Digital manufacturing and design or DMD is motivated by a digital thread of product, process data, and information which results in intellectual property of significant economic value. The digital thread is networked at several functions and levels in order to enhance efficiency and effectiveness. This single source-of-truth approach to storing and accessing product and process information makes DMD a prime target for hackers and counterfeiters. I am Shambhu Upadhyaya, Professor of Computer Science and Engineering at the University at Buffalo. In addition to my role as professor at UB, I also directs the Center of Excellence in Information Systems assurance Research and Education at the university. The center is certified by the National Security Agency and the US Department of Homeland Security. I am delighted to be the instructor of this exhilarating course. Let us consider the growing reality of cyber security in manufacturing. A recent IBM cyber security intelligence index survey showed that following healthcare, manufacturing is the second most targeted industry for cyber attacks. Insider threats continue to force a significant risk to these industries. Further, according to a recent document from the National Institute of Standards and Technology or NIST, 60% of the breaches in supply chains where due to cyber espionage. Manufacturing leads as the most targeted industry taking 27% of the share. These two reports and other relevant sources emphasize why a discussion around information security must be an integral part of any DMD thought process. The road-maps used to secure the traditional enterprise scale computer systems must evolve to meet the challenges faced when mobile communications systems are in play. These systems interact more with the physical world. Often, they have less computational power, greater emphasis on real time performance, less secure commercial off the shelf components, and greater diversity of operating systems. Considering the enormity of the DMD process, the vast number of security issues and challenges brought about by the use of legacy software, the presence of less computer savvy personnel at the shop floor, and the interaction between cyber and physical domains, it requires ongoing efforts to address the cyber security in manufacturing, that is so critically important. This course covers introductory concepts in variety of related topics relevant to cybersecurity and DMD. They include human machine interaction and machine to machine interaction, securing end to end process through the security development life cycle paradigm, software security and secure programming practices, network security and authentication, supply chain security, mobile devices security and secure wireless communication, data and application security, and security of cloud computing, intellectual property protection from threats both external and internal, and techniques to detect, mitigate, and respond to data breaches, and cyber forensics. Upon completion of this course you will be able to analyze why information security is an integral part of the overall DMD discussion. The course will also ensure that you are equipped with the fundamental concepts and tools to participate as a team member task to perform threat assessment of a manufacturing organization's intellectual property resulting from both operational technology and information technology assets. For organizations that have already completed assessment of such risks, you will be able to provide valuable inputs on implementing controls to mitigate identified risks. We are pleased to be joined in this course by Sriram Vilayanur, an expert in the field of Information Technologies and Operational Technologies, ITOT, along with enterprise risk management. He will host a lecture as well as share in discussions that emphasize the importance and expansion of cyber security in manufacturing. Welcome to the cyber security in manufacturing course of the digital manufacturing and design technology specialization.