课程信息

43,940 次近期查看
可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为22 小时
英语(English)
可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为22 小时
英语(English)

提供方

Placeholder

纽约州立大学布法罗分校

Placeholder

纽约州立大学纽约州立大学

教学大纲 - 您将从这门课程中学到什么

内容评分Thumbs Up97%(2,208 个评分)Info
1

1

完成时间为 5 小时

Introduction to Digital Manufacturing Security

完成时间为 5 小时
9 个视频 (总计 51 分钟), 7 个阅读材料, 5 个测验
9 个视频
Digital Manufacturing Security Part 15分钟
Digital Manufacturing Security - Part 24分钟
Information Security Framework - Part 14分钟
Information Security Framework - Part 27分钟
Operational Technology and Informational Technology4分钟
Risk Management8分钟
Application of Information Security - Part 15分钟
Application of Information Security - Part 25分钟
7 个阅读材料
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 125分钟
Additional (optional) Resources: Background and Description of the need for Digital Manufacturing Security, Part 225分钟
Acknowledgements10分钟
Additional (optional) Resources: Information Security Framework, Part 130分钟
Additional (optional) Resources: Information Security Framework, Part 225分钟
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 130分钟
Additional (optional) Resources: Application of Information Security in Digital Manufacturing Overview, Part 230分钟
5 个练习
Self-check9分钟
Self-check6分钟
Self-check6分钟
Self-check6分钟
Cyber Security in Manufacturing- Week 1 Quiz30分钟
2

2

完成时间为 5 小时

Guidance on Securing Digital Manufacturing Operations

完成时间为 5 小时
6 个视频 (总计 43 分钟), 6 个阅读材料, 6 个测验
6 个视频
Human-Machine and M2M Interactions6分钟
Securing End to End Process via Security Development Life Cycle5分钟
Software Security Flaws and Threats8分钟
Network Security and Authentication - Part 18分钟
Network Security and Authentication - Part 27分钟
6 个阅读材料
Additional (optional) Resources: Virtualization, Computing, Data, AI, Robotics30分钟
Additional (optional) Resources: Human-Machine and Machine to Machine Interactions30分钟
Additional (optional) Resources: Securing End-to-End Process via Security Development Life Cycle20分钟
Additional (optional) Resources: Software Security and Secure Programming Practices30分钟
Additional (optional) Resources: Network Security and Authentication, Part 130分钟
Additional (optional) Resources: Network Security and Authentication, Part 240分钟
6 个练习
Self-check9分钟
Self-check6分钟
Self-check9分钟
Self-check6分钟
Self-Check30分钟
Cyber Security in Manufacturing- Week 2 Quiz30分钟
3

3

完成时间为 6 小时

Protecting Operational Technologies and Intellectual Property

完成时间为 6 小时
7 个视频 (总计 45 分钟), 7 个阅读材料, 6 个测验
7 个视频
Protecting Operational Technologies and Intellectual Property - Part 25分钟
Supply Chain Security5分钟
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 16分钟
Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 26分钟
Data/Applications and Cloud Security8分钟
Intellectual Property Protection from Threats8分钟
7 个阅读材料
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 130分钟
Additional (optional) Resources: Cyber Physical Systems (SCADA), Physical Security vs Cyber Security, Part 230分钟
Additional (optional) Resources: Supply Chain Security (Hardware Security)20分钟
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 130分钟
Additional (optional) Resources: Shipping, RFID Tags, Mobile Device Security, Wireless Communication, Part 230分钟
Additional (optional) Resources: Data/Applications and Cloud Security30分钟
Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal30分钟
6 个练习
Self-check4分钟
Self-check4分钟
Self-check4分钟
Self-check30分钟
Self-check30分钟
Cyber Security in Manufacturing- Week 3 Quiz30分钟
4

4

完成时间为 6 小时

Breach Response

完成时间为 6 小时
8 个视频 (总计 43 分钟), 11 个阅读材料, 6 个测验
8 个视频
Reliability versus Security5分钟
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 14分钟
Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 26分钟
Monitoring, Intrusion Detection, and Network Hardening8分钟
Intrusion Response, Recovery, and Forensics6分钟
Your 4.0 Roadmap to Success2分钟
Your 4.0 Roadmap to Success2分钟
11 个阅读材料
Additional (optional) Resources: Breach Response30分钟
Additional (optional) Resources: Reliability vs Security, Challenges, and Solutions10分钟
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 130分钟
Additional (optional) Resources: Intrusion Prevention Techniques and Data Leak Prevention Tools, Part 230分钟
Additional (optional) Resources: Monitoring, Intrusion Detection, and Network Hardening30分钟
Additional (optional) Resources: Intrusion Response, Recovery, and Forensics30分钟
Your 4.0 Roadmap to Success-- Resources10分钟
Your Roadmap Project: Step 810分钟
Your 4.0 Roadmap to Success-- Resources10分钟
Your Roadmap Project: Step 910分钟
Cyber Security in Manufacturing -- Key Takeways10分钟
6 个练习
Self-check6分钟
Self-check6分钟
Self-check6分钟
Self-check6分钟
Self-check30分钟
Cyber Security in Manufacturing- Week 4 Quiz30分钟

审阅

来自CYBER SECURITY IN MANUFACTURING 的热门评论

查看所有评论

关于 Digital Manufacturing & Design Technology 专项课程

Digital Manufacturing & Design Technology

常见问题

还有其他问题吗?请访问 学生帮助中心