Forward-looking industrial engineering practices with cybersecurity integration

Strengthen industrial engineering teams with comprehensive cybersecurity knowledge

The integration of cybersecurity into all phases of a product's lifecycle is of fundamental importance for colleagues in industrial engineering when planning, designing and optimizing processes - from production and logistics through to operations. The course is already being set by industrial engineering, especially with regard to new cybersecurity requirements for production lines. The necessary conformity with new standards and regulations not only requires changes to existing processes, but also offers the opportunity to improve the efficiency and reliability of processes in general.

Learn about the impact of cybersecurity in the automotive industry as an Industrial Engineer, and get to know the tools to ensure the application of the production control plan, meeting all cybersecurity requirements and best practices throughout the production process. Now you will find all learning content of the live training available as a video course series.

Advantages at a glance

  • Compliance with new standards and regulations: Knowing and applying current cybersecurity regulations at every stage of the product lifecycle ensures that rapidly evolving requirements are met and risks are minimized.
  • Integration of new process steps: For example, the introduction of encryption technologies requires new steps in production and troubleshooting. Needs-based training ensures that the corresponding processes are designed efficiently and correctly.
  • Clarifying the need for public key infrastructure and access management: The implementation of PKI (Public Key Infrastructure) and access management systems in industrial manufacturing improves the overall security of production processes.
  • Advanced training and knowledge transfer within the team: It is necessary to teach team members who do not have direct access to training materials through alternative training formats, such as via regular team meetings. The objective here is to train cybersecurity facilitators in order to keep the entire team up to date.

Learning objectives of the entire video course
What will you be able to do after completing this video learning course?

  • Comprehend the impact of automotive hacks in and between all product lifecycle phases.
  • Differentiate between legal regulations and standards like UN R155 and ISO/SAE21434.
  • Identify potential enablers and inhibitors of cybersecurity.
  • Be able to sketch the elements of cybersecurity development like concepts, goals, and claims.
  • Be sure you can follow the main steps of risk assessment.
  • Reflect the challenges of cybersecurity planning especially during distributed development.
  • Describe the needs of cybersecurity verification and validation incl. fuzz and pen testing.

Content of the On-Demand Video learning bundle for Industrial Engineering (Total length: +5 hours)

This video course series consists of 34 single videos, according to the following listing (sorted by chapters)

By accessing this All-access bundle, you will then find a learning video (in English) for each topic listed below in your personal login area. Each individual learning video has a length of approx. 10 minutes. Please note: Downloading the learning videos is not possible for licensing reasons.

• Cybersecurity terms and definitions
• Automotive hacks

• The Difference between Regulations, Standards, and Laws
• Overview ISO/SAE 21434
• UN Regulation No. 155 (CSMS + Type Approval)
• UN Regulation No. 156 (SUMS + Type Approval + RXSWIN)

ISO 24089 (SW over-the-air updates)

IEC 62443 & TISAX (industrial cybersecurity and IT security assessment)

• Vehicle ecosystem and challenges in V2X
• Impact of Cybersecurity on Product lifecycle

• Cybersecurity Management - Organizational level
• Policy, rules, processes, resources
• Cybersecurity culture
• Tool Qualification
• Cybersecurity Management - Project level
• Impact of Cybersecurity on Project lifecycle
• Cybersecurity planning
• Cybersecurity Plan
• Cybersecurity Case

Release for post-development report
Overview Product Security Incident Response Team (PSIRT)
Production control plan
Cybersecurity requirements for post-development
• Cybersecurity incident response plan

• Cybersecurity Development
• Threat analysis and risk assessment (TARA)
• Cybersecurity Concept
• Cybersecurity Best practices

• Cybersecurity Risk Assessment


Cybersecurity SW Development Measures
Cybersecurity Control Implementation - Development vs Maintenance Phase

Introduction to Cybersecurity Controls
Automotive cybersecurity controls

• Cybersecurity verification and validation strategy

Course plan

Intro to your ODV video learning course 🥉 CySec for Industrial Engineering
📄 Chapter 01: Awareness
📄 Chapter 02: Automotive Cybersecurity Standards
📄 Chapter 03: Cybersecurity in Automotive Industry
📄 Chapter 04: Cybersecurity Management Courses
📄 Chapter 05: Cybersecurity Development
📄 Chapter 06: Risk Assessment
📄 Chapter 07: Cybersecurity Implementation
📄 Chapter 08: Cybersecurity controls
📄 Chapter 09: Cybersecurity Testing and Validation
Certificate of Attendance (CoA) Industrial Engineering