Sign up to Coursera courses for free
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.
Acquire knowledge about security needs and the application of information security systems. Build the foundational skills needed in performing a risk assessment of operational and information technology assets. Gain valuable insights of implementing controls to mitigate identified risks.
Main concepts of this course will be delivered through lectures, readings, discussions and various videos.
This is the seventh course in the Digital Manufacturing & Design Technology specialization that explores the many facets of manufacturing’s “Fourth Revolution,” aka Industry 4.0, and features a culminating project involving creation of a roadmap to achieve a self-established DMD-related professional goal.
To learn more about the Digital Manufacturing and Design Technology specialization, please watch the overview video by copying and pasting the following link into your web browser: https://youtu.be/wETK1O9c-CA
Introduction to Digital Manufacturing Security
The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.
Guidance on Securing Digital Manufacturing Operations
The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.
Protecting Operational Technologies and Intellectual Property
The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes - supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.
The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.