check9m
Self-check6m
Self-check6m
Self-check6m
Cyber Security in Manufacturing- Week 1 Quiz30m
Semana
2

Semana 2

5 horas para completar

Guidance on Securing Digital Manufacturing Operations

5 horas para completar
6 videos (Total 43 minutos), 6 lecturas, 6 cuestionarios
6 videos
Human-Machine and M2M Interactions6m
Securing End to End Process via Security Development Life Cycle5m
Software Security Flaws and Threats8m
Network Security and Authentication - Part 18m
Network Security and Authentication - Part 27m
6 lecturas
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30m
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30m
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20m
Additional (optional) Resources: Software Security and Secure Programming Practices30m
Additional (optional) Resources: Network Security and Authentication, Part 130m
Additional (optional) Resources: Network Security and Authentication, Part 240m
6 ejercicios de práctica
Self-check9m
Self-check6m
Self-check9m
Self-check6m
Self-Check30m
Cyber Security in Manufacturing- Week 2 Quiz30m
Semana
3

Semana 3

6 horas para completar

Protecting Operational Technologies and Intellectual Property

6 horas para completar
7 videos (Total 45 minutos), 7 lecturas, 6 cuestionarios
7 videos
Protecting Operational Technologies and Intellectual Property - Part 25m
Supply Chain Security5m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26m
Data/Applications and Cloud Security8m
Intellectual Property Protection from Threats8m
7 lecturas
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130m
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230m
Additional (optional) Resources: Supply Chain Security (Hardware Security)20m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230m
Additional (optional) Resources: Data/Applications and Cloud Security30m
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30m
6 ejercicios de práctica
Self-check4m
Self-check4m
Self-check4m
Self-check30m
Self-check30m
Cyber Security in Manufacturing- Week 3 Quiz30m
Semana
4

Semana 4

6 horas para completar

Breach Response

6 horas para completar
8 videos (Total 43 minutos), 11 lecturas, 6 cuestionarios
8 videos
Reliability versus Security5m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26m
Monitoring, Intrusion Detection, and Network Hardening8m
Intrusion Response, Recovery, and Forensics6m
Your 4.0 Roadmap to Success2m
Your 4.0 Roadmap to Success2m
11 lecturas
Additional (optional) Resources: Breach Response30m
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230m
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30m
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 810m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 910m
Cyber Security in Manufacturing -- Key Takeways10m
6 ejercicios de práctica
Self-check6m
Self-check6m
Self-check6m
Self-check6m
Self-check30m
Cyber Security in Manufacturing- Week 4 Quiz30m

Reseñas

Principales reseñas sobre CYBER SECURITY IN MANUFACTURING

Ver todas las reseñas

Preguntas Frecuentes

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.