Über diesen Kurs
2,267 recent views

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 7 Stunden zum Abschließen

Empfohlen: 4 weeks of study, 3 ½ hours per week...

Englisch

Untertitel: Englisch

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 7 Stunden zum Abschließen

Empfohlen: 4 weeks of study, 3 ½ hours per week...

Englisch

Untertitel: Englisch

Lehrplan - Was Sie in diesem Kurs lernen werden

Woche
1
5 Stunden zum Abschließen

Introduction to Digital Manufacturing Security

The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure....
9 Videos (Gesamt 51 min), 7 Lektüren, 5 Quiz
9 Videos
Digital Manufacturing Security Part 15m
Digital Manufacturing Security - Part 24m
Information Security Framework - Part 14m
Information Security Framework - Part 27m
Operational Technology and Informational Technology4m
Risk Management8m
Application of Information Security - Part 15m
Application of Information Security - Part 25m
7 Lektüren
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125m
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225m
Acknowledgements10m
Additional (optional) Resources: Information Security Framework, Part 130m
Additional (optional) Resources: Information Security Framework, Part 225m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230m
5 praktische Übungen
Self-check9m
Self-check6m
Self-check6m
Self-check6m
Cyber Security in Manufacturing- Week 1 Quiz30m
Woche
2
5 Stunden zum Abschließen

Guidance on Securing Digital Manufacturing Operations

The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components....
6 Videos (Gesamt 43 min), 6 Lektüren, 6 Quiz
6 Videos
Human-Machine and M2M Interactions6m
Securing End to End Process via Security Development Life Cycle5m
Software Security Flaws and Threats8m
Network Security and Authentication - Part 18m
Network Security and Authentication - Part 27m
6 Lektüren
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30m
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30m
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20m
Additional (optional) Resources: Software Security and Secure Programming Practices30m
Additional (optional) Resources: Network Security and Authentication, Part 130m
Additional (optional) Resources: Network Security and Authentication, Part 240m
6 praktische Übungen
Self-check9m
Self-check6m
Self-check9m
Self-check6m
Self-Check2m
Cyber Security in Manufacturing- Week 2 Quiz30m
Woche
3
5 Stunden zum Abschließen

Protecting Operational Technologies and Intellectual Property

The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design. ...
7 Videos (Gesamt 45 min), 7 Lektüren, 6 Quiz
7 Videos
Protecting Operational Technologies and Intellectual Property - Part 25m
Supply Chain Security5m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26m
Data/Applications and Cloud Security8m
Intellectual Property Protection from Threats8m
7 Lektüren
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130m
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230m
Additional (optional) Resources: Supply Chain Security (Hardware Security)20m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230m
Additional (optional) Resources: Data/Applications and Cloud Security30m
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30m
6 praktische Übungen
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Cyber Security in Manufacturing- Week 3 Quiz30m
Woche
4
5 Stunden zum Abschließen

Breach Response

The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described....
8 Videos (Gesamt 43 min), 11 Lektüren, 6 Quiz
8 Videos
Reliability versus Security5m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26m
Monitoring, Intrusion Detection, and Network Hardening8m
Intrusion Response, Recovery, and Forensics6m
Your 4.0 Roadmap to Success2m
Your 4.0 Roadmap to Success2m
11 Lektüren
Additional (optional) Resources: Breach Response30m
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230m
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30m
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 810m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 910m
Cyber Security in Manufacturing -- Key Takeways10m
6 praktische Übungen
Self-check6m
Self-check6m
Self-check6m
Self-check6m
Self-check4m
Cyber Security in Manufacturing- Week 4 Quiz30m
4.6
14 BewertungenChevron Right

Top-Bewertungen

von DCJan 28th 2018

Excellent course with a ton of great information and resources. Learned a lot about cybersecurity and its role in digital manufacturing systems.

von VDJan 24th 2018

great material and course as part of the DMD specialization!

Dozent

Avatar

Shambhu Upadhyaya

Professor
Computer Science and Engineering

Über University at Buffalo

The University at Buffalo (UB) is a premier, research-intensive public university and the largest, most comprehensive institution of the State University of New York (SUNY) system. UB offers more than 100 undergraduate degrees and nearly 300 graduate and professional programs....

Über The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

Über die Spezialisierung Digital Manufacturing & Design Technology

Whether you’re a high school graduate exploring manufacturing careers, or an operations manager hungry for an understanding of the newest manufacturing technologies, this specialization will provide a foundation in how digital advances are changing the landscape and capabilities of factories. Nine courses – developed with input from the manufacturing industry – touch on Industry 4.0 and its components, including digital manufacturing and design practices, the concept of the digital thread, the Internet of Things and Big Data. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA...
Digital Manufacturing & Design Technology

Häufig gestellte Fragen

  • Sobald Sie sich für ein Zertifikat angemeldet haben, haben Sie Zugriff auf alle Videos, Quizspiele und Programmieraufgaben (falls zutreffend). Aufgaben, die von anderen Kursteilnehmern bewertet werden, können erst dann eingereicht und überprüft werden, wenn Ihr Unterricht begonnen hat. Wenn Sie sich den Kurs anschauen möchten, ohne ihn zu kaufen, können Sie womöglich auf bestimmte Aufgaben nicht zugreifen.

  • Wenn Sie sich für den Kurs anmelden, erhalten Sie Zugriff auf alle Kurse der Spezialisierung und Sie erhalten nach Abschluss aller Arbeiten ein Zertifikat. Ihr elektronisches Zertifikat wird zu Ihrer Seite „Errungenschaften“ hinzugefügt – von dort können Sie Ihr Zertifikat ausdrucken oder es zu Ihrem LinkedIn Profil hinzufügen. Wenn Sie nur lesen und den Inhalt des Kurses anzeigen möchten, können Sie kostenlos als Gast an dem Kurs teilnehmen.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..