About this Course

28,333 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 22 hours to complete
English
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 22 hours to complete
English

Offered by

Placeholder

University at Buffalo

Placeholder

The State University of New York

Syllabus - What you will learn from this course

Content RatingThumbs Up97%(2,220 ratings)Info
Week
1

Week 1

5 hours to complete

Introduction to Digital Manufacturing Security

5 hours to complete
9 videos (Total 51 min), 7 readings, 5 quizzes
9 videos
Digital Manufacturing Security Part 15m
Digital Manufacturing Security - Part 24m
Information Security Framework - Part 14m
Information Security Framework - Part 27m
Operational Technology and Informational Technology4m
Risk Management8m
Application of Information Security - Part 15m
Application of Information Security - Part 25m
7 readings
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125m
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225m
Acknowledgements10m
Additional (optional) Resources: Information Security Framework, Part 130m
Additional (optional) Resources: Information Security Framework, Part 225m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230m
5 practice exercises
Self-check9m
Self-check6m
Self-check6m
Self-check6m
Cyber Security in Manufacturing- Week 1 Quiz30m
Week
2

Week 2

5 hours to complete

Guidance on Securing Digital Manufacturing Operations

5 hours to complete
6 videos (Total 43 min), 6 readings, 6 quizzes
6 videos
Human-Machine and M2M Interactions6m
Securing End to End Process via Security Development Life Cycle5m
Software Security Flaws and Threats8m
Network Security and Authentication - Part 18m
Network Security and Authentication - Part 27m
6 readings
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30m
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30m
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20m
Additional (optional) Resources: Software Security and Secure Programming Practices30m
Additional (optional) Resources: Network Security and Authentication, Part 130m
Additional (optional) Resources: Network Security and Authentication, Part 240m
6 practice exercises
Self-check9m
Self-check6m
Self-check9m
Self-check6m
Self-Check30m
Cyber Security in Manufacturing- Week 2 Quiz30m
Week
3

Week 3

6 hours to complete

Protecting Operational Technologies and Intellectual Property

6 hours to complete
7 videos (Total 45 min), 7 readings, 6 quizzes
7 videos
Protecting Operational Technologies and Intellectual Property - Part 25m
Supply Chain Security5m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26m
Data/Applications and Cloud Security8m
Intellectual Property Protection from Threats8m
7 readings
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130m
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230m
Additional (optional) Resources: Supply Chain Security (Hardware Security)20m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230m
Additional (optional) Resources: Data/Applications and Cloud Security30m
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30m
6 practice exercises
Self-check4m
Self-check4m
Self-check4m
Self-check30m
Self-check30m
Cyber Security in Manufacturing- Week 3 Quiz30m
Week
4

Week 4

6 hours to complete

Breach Response

6 hours to complete
8 videos (Total 43 min), 11 readings, 6 quizzes
8 videos
Reliability versus Security5m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26m
Monitoring, Intrusion Detection, and Network Hardening8m
Intrusion Response, Recovery, and Forensics6m
Your 4.0 Roadmap to Success2m
Your 4.0 Roadmap to Success2m
11 readings
Additional (optional) Resources: Breach Response30m
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230m
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30m
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 810m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 910m
Cyber Security in Manufacturing -- Key Takeways10m
6 practice exercises
Self-check6m
Self-check6m
Self-check6m
Self-check6m
Self-check30m
Cyber Security in Manufacturing- Week 4 Quiz30m

Reviews

TOP REVIEWS FROM CYBER SECURITY IN MANUFACTURING

View all reviews

Frequently Asked Questions

More questions? Visit the Learner Help Center.