We may earn an affiliate commission when you visit our partners.
Course image
Shambhu Upadhyaya

The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.

Read more

The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.

Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain valuable insights of implementing controls to mitigate identified risks.

Main concepts of this course will be delivered through lectures, readings, discussions and various videos.

This is the seventh course in the Digital Manufacturing & Design Technology specialization that explores the many facets of manufacturing’s “Fourth Revolution,” aka Industry 4.0, and features a culminating project involving creation of a roadmap to achieve a self-established DMD-related professional goal. To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA

Enroll now

What's inside

Syllabus

Introduction to Digital Manufacturing Security
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.
Read more
Guidance on Securing Digital Manufacturing Operations
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.
Protecting Operational Technologies and Intellectual Property
The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.
Breach Response
The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores securing digital manufacturing operations which is essential in industry today
Teaches security needs and how to implement information security systems which are valuable skills in today's cybersecurity landscape
Develops the foundational skills needed to perform a risk assessment of operational and information technology assets which is highly relevant in today's interconnected world
Provides valuable insights on implementing controls to mitigate identified risks which is essential for maintaining a secure digital manufacturing environment
Offers a mix of lectures, readings, discussions, and videos, making the learning experience more engaging
Cautions on the threat landscape and system failures which are important considerations in securing digital manufacturing operations

Save this course

Save Cyber Security in Manufacturing to your list so you can find it easily later:
Save

Reviews summary

Highly rated cyber security in manufacturing course

According to students, this course is well received and offers a great overview of Cyber Security in Manufacturing. Learners say the course presents important foundational concepts of cyber security in an engaging way. Students note the course is informative and highly recommend it.
The course is well structured and easy to follow.
"One student says, “The course is well organized, and the instructor was so great and gave all the relevant information.”"
Students frequently commend this course.
"Learners say the course presents important foundational concepts of cyber security in an engaging way."
"Students note the course is informative and highly recommend it."
A few learners mention there is a lack of practical examples and implementation.
"The topics are dealt with too superficially for me. There is often a lack of practical examples or implementation."
Some students note that some links in the course are outdated.
"Unfortunately, the course is outdated. It has several links that are not functional and many of them refer to Blogs and videos that are almost a decade old."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cyber Security in Manufacturing with these activities:
Organize and review course materials
Enhance understanding and retention by organizing and reviewing course materials regularly.
Show steps
  • Compile lecture notes, readings, and assignments in a structured manner.
  • Review the materials periodically to reinforce key concepts.
  • Identify areas where further clarification is needed and seek assistance.
Review foundational concepts of information security
Review foundational concepts of information security to ensure a strong knowledge base for the course.
Browse courses on Security Fundamentals
Show steps
  • Explore online resources and materials on information security fundamentals.
  • Review concepts such as confidentiality, integrity, and availability.
  • Identify common security threats and vulnerabilities.
Complete security assessment simulations
Develop practical skills in identifying and assessing security vulnerabilities.
Browse courses on Security Assessment
Show steps
  • Utilize online platforms or software tools for security assessment simulations.
  • Analyze system configurations and identify potential weaknesses.
  • Generate reports and recommendations based on the assessment findings.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Attend a workshop on digital manufacturing security
Engage in interactive learning and gain insights from industry experts.
Show steps
  • Identify and register for workshops offered by industry organizations or educational institutions.
  • Attend the workshop and actively participate in discussions and hands-on activities.
  • Network with professionals in the field and learn from their experiences.
Read 'Security in Computing' by Charles P. Pfleeger
Gain a comprehensive understanding of information security principles and practices.
Show steps
  • Read the assigned chapters and complete the practice exercises.
  • Summarize key concepts and apply them to real-world security scenarios.
Follow tutorials on implementing security controls
Gain practical experience in implementing security controls to protect systems and data.
Browse courses on Security Controls
Show steps
  • Identify online tutorials or workshops on security control implementation.
  • Follow the instructions and apply the controls to a simulated or real-world environment.
  • Evaluate the effectiveness of the implemented controls.
Create a security incident response plan
Develop a practical plan to respond to security incidents effectively.
Browse courses on Incident Response
Show steps
  • Identify potential security incidents and their impact.
  • Define roles and responsibilities for incident response.
  • Establish procedures for containment, eradication, and recovery.
  • Test the incident response plan through simulations or exercises.
Volunteer at a cybersecurity organization
Gain practical experience and contribute to cybersecurity education and awareness initiatives.
Browse courses on Security Awareness
Show steps
  • Identify local cybersecurity organizations or initiatives that offer volunteer opportunities.
  • Contact the organization and express your interest in volunteering.
  • Participate in activities such as awareness campaigns, workshops, or community events.
Contribute to open-source security tools
Apply knowledge and skills by contributing to the development and improvement of open-source security tools.
Browse courses on Open Source Security
Show steps
  • Identify open-source security projects that align with your interests.
  • Review the project documentation and contribute bug fixes or enhancements.
  • Collaborate with the community of developers to improve the tool's functionality and security.

Career center

Learners who complete Cyber Security in Manufacturing will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst monitors the safety of an organization’s computer networks and systems. This course would be an excellent foundation for an Information Security Analyst by teaching you the skills necessary for protecting operational technologies, systems, and resources in a digital manufacturing environment. It will help you understand the importance of information security and risk assessment, as well as how to implement controls to mitigate identified risks.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains an organization’s cybersecurity infrastructure. This course may be helpful for a Cybersecurity Engineer by teaching you the basics of cybersecurity and how to apply it to digital manufacturing. It will help you understand the threats to digital manufacturing systems and how to protect against them.
Digital Manufacturing Engineer
A Digital Manufacturing Engineer uses computer-aided design (CAD) and computer-aided manufacturing (CAM) software to design and manufacture products. This course may be helpful for a Digital Manufacturing Engineer by teaching you the basics of cybersecurity and how to apply it to digital manufacturing. It will help you understand the threats to digital manufacturing systems and how to protect against them.
IT Manager
An IT Manager is responsible for the information technology (IT) systems of an organization. This course may be helpful for an IT Manager by teaching you the basics of cybersecurity and how to apply it to digital manufacturing. It will help you understand the threats to digital manufacturing systems and how to protect against them.
Industrial Engineer
An Industrial Engineer designs, implements, and maintains industrial systems and processes. This course may be helpful for an Industrial Engineer by teaching you the basics of information security and risk assessment. It will help you understand the importance of protecting operational technologies, systems, and resources in a manufacturing environment.
Systems Administrator
A Systems Administrator is responsible for the maintenance and operation of an organization’s computer systems. This course may be helpful for a Systems Administrator by teaching you the basics of cybersecurity and how to apply it to digital manufacturing. It will help you understand the threats to digital manufacturing systems and how to protect against them.
Database Administrator
A Database Administrator is responsible for the maintenance and operation of an organization’s databases. This course may be helpful for a Database Administrator by teaching you the basics of cybersecurity and how to apply it to digital manufacturing. It will help you understand the threats to digital manufacturing systems and how to protect against them.
Production Manager
A Production Manager plans, organizes, and directs the production of goods and services. This course may be helpful for a Production Manager by teaching you the basics of information security and risk assessment. It will help you understand the importance of protecting operational technologies, systems, and resources in a manufacturing environment.
Quality Manager
A Quality Manager is responsible for the quality of an organization’s products and services. This course may be helpful for a Quality Manager by teaching you the basics of information security and risk assessment. It will help you understand the importance of protecting operational technologies, systems, and resources in a manufacturing environment.
Safety Manager
A Safety Manager is responsible for the safety of an organization’s employees and property. This course may be helpful for a Safety Manager by teaching you the basics of information security and risk assessment. It will help you understand the importance of protecting operational technologies, systems, and resources in a manufacturing environment.
Security Manager
A Security Manager is responsible for the security of an organization’s assets. This course may be helpful for a Security Manager by teaching you the basics of cybersecurity and how to apply it to digital manufacturing. It will help you understand the threats to digital manufacturing systems and how to protect against them.
Plant Manager
A Plant Manager is responsible for the overall operation of a manufacturing plant. This course may be helpful for a Plant Manager by teaching you the basics of information security and risk assessment. It will help you understand the importance of protecting operational technologies, systems, and resources in a manufacturing environment.
Manufacturing Engineer
A Manufacturing Engineer designs, develops, and implements manufacturing processes. This course may be helpful for a Manufacturing Engineer by teaching you the basics of information security and risk assessment. It will help you understand the importance of protecting operational technologies, systems, and resources in a manufacturing environment.
Network Administrator
A Network Administrator is responsible for the maintenance and operation of an organization’s computer networks. This course may be helpful for a Network Administrator by teaching you the basics of cybersecurity and how to apply it to digital manufacturing. It will help you understand the threats to digital manufacturing systems and how to protect against them.
Operations Manager
An Operations Manager plans, organizes, and directs the operations of an organization. This course may be helpful for an Operations Manager by teaching you the basics of information security and risk assessment. It will help you understand the importance of protecting operational technologies, systems, and resources in a manufacturing environment.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cyber Security in Manufacturing .
Provides a comprehensive guide to industrial cybersecurity. It covers the threats to industrial systems, the risks they pose, and the countermeasures that can be implemented to protect them.
Provides a detailed overview of the cyber threats to industrial control systems and SCADA networks. It covers the vulnerabilities of these systems, the attacks that can be launched against them, and the countermeasures that can be implemented to protect them.
Provides an introduction to industrial cybersecurity. It covers the threats to industrial systems, the risks they pose, and the countermeasures that can be implemented to protect them.
Provides a comprehensive overview of cybersecurity for critical infrastructure. It covers the threats to critical infrastructure, the risks they pose, and the countermeasures that can be implemented to protect them.
Provides a good introduction to cybersecurity for those with little or no background in the field.
Provides a detailed overview of cyberwarfare. It covers the history of cyberwarfare, the threats it poses, and the countermeasures that can be implemented to protect against it.
Provides a comprehensive overview of cybersecurity. It covers the threats to cybersecurity, the risks they pose, and the countermeasures that can be implemented to protect against them.
Provides a guide to manufacturing cybersecurity for business leaders. It covers the threats to manufacturing cybersecurity, the risks they pose, and the countermeasures that can be implemented to protect against them.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser