Informações sobre o curso
4.6
50 classificações
10 avaliações
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 7 horas para completar

Sugerido: 4 weeks of study, 3 ½ hours per week...
Idiomas disponíveis

Inglês

Legendas: Inglês...
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 7 horas para completar

Sugerido: 4 weeks of study, 3 ½ hours per week...
Idiomas disponíveis

Inglês

Legendas: Inglês...

Programa - O que você aprenderá com este curso

Semana
1
Horas para completar
5 horas para concluir

Introduction to Digital Manufacturing Security

The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure....
Reading
9 vídeos (Total de 51 min), 7 leituras, 5 testes
Video9 videos
Digital Manufacturing Security Part 15min
Digital Manufacturing Security - Part 24min
Information Security Framework - Part 14min
Information Security Framework - Part 27min
Operational Technology and Informational Technology4min
Risk Management8min
Application of Information Security - Part 15min
Application of Information Security - Part 25min
Reading7 leituras
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125min
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225min
Acknowledgements10min
Additional (optional) Resources: Information Security Framework, Part 130min
Additional (optional) Resources: Information Security Framework, Part 225min
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130min
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230min
Quiz5 exercícios práticos
Self-check9min
Self-check6min
Self-check6min
Self-check6min
Cyber Security in Manufacturing- Week 1 Quiz30min
Semana
2
Horas para completar
5 horas para concluir

Guidance on Securing Digital Manufacturing Operations

The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components....
Reading
6 vídeos (Total de 43 min), 6 leituras, 6 testes
Video6 videos
Human-Machine and M2M Interactions6min
Securing End to End Process via Security Development Life Cycle5min
Software Security Flaws and Threats8min
Network Security and Authentication - Part 18min
Network Security and Authentication - Part 27min
Reading6 leituras
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30min
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30min
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20min
Additional (optional) Resources: Software Security and Secure Programming Practices30min
Additional (optional) Resources: Network Security and Authentication, Part 130min
Additional (optional) Resources: Network Security and Authentication, Part 240min
Quiz6 exercícios práticos
Self-check9min
Self-check6min
Self-check9min
Self-check6min
Self-Check2min
Cyber Security in Manufacturing- Week 2 Quiz30min
Semana
3
Horas para completar
5 horas para concluir

Protecting Operational Technologies and Intellectual Property

The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design. ...
Reading
7 vídeos (Total de 45 min), 7 leituras, 6 testes
Video7 videos
Protecting Operational Technologies and Intellectual Property - Part 25min
Supply Chain Security5min
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16min
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26min
Data/Applications and Cloud Security8min
Intellectual Property Protection from Threats8min
Reading7 leituras
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130min
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230min
Additional (optional) Resources: Supply Chain Security (Hardware Security)20min
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130min
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230min
Additional (optional) Resources: Data/Applications and Cloud Security30min
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30min
Quiz6 exercícios práticos
Self-check4min
Self-check4min
Self-check4min
Self-check4min
Self-check4min
Cyber Security in Manufacturing- Week 3 Quiz30min
Semana
4
Horas para completar
5 horas para concluir

Breach Response

The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described....
Reading
8 vídeos (Total de 43 min), 11 leituras, 6 testes
Video8 videos
Reliability versus Security5min
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14min
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26min
Monitoring, Intrusion Detection, and Network Hardening8min
Intrusion Response, Recovery, and Forensics6min
Your 4.0 Roadmap to Success2min
Your 4.0 Roadmap to Success2min
Reading11 leituras
Additional (optional) Resources: Breach Response30min
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10min
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130min
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230min
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30min
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30min
Your 4.0 Roadmap to Success-- Resources10min
Your Roadmap Project: Step 810min
Your 4.0 Roadmap to Success-- Resources10min
Your Roadmap Project: Step 910min
Cyber Security in Manufacturing -- Key Takeways10min
Quiz6 exercícios práticos
Self-check6min
Self-check6min
Self-check6min
Self-check6min
Self-check4min
Cyber Security in Manufacturing- Week 4 Quiz30min
4.6

Melhores avaliações

por DCJan 28th 2018

Excellent course with a ton of great information and resources. Learned a lot about cybersecurity and its role in digital manufacturing systems.

por VDJan 24th 2018

great material and course as part of the DMD specialization!

Instrutores

Avatar

Shambhu Upadhyaya

Professor
Computer Science and Engineering

Sobre University at Buffalo

The University at Buffalo (UB) is a premier, research-intensive public university and the largest, most comprehensive institution of the State University of New York (SUNY) system. UB offers more than 100 undergraduate degrees and nearly 300 graduate and professional programs....

Sobre The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

Sobre o Programa de cursos integrados Digital Manufacturing & Design Technology

Whether you’re a high school graduate exploring manufacturing careers, or an operations manager hungry for an understanding of the newest manufacturing technologies, this specialization will provide a foundation in how digital advances are changing the landscape and capabilities of factories. Nine courses – developed with input from the manufacturing industry – touch on Industry 4.0 and its components, including digital manufacturing and design practices, the concept of the digital thread, the Internet of Things and Big Data. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA...
Digital Manufacturing & Design Technology

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.