- Level Foundation
- Duration 22 hours
- Course by University at Buffalo
-
Offered by
About
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain valuable insights of implementing controls to mitigate identified risks. Main concepts of this course will be delivered through lectures, readings, discussions and various videos. This is the seventh course in the Digital Manufacturing & Design Technology specialization that explores the many facets of manufacturing’s “Fourth Revolution,” aka Industry 4.0, and features a culminating project involving creation of a roadmap to achieve a self-established DMD-related professional goal. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CAModules
1. Background and Description of the need for Digital Manufacturing Security
1
Assignment
- Self-check
3
Videos
- Course Introduction
- Digital Manufacturing Security Part 1
- Digital Manufacturing Security - Part 2
3
Readings
- Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 1
- Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 2
- Acknowledgements
2. Information Security Framework
1
Assignment
- Self-check
2
Videos
- Information Security Framework - Part 1
- Information Security Framework - Part 2
2
Readings
- Additional (optional) Resources: Information Security Framework, Part 1
- Additional (optional) Resources: Information Security Framework, Part 2
3. Operational Technologies (OT) versus Information Technology (IT) and Enterprise Risk Management
1
Assignment
- Self-check
2
Videos
- Operational Technology and Informational Technology
- Risk Management
4. Application of Information Security in Digital Manufacturing
1
Assignment
- Self-check
2
Videos
- Application of Information Security - Part 1
- Application of Information Security - Part 2
2
Readings
- Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 1
- Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 2
Week 1 Evaluation
1
Assignment
- Cyber Security in Manufacturing- Week 1 Quiz
1. Virtualization, Computing, Data, AI, Robotics
1
Assignment
- Self-check
1
Videos
- Securing all Aspects of a Digital Manufacturing Operation
1
Readings
- Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics
2. Human-Machine and Machine to Machine Interactions
1
Assignment
- Self-check
1
Videos
- Human-Machine and M2M Interactions
1
Readings
- Additional (optional) Resources: Human-Machine and Machine to Machine Interactions
3. Securing End-to-End Process via Security Development Life Cycle
1
Assignment
- Self-check
1
Videos
- Securing End to End Process via Security Development Life Cycle
1
Readings
- Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle
4. Software Security and Secure Programming Practices
1
Assignment
- Self-check
1
Videos
- Software Security Flaws and Threats
1
Readings
- Additional (optional) Resources: Software Security and Secure Programming Practices
5. Network Security and Authentication
1
Assignment
- Self-Check
2
Videos
- Network Security and Authentication - Part 1
- Network Security and Authentication - Part 2
2
Readings
- Additional (optional) Resources: Network Security and Authentication, Part 1
- Additional (optional) Resources: Network Security and Authentication, Part 2
Week 2 Evaluation
1
Assignment
- Cyber Security in Manufacturing- Week 2 Quiz
1
Discussions
- Software Security
1. Cyber Physical Systems (SCADA), Physical Security vs Cyber Security
1
Assignment
- Self-check
2
Videos
- Protecting Operational Technologies and Intellectual Property - Part 1
- Protecting Operational Technologies and Intellectual Property - Part 2
2
Readings
- Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 1
- Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 2
2. Supply Chain Security (Hardware Security)
1
Assignment
- Self-check
1
Videos
- Supply Chain Security
1
Readings
- Additional (optional) Resources: Supply Chain Security (Hardware Security)
3. Shipping, RFID Tags, Mobile Device Security, Wireless Communication
1
Assignment
- Self-check
2
Videos
- Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 1
- Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 2
2
Readings
- Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 1
- Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 2
4. Data/Applications and Cloud Security
1
Assignment
- Self-check
1
Videos
- Data/Applications and Cloud Security
1
Readings
- Additional (optional) Resources: Data/Applications and Cloud Security
5. Intellectual Property Protection from Threats - External and Internal
1
Assignment
- Self-check
1
Videos
- Intellectual Property Protection from Threats
1
Readings
- Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal
Week 3 Evaluation
1
Assignment
- Cyber Security in Manufacturing- Week 3 Quiz
1. Breach Response
1
Assignment
- Self-check
1
Videos
- Breach Response
1
Readings
- Additional (optional) Resources: Breach Response
2. Reliability vs Security, Challenges, and Solutions
1
Assignment
- Self-check
1
Videos
- Reliability versus Security
1
Readings
- Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions
3. Intrusion Prevention Techniques and Data Leak Prevention Tools
1
Assignment
- Self-check
2
Videos
- Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 1
- Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 2
2
Readings
- Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 1
- Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 2
4. Monitoring, Intrusion Detection, and Network Hardening
1
Assignment
- Self-check
1
Videos
- Monitoring, Intrusion Detection, and Network Hardening
1
Readings
- Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening
5. Intrusion Response, Recovery, and Forensics
1
Assignment
- Self-check
1
Videos
- Intrusion Response, Recovery, and Forensics
1
Readings
- Additional (optional) Resources: Intrusion Response, Recovery, and Forensics
Week 4 Evaluation
1
Assignment
- Cyber Security in Manufacturing- Week 4 Quiz
Specialization Project
1
Discussions
- Your 4.0 Roadmap to Success in Digital Manufacturing and Design Technology
2
Videos
- Your 4.0 Roadmap to Success
- Your 4.0 Roadmap to Success
4
Readings
- Your 4.0 Roadmap to Success-- Resources
- Your Roadmap Project: Step 8
- Your 4.0 Roadmap to Success-- Resources
- Your Roadmap Project: Step 9
Course Key Takeaways
1
Readings
- Cyber Security in Manufacturing -- Key Takeways
Auto Summary
Explore the crucial realm of Cyber Security in Manufacturing through this foundational course designed for Science & Engineering enthusiasts. Led by Coursera, it focuses on safeguarding digital manufacturing and design (DM&D) from cyber threats. Learners will gain essential skills in risk assessment and implementing security controls. Delivered via lectures, readings, and videos, this course is part of the Industry 4.0 specialization and spans approximately 1320 minutes. Ideal for those seeking to fortify operational technologies against cyber risks, it offers a starter subscription option.

Shambhu Upadhyaya