The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.
Cyber Security in Manufacturing
This course is part of Digital Manufacturing & Design Technology Specialization
Instructor: Shambhu Upadhyaya
Sponsored by Defense Acquisition University
20,581 already enrolled
(640 reviews)
Skills you'll gain
Details to know
Add to your LinkedIn profile
23 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.
What's included
9 videos7 readings5 assignments
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.
What's included
6 videos6 readings6 assignments1 discussion prompt
The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.
What's included
7 videos7 readings6 assignments
The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.
What's included
8 videos11 readings6 assignments1 discussion prompt
Instructor
Why people choose Coursera for their career
Learner reviews
640 reviews
- 5 stars
76.40%
- 4 stars
18.12%
- 3 stars
3.12%
- 2 stars
1.40%
- 1 star
0.93%
Showing 3 of 640
Reviewed on Apr 15, 2020
Learned good number of cybersecurity terminologies, thanks to Prof.Shambhu Upadhyaya for the wonderful coverage and interactions.
Reviewed on Jul 22, 2020
Great Course to learn various aspects of cyber attacks and security of manufacturing systems
Reviewed on Apr 10, 2020
I liked it.... The communication of the professor is very good......
Recommended if you're interested in Physical Science and Engineering
New York University
IIMA - IIM Ahmedabad
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy