Johns Hopkins University
Artificial Intelligence Industrial Control Systems Security
Johns Hopkins University

Artificial Intelligence Industrial Control Systems Security

Jason Crossland

Instructor: Jason Crossland

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

31 hours to complete
3 weeks at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

31 hours to complete
3 weeks at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Learn how to assess and address safety, privacy, and security concerns in AI systems and their impact on cybersecurity.

  • Understand the legal and policy frameworks surrounding AI technologies and their application in industrial settings.

  • Gain expertise in securing industrial control systems (ICS), including PLC, SCADA, and DCS, and mitigating their vulnerabilities.

  • Explore advanced ICS security strategies, focusing on risk assessment, incident response, and securing OT protocols and supply chains.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

December 2024

Assessments

12 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Information Assurance Analysis Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 5 modules in this course

This course provides a comprehensive exploration of the safety, cybersecurity, and privacy implications of AI systems and large language models (LLMs). Students will evaluate the accountability of AI under the law and investigate governance frameworks. The course also focuses on the security challenges specific to Operational Technology (OT) and Industrial Control Systems (ICS), highlighting key vulnerabilities and operational differences from IT. Practical skills in using tools like Wireshark for cybersecurity analysis and implementing protective measures for PLCs will be emphasized. Through discussions and hands-on activities, learners will gain a robust understanding of the complex interplay between technology, security, and regulatory requirements.

What's included

1 video2 readings

This module explores the safety and cybersecurity aspects of AI systems, focusing on evaluating their security, privacy, and autonomous concerns. It also covers the applicability and functionality of large language models (LLMs), including how algorithms and learning patterns enhance their performance.

What's included

5 readings3 assignments6 plugins

This module explores the legal accountability of AI systems, examining how they are regulated and governed. It covers human factors in computing systems and the policies that AI systems fall under. Students will assess how ChatGPT contributes to or detracts from value and analyze the impact of chatbots on large language models (LLMs).

What's included

3 readings3 assignments4 plugins

This course explores the Purdue Enterprise Reference Architecture Model and Unified Facilities Criteria, providing a framework for industrial control systems (ICS). It covers basic control systems like PLC, SCADA, and DCS, and examines the operational differences between IT and OT environments. Students will learn about key cybersecurity control elements to enhance ICS security, identify top vulnerabilities from a cyber perspective, and understand the usage and implementation of PLC application firewalls and software whitelisting.

What's included

4 readings3 assignments3 plugins

In this module, we will continue our discussion of Industrial Control System (ICS) networks. Specifically discussing what encompasses supply chain risks, Original Equipment Manufacturers/Vendors, and techniques for mitigating these risks. We will also discuss and examine several different types of ICS/OT protocols regarding their characteristics, purposes/implementations, the cybersecurity concerns with various OT proprietary and open protocols, and the differences between OT and IT environments.

What's included

3 readings3 assignments4 plugins

Instructor

Jason Crossland
Johns Hopkins University
6 Courses386 learners

Offered by

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions