Cyber Security in Manufacturing

  • 4.7
Approx. 22 hours to complete

Course Summary

This course covers the fundamentals of cyber security in the manufacturing industry, including risk management, threat detection, and incident response.

Key Learning Points

  • Learn how to identify and mitigate cyber security risks in the manufacturing industry
  • Understand the key principles and techniques of threat detection and incident response
  • Gain practical experience through hands-on exercises and case studies

Related Topics for further study


Learning Outcomes

  • Ability to identify and mitigate cyber security risks in the manufacturing industry
  • Proficiency in threat detection and incident response techniques
  • Practical experience through hands-on exercises and case studies

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of cyber security concepts
  • Familiarity with the manufacturing industry

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Cyber Security Fundamentals for the Energy Industry
  • Cyber Security for the Healthcare Industry

Related Education Paths


Notable People in This Field

  • Security Technologist
  • Microsoft Regional Director

Related Books

Description

The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.

Outline

  • Introduction to Digital Manufacturing Security
  • Course Introduction
  • Digital Manufacturing Security Part 1
  • Digital Manufacturing Security - Part 2
  • Information Security Framework - Part 1
  • Information Security Framework - Part 2
  • Operational Technology and Informational Technology
  • Risk Management
  • Application of Information Security - Part 1
  • Application of Information Security - Part 2
  • Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 1
  • Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 2
  • Acknowledgements
  • Additional (optional) Resources: Information Security Framework, Part 1
  • Additional (optional) Resources: Information Security Framework, Part 2
  • Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 1
  • Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 2
  • Self-check
  • Self-check
  • Self-check
  • Self-check
  • Cyber Security in Manufacturing- Week 1 Quiz
  • Guidance on Securing Digital Manufacturing Operations
  • Securing all Aspects of a Digital Manufacturing Operation
  • Human-Machine and M2M Interactions
  • Securing End to End Process via Security Development Life Cycle
  • Software Security Flaws and Threats
  • Network Security and Authentication - Part 1
  • Network Security and Authentication - Part 2
  • Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics
  • Additional (optional) Resources: Human-Machine and Machine to Machine Interactions
  • Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle
  • Additional (optional) Resources: Software Security and Secure Programming Practices
  • Additional (optional) Resources: Network Security and Authentication, Part 1
  • Additional (optional) Resources: Network Security and Authentication, Part 2
  • Self-check
  • Self-check
  • Self-check
  • Self-check
  • Self-Check
  • Cyber Security in Manufacturing- Week 2 Quiz
  • Protecting Operational Technologies and Intellectual Property
  • Protecting Operational Technologies and Intellectual Property - Part 1
  • Protecting Operational Technologies and Intellectual Property - Part 2
  • Supply Chain Security
  • Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 1
  • Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 2
  • Data/Applications and Cloud Security
  • Intellectual Property Protection from Threats
  • Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 1
  • Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 2
  • Additional (optional) Resources: Supply Chain Security (Hardware Security)
  • Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 1
  • Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 2
  • Additional (optional) Resources: Data/Applications and Cloud Security
  • Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal
  • Self-check
  • Self-check
  • Self-check
  • Self-check
  • Self-check
  • Cyber Security in Manufacturing- Week 3 Quiz
  • Breach Response
  • Breach Response
  • Reliability versus Security
  • Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 1
  • Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 2
  • Monitoring, Intrusion Detection, and Network Hardening
  • Intrusion Response, Recovery, and Forensics
  • Your 4.0 Roadmap to Success
  • Your 4.0 Roadmap to Success
  • Additional (optional) Resources: Breach Response
  • Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions
  • Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 1
  • Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 2
  • Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening
  • Additional (optional) Resources: Intrusion Response, Recovery, and Forensics
  • Your 4.0 Roadmap to Success-- Resources
  • Your Roadmap Project: Step 8
  • Your 4.0 Roadmap to Success-- Resources
  • Your Roadmap Project: Step 9
  • Cyber Security in Manufacturing -- Key Takeways
  • Self-check
  • Self-check
  • Self-check
  • Self-check
  • Self-check
  • Cyber Security in Manufacturing- Week 4 Quiz

Summary of User Reviews

This cyber security manufacturing course has received positive reviews from learners. Many users found the course to be informative and practical. Overall, it is a great course for those interested in gaining knowledge about cyber security in the manufacturing industry.

Key Aspect Users Liked About This Course

The course content is practical and informative.

Pros from User Reviews

  • The course provides practical knowledge about cyber security in the manufacturing industry.
  • The lectures are well-structured and easy to follow.
  • The course is suitable for both beginners and professionals.
  • The course covers a wide range of topics related to cyber security in manufacturing.

Cons from User Reviews

  • The course requires a basic understanding of cyber security.
  • The course may be too basic for professionals.
  • The course may not be suitable for those interested in advanced topics.
  • The course does not provide hands-on experience.
English
Available now
Approx. 22 hours to complete
Shambhu Upadhyaya
University at Buffalo, The State University of New York
Coursera

Instructor

Shambhu Upadhyaya

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses