About this Course
4.6
50 ratings
10 reviews
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 7 hours to complete

Suggested: 4 weeks of study, 3 ½ hours per week...
Available languages

English

Subtitles: English...
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 7 hours to complete

Suggested: 4 weeks of study, 3 ½ hours per week...
Available languages

English

Subtitles: English...

Syllabus - What you will learn from this course

Week
1
Hours to complete
5 hours to complete

Introduction to Digital Manufacturing Security

The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure....
Reading
9 videos (Total 51 min), 7 readings, 5 quizzes
Video9 videos
Digital Manufacturing Security Part 15m
Digital Manufacturing Security - Part 24m
Information Security Framework - Part 14m
Information Security Framework - Part 27m
Operational Technology and Informational Technology4m
Risk Management8m
Application of Information Security - Part 15m
Application of Information Security - Part 25m
Reading7 readings
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125m
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225m
Acknowledgements10m
Additional (optional) Resources: Information Security Framework, Part 130m
Additional (optional) Resources: Information Security Framework, Part 225m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130m
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230m
Quiz5 practice exercises
Self-check9m
Self-check6m
Self-check6m
Self-check6m
Cyber Security in Manufacturing- Week 1 Quiz30m
Week
2
Hours to complete
5 hours to complete

Guidance on Securing Digital Manufacturing Operations

The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components....
Reading
6 videos (Total 43 min), 6 readings, 6 quizzes
Video6 videos
Human-Machine and M2M Interactions6m
Securing End to End Process via Security Development Life Cycle5m
Software Security Flaws and Threats8m
Network Security and Authentication - Part 18m
Network Security and Authentication - Part 27m
Reading6 readings
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30m
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30m
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20m
Additional (optional) Resources: Software Security and Secure Programming Practices30m
Additional (optional) Resources: Network Security and Authentication, Part 130m
Additional (optional) Resources: Network Security and Authentication, Part 240m
Quiz6 practice exercises
Self-check9m
Self-check6m
Self-check9m
Self-check6m
Self-Check2m
Cyber Security in Manufacturing- Week 2 Quiz30m
Week
3
Hours to complete
5 hours to complete

Protecting Operational Technologies and Intellectual Property

The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design. ...
Reading
7 videos (Total 45 min), 7 readings, 6 quizzes
Video7 videos
Protecting Operational Technologies and Intellectual Property - Part 25m
Supply Chain Security5m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16m
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26m
Data/Applications and Cloud Security8m
Intellectual Property Protection from Threats8m
Reading7 readings
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130m
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230m
Additional (optional) Resources: Supply Chain Security (Hardware Security)20m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130m
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230m
Additional (optional) Resources: Data/Applications and Cloud Security30m
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30m
Quiz6 practice exercises
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Self-check4m
Cyber Security in Manufacturing- Week 3 Quiz30m
Week
4
Hours to complete
5 hours to complete

Breach Response

The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described....
Reading
8 videos (Total 43 min), 11 readings, 6 quizzes
Video8 videos
Reliability versus Security5m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14m
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26m
Monitoring, Intrusion Detection, and Network Hardening8m
Intrusion Response, Recovery, and Forensics6m
Your 4.0 Roadmap to Success2m
Your 4.0 Roadmap to Success2m
Reading11 readings
Additional (optional) Resources: Breach Response30m
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130m
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230m
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30m
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 810m
Your 4.0 Roadmap to Success-- Resources10m
Your Roadmap Project: Step 910m
Cyber Security in Manufacturing -- Key Takeways10m
Quiz6 practice exercises
Self-check6m
Self-check6m
Self-check6m
Self-check6m
Self-check4m
Cyber Security in Manufacturing- Week 4 Quiz30m
4.6
10 ReviewsChevron Right

Top Reviews

By DCJan 28th 2018

Excellent course with a ton of great information and resources. Learned a lot about cybersecurity and its role in digital manufacturing systems.

By VDJan 24th 2018

great material and course as part of the DMD specialization!

Instructor

Avatar

Shambhu Upadhyaya

Professor
Computer Science and Engineering

About University at Buffalo

The University at Buffalo (UB) is a premier, research-intensive public university and the largest, most comprehensive institution of the State University of New York (SUNY) system. UB offers more than 100 undergraduate degrees and nearly 300 graduate and professional programs....

About The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

About the Digital Manufacturing & Design Technology Specialization

Whether you’re a high school graduate exploring manufacturing careers, or an operations manager hungry for an understanding of the newest manufacturing technologies, this specialization will provide a foundation in how digital advances are changing the landscape and capabilities of factories. Nine courses – developed with input from the manufacturing industry – touch on Industry 4.0 and its components, including digital manufacturing and design practices, the concept of the digital thread, the Internet of Things and Big Data. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA...
Digital Manufacturing & Design Technology

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.