When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.
Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain valuable insights of implementing controls to mitigate identified risks.
Main concepts of this course will be delivered through lectures, readings, discussions and various videos.
This is the seventh course in the Digital Manufacturing & Design Technology specialization that explores the many facets of manufacturing’s “Fourth Revolution,” aka Industry 4.0, and features a culminating project involving creation of a roadmap to achieve a self-established DMD-related professional goal. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.
What's included
9 videos7 readings5 assignments
Show info about module content
9 videos•Total 51 minutes
Course Introduction•5 minutes
Digital Manufacturing Security Part 1•5 minutes
Digital Manufacturing Security - Part 2•5 minutes
Information Security Framework - Part 1•5 minutes
Information Security Framework - Part 2•7 minutes
Operational Technology and Informational Technology•5 minutes
Risk Management•9 minutes
Application of Information Security - Part 1•6 minutes
Application of Information Security - Part 2•5 minutes
7 readings•Total 175 minutes
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 1•25 minutes
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 2•25 minutes
Acknowledgements•10 minutes
Additional (optional) Resources: Information Security Framework, Part 1•30 minutes
Additional (optional) Resources: Information Security Framework, Part 2•25 minutes
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 1•30 minutes
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 2•30 minutes
5 assignments•Total 57 minutes
Self-check•9 minutes
Self-check•6 minutes
Self-check•6 minutes
Self-check•6 minutes
Cyber Security in Manufacturing- Week 1 Quiz•30 minutes
Guidance on Securing Digital Manufacturing Operations
Module 2•5 hours to complete
Module details
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions•30 minutes
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle•20 minutes
Additional (optional) Resources: Software Security and Secure Programming Practices•30 minutes
Additional (optional) Resources: Network Security and Authentication, Part 1•30 minutes
Additional (optional) Resources: Network Security and Authentication, Part 2•40 minutes
6 assignments•Total 90 minutes
Self-check•9 minutes
Self-check•6 minutes
Self-check•9 minutes
Self-check•6 minutes
Self-Check•30 minutes
Cyber Security in Manufacturing- Week 2 Quiz•30 minutes
1 discussion prompt•Total 10 minutes
Software Security•10 minutes
Protecting Operational Technologies and Intellectual Property
Module 3•6 hours to complete
Module details
The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.
What's included
7 videos7 readings6 assignments
Show info about module content
7 videos•Total 45 minutes
Protecting Operational Technologies and Intellectual Property - Part 1•4 minutes
Protecting Operational Technologies and Intellectual Property - Part 2•6 minutes
Supply Chain Security•6 minutes
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 1•6 minutes
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 2•6 minutes
Data/Applications and Cloud Security•8 minutes
Intellectual Property Protection from Threats•8 minutes
7 readings•Total 200 minutes
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 1•30 minutes
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 2•30 minutes
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 1•30 minutes
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 2•30 minutes
Additional (optional) Resources: Data/Applications and Cloud Security•30 minutes
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal•30 minutes
6 assignments•Total 102 minutes
Self-check•4 minutes
Self-check•4 minutes
Self-check•4 minutes
Self-check•30 minutes
Self-check•30 minutes
Cyber Security in Manufacturing- Week 3 Quiz•30 minutes
Breach Response
Module 4•6 hours to complete
Module details
The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.
The University at Buffalo (UB) is a premier, research-intensive public university and the largest, most comprehensive institution of the State University of New York (SUNY) system. UB offers more than 100 undergraduate degrees and nearly 300 graduate and professional programs.
The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.7
665 reviews
5 stars
75.93%
4 stars
18.34%
3 stars
3.15%
2 stars
1.50%
1 star
1.05%
Showing 3 of 665
D
DS
5·
Reviewed on Apr 15, 2020
Learned good number of cybersecurity terminologies, thanks to Prof.Shambhu Upadhyaya for the wonderful coverage and interactions.
K
KK
4·
Reviewed on Apr 3, 2019
Overall a good course- the final section (which applies to the DMD specialization) should have had a gate where folks who were only interested in the Cyber security portion could escape.
B
BR
5·
Reviewed on Apr 10, 2020
I liked it.... The communication of the professor is very good......
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.