The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.


Cyber Security in Manufacturing

Cyber Security in Manufacturing
This course is part of Digital Manufacturing & Design Technology Specialization

Instructor: Shambhu Upadhyaya
Access provided by Interbank
23,433 already enrolled
661 reviews
Skills you'll gain
- Network Security
- Continuous Monitoring
- Computer Security Incident Management
- Vulnerability Assessments
- Software Development Life Cycle
- Risk Management Framework
- Authentications
- Cyber Security Assessment
- Information Assurance
- Cyber Security Policies
- Cybersecurity
- Incident Response
- Security Controls
- Intrusion Detection and Prevention
- Cloud Security
Details to know

Add to your LinkedIn profile
23 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.
What's included
9 videos7 readings5 assignments
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.
What's included
6 videos6 readings6 assignments1 discussion prompt
The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.
What's included
7 videos7 readings6 assignments
The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.
What's included
8 videos11 readings6 assignments1 discussion prompt
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
75.94%
- 4 stars
18.45%
- 3 stars
3.02%
- 2 stars
1.51%
- 1 star
1.05%
Showing 3 of 661
Reviewed on Apr 20, 2020
The course clearly explains about How to protect Intellectual Property's of a firm. And every should know about this.
Reviewed on Mar 21, 2021
this course help to under stand the cyber security related information and threats which are form of cyber security step which need to one has to take care.
Reviewed on Jan 27, 2018
Excellent course with a ton of great information and resources. Learned a lot about cybersecurity and its role in digital manufacturing systems.
Explore more from Physical Science and Engineering

University at Buffalo

Edureka




