The University at Buffalo - Cyber Security in Manufacturing
- Offered byCoursera
Cyber Security in Manufacturing at Coursera Overview
Duration | 22 hours |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cyber Security in Manufacturing at Coursera Highlights
- Earn a certificate from University at Buffalo
- Prepare for Cyber Security role
- Course will be delivered through lectures, readings, discussions and various videos
- Graded Assignments & Graded Quizzes with Feedback
- Financial aid available
Cyber Security in Manufacturing at Coursera Course details
- For learners interested in Cyber security
- Introduction to Digital Manufacturing Security
- Guidance on Securing Digital Manufacturing Operations
- Protecting Operational Technologies and Intellectual Property
- Breach Response
- This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.
- Acquire knowledge about security needs and the application of information security systems.
- Build the foundational skills needed in performing a risk assessment of operational and information technology assets.
- Gain valuable insights of implementing controls to mitigate identified risks.
Cyber Security in Manufacturing at Coursera Curriculum
Module 1
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.
Module 2
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.
Module 3
The purpose of this module is to describe how the various operational steps of digital manufacturing -that includes - supply chain, shipping process, mobile device usage and the associated communication -can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.
Module 4
The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems.
The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.