Об этом курсе
4.6
Оценки: 55
Рецензии: 13
Специализация
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Начальный уровень

Начальный уровень

Часов на завершение

Прибл. 7 часа на выполнение

Предполагаемая нагрузка: 4 weeks of study, 3 ½ hours per week...
Доступные языки

Английский

Субтитры: Английский
Специализация
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Начальный уровень

Начальный уровень

Часов на завершение

Прибл. 7 часа на выполнение

Предполагаемая нагрузка: 4 weeks of study, 3 ½ hours per week...
Доступные языки

Английский

Субтитры: Английский

Программа курса: что вы изучите

Неделя
1
Часов на завершение
5 ч. на завершение

Introduction to Digital Manufacturing Security

The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure....
Reading
9 видео ((всего 51 мин.)), 7 материалов для самостоятельного изучения, 5 тестов
Video9 видео
Digital Manufacturing Security Part 15мин
Digital Manufacturing Security - Part 24мин
Information Security Framework - Part 14мин
Information Security Framework - Part 27мин
Operational Technology and Informational Technology4мин
Risk Management8мин
Application of Information Security - Part 15мин
Application of Information Security - Part 25мин
Reading7 материала для самостоятельного изучения
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125мин
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225мин
Acknowledgements10мин
Additional (optional) Resources: Information Security Framework, Part 130мин
Additional (optional) Resources: Information Security Framework, Part 225мин
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130мин
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230мин
Quiz5 практического упражнения
Self-check9мин
Self-check6мин
Self-check6мин
Self-check6мин
Cyber Security in Manufacturing- Week 1 Quiz30мин
Неделя
2
Часов на завершение
5 ч. на завершение

Guidance on Securing Digital Manufacturing Operations

The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components....
Reading
6 видео ((всего 43 мин.)), 6 материалов для самостоятельного изучения, 6 тестов
Video6 видео
Human-Machine and M2M Interactions6мин
Securing End to End Process via Security Development Life Cycle5мин
Software Security Flaws and Threats8мин
Network Security and Authentication - Part 18мин
Network Security and Authentication - Part 27мин
Reading6 материала для самостоятельного изучения
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30мин
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30мин
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20мин
Additional (optional) Resources: Software Security and Secure Programming Practices30мин
Additional (optional) Resources: Network Security and Authentication, Part 130мин
Additional (optional) Resources: Network Security and Authentication, Part 240мин
Quiz6 практического упражнения
Self-check9мин
Self-check6мин
Self-check9мин
Self-check6мин
Self-Check2мин
Cyber Security in Manufacturing- Week 2 Quiz30мин
Неделя
3
Часов на завершение
5 ч. на завершение

Protecting Operational Technologies and Intellectual Property

The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design. ...
Reading
7 видео ((всего 45 мин.)), 7 материалов для самостоятельного изучения, 6 тестов
Video7 видео
Protecting Operational Technologies and Intellectual Property - Part 25мин
Supply Chain Security5мин
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16мин
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26мин
Data/Applications and Cloud Security8мин
Intellectual Property Protection from Threats8мин
Reading7 материала для самостоятельного изучения
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130мин
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230мин
Additional (optional) Resources: Supply Chain Security (Hardware Security)20мин
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130мин
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230мин
Additional (optional) Resources: Data/Applications and Cloud Security30мин
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30мин
Quiz6 практического упражнения
Self-check4мин
Self-check4мин
Self-check4мин
Self-check4мин
Self-check4мин
Cyber Security in Manufacturing- Week 3 Quiz30мин
Неделя
4
Часов на завершение
5 ч. на завершение

Breach Response

The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described....
Reading
8 видео ((всего 43 мин.)), 11 материалов для самостоятельного изучения, 6 тестов
Video8 видео
Reliability versus Security5мин
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14мин
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26мин
Monitoring, Intrusion Detection, and Network Hardening8мин
Intrusion Response, Recovery, and Forensics6мин
Your 4.0 Roadmap to Success2мин
Your 4.0 Roadmap to Success2мин
Reading11 материала для самостоятельного изучения
Additional (optional) Resources: Breach Response30мин
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10мин
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130мин
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230мин
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30мин
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30мин
Your 4.0 Roadmap to Success-- Resources10мин
Your Roadmap Project: Step 810мин
Your 4.0 Roadmap to Success-- Resources10мин
Your Roadmap Project: Step 910мин
Cyber Security in Manufacturing -- Key Takeways10мин
Quiz6 практического упражнения
Self-check6мин
Self-check6мин
Self-check6мин
Self-check6мин
Self-check4мин
Cyber Security in Manufacturing- Week 4 Quiz30мин
4.6
Рецензии: 13Chevron Right

Лучшие рецензии

автор: DCJan 28th 2018

Excellent course with a ton of great information and resources. Learned a lot about cybersecurity and its role in digital manufacturing systems.

автор: VDJan 24th 2018

great material and course as part of the DMD specialization!

Преподаватель

Avatar

Shambhu Upadhyaya

Professor
Computer Science and Engineering

О University at Buffalo

The University at Buffalo (UB) is a premier, research-intensive public university and the largest, most comprehensive institution of the State University of New York (SUNY) system. UB offers more than 100 undergraduate degrees and nearly 300 graduate and professional programs....

О The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

О специализации ''Digital Manufacturing & Design Technology '

Whether you’re a high school graduate exploring manufacturing careers, or an operations manager hungry for an understanding of the newest manufacturing technologies, this specialization will provide a foundation in how digital advances are changing the landscape and capabilities of factories. Nine courses – developed with input from the manufacturing industry – touch on Industry 4.0 and its components, including digital manufacturing and design practices, the concept of the digital thread, the Internet of Things and Big Data. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA...
Digital Manufacturing & Design Technology

Часто задаваемые вопросы

  • Зарегистрировавшись на сертификацию, вы получите доступ ко всем видео, тестам и заданиям по программированию (если они предусмотрены). Задания по взаимной оценке сокурсниками можно сдавать и проверять только после начала сессии. Если вы проходите курс без оплаты, некоторые задания могут быть недоступны.

  • Записавшись на курс, вы получите доступ ко всем курсам в специализации, а также возможность получить сертификат о его прохождении. После успешного прохождения курса на странице ваших достижений появится электронный сертификат. Оттуда его можно распечатать или прикрепить к профилю LinkedIn. Просто ознакомиться с содержанием курса можно бесплатно.

Остались вопросы? Посетите Центр поддержки учащихся.