課程信息

37,939 次近期查看
可分享的證書
完成後獲得證書
100% 在線
立即開始,按照自己的計劃學習。
可靈活調整截止日期
根據您的日程表重置截止日期。
初級
完成時間大約為22 小時
英語(English)
可分享的證書
完成後獲得證書
100% 在線
立即開始,按照自己的計劃學習。
可靈活調整截止日期
根據您的日程表重置截止日期。
初級
完成時間大約為22 小時
英語(English)

提供方

Placeholder

纽约州立大学布法罗分校

Placeholder

纽约州立大学纽约州立大学

教學大綱 - 您將從這門課程中學到什麼

內容評分Thumbs Up97%(2,036 個評分)Info
1

1

完成時間為 5 小時

Introduction to Digital Manufacturing Security

完成時間為 5 小時
9 個視頻 (總計 51 分鐘), 7 個閱讀材料, 5 個測驗
9 個視頻
Digital Manufacturing Security Part 15分鐘
Digital Manufacturing Security - Part 24分鐘
Information Security Framework - Part 14分鐘
Information Security Framework - Part 27分鐘
Operational Technology and Informational Technology4分鐘
Risk Management8分鐘
Application of Information Security - Part 15分鐘
Application of Information Security - Part 25分鐘
7 個閱讀材料
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125分鐘
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225分鐘
Acknowledgements10分鐘
Additional (optional) Resources: Information Security Framework, Part 130分鐘
Additional (optional) Resources: Information Security Framework, Part 225分鐘
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130分鐘
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230分鐘
5 個練習
Self-check9分鐘
Self-check6分鐘
Self-check6分鐘
Self-check6分鐘
Cyber Security in Manufacturing- Week 1 Quiz30分鐘
2

2

完成時間為 5 小時

Guidance on Securing Digital Manufacturing Operations

完成時間為 5 小時
6 個視頻 (總計 43 分鐘), 6 個閱讀材料, 6 個測驗
6 個視頻
Human-Machine and M2M Interactions6分鐘
Securing End to End Process via Security Development Life Cycle5分鐘
Software Security Flaws and Threats8分鐘
Network Security and Authentication - Part 18分鐘
Network Security and Authentication - Part 27分鐘
6 個閱讀材料
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30分鐘
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30分鐘
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20分鐘
Additional (optional) Resources: Software Security and Secure Programming Practices30分鐘
Additional (optional) Resources: Network Security and Authentication, Part 130分鐘
Additional (optional) Resources: Network Security and Authentication, Part 240分鐘
6 個練習
Self-check9分鐘
Self-check6分鐘
Self-check9分鐘
Self-check6分鐘
Self-Check30分鐘
Cyber Security in Manufacturing- Week 2 Quiz30分鐘
3

3

完成時間為 6 小時

Protecting Operational Technologies and Intellectual Property

完成時間為 6 小時
7 個視頻 (總計 45 分鐘), 7 個閱讀材料, 6 個測驗
7 個視頻
Protecting Operational Technologies and Intellectual Property - Part 25分鐘
Supply Chain Security5分鐘
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16分鐘
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26分鐘
Data/Applications and Cloud Security8分鐘
Intellectual Property Protection from Threats8分鐘
7 個閱讀材料
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130分鐘
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230分鐘
Additional (optional) Resources: Supply Chain Security (Hardware Security)20分鐘
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130分鐘
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230分鐘
Additional (optional) Resources: Data/Applications and Cloud Security30分鐘
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30分鐘
6 個練習
Self-check4分鐘
Self-check4分鐘
Self-check4分鐘
Self-check30分鐘
Self-check30分鐘
Cyber Security in Manufacturing- Week 3 Quiz30分鐘
4

4

完成時間為 6 小時

Breach Response

完成時間為 6 小時
8 個視頻 (總計 43 分鐘), 11 個閱讀材料, 6 個測驗
8 個視頻
Reliability versus Security5分鐘
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14分鐘
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26分鐘
Monitoring, Intrusion Detection, and Network Hardening8分鐘
Intrusion Response, Recovery, and Forensics6分鐘
Your 4.0 Roadmap to Success2分鐘
Your 4.0 Roadmap to Success2分鐘
11 個閱讀材料
Additional (optional) Resources: Breach Response30分鐘
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10分鐘
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130分鐘
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230分鐘
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30分鐘
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30分鐘
Your 4.0 Roadmap to Success-- Resources10分鐘
Your Roadmap Project: Step 810分鐘
Your 4.0 Roadmap to Success-- Resources10分鐘
Your Roadmap Project: Step 910分鐘
Cyber Security in Manufacturing -- Key Takeways10分鐘
6 個練習
Self-check6分鐘
Self-check6分鐘
Self-check6分鐘
Self-check6分鐘
Self-check30分鐘
Cyber Security in Manufacturing- Week 4 Quiz30分鐘

審閱

來自CYBER SECURITY IN MANUFACTURING 的熱門評論

查看所有評論

常見問題

還有其他問題嗎?請訪問 學生幫助中心