Secure Applications: Managing the Deployment Infrastructure

Harvard Extension School

CSCI E-117

Section 1

CRN 26436

View Course Details
You have spent time designing, developing, and testing your web-facing, internet accessible, or internet of things (IoT) or industrial control systems (ICS) product and have released it into a world of ever-changing and constantly more aggressive cyber threats. How do you know if it is really protected? What do frameworks and approaches mean for the ongoing operation and protection of your environment? How do you protect your assets and how do you prove this to your stakeholders and customers? How do you manage the response to vulnerabilities in the open-source software that is part of your application? Which is more important for you to protect—our networks or your devices? How do you manage the ongoing care and feeding of applications? What about all that data? What about vulnerabilities and attacks against third party software that is part of your environment? In this course, we work through the steps to secure an organization, its products and services, and its operating environment, including prioritizing how we protect the asset classes that make up the environment: the networks, devices, applications, data, and users that support a product. Course content includes threats, exploits, and compromises drawn from the news (sadly, there are always pertinent things in the cybersecurity news that we can use as the basis of discussion), as well as the Cybersecurity and Infrastructure Security Agency (CISA's) Zero Trust Maturity Model, CISA's Known Exploitable Vulnerability (KEV) lists, risk management concepts, and whatever is topical at the time in the news.

Instructor Info

Heather Hinton, PhD

Chief Information Security Officer in Residence, Professional Association of CISOs


Meeting Info

T 5:30pm - 7:30pm (1/26 - 5/16)

Participation Option: Online Asynchronous or Online Synchronous

In online asynchronous courses, you are not required to attend class at a particular time. Instead you can complete the course work on your own schedule each week.

Deadlines

Last day to register: January 22, 2026

Prerequisites

CSCI E-149a or experience with security software development principles. A basic understanding of security threats, tools, and landscape.

Notes

This course meets via web conference. Students may attend at the scheduled meeting time or watch recorded sessions asynchronously. Recorded sessions are typically available within a few hours of the end of class and no later than the following business day. See minimum technology requirements.

All Sections of this Course

CRN Section # Participation Option(s) Instructor Section Status Meets Term Dates
26436 1 Online Asynchronous, Online Synchronous Heather Hinton Open T 5:30pm - 7:30pm
Jan 26 to May 16