Secure Applications: Managing the Deployment Infrastructure
Harvard Extension School
CSCI E-117
Section 1
CRN 26436
You have spent time designing, developing, and testing your web-facing, internet accessible, or internet of things (IoT) or industrial control systems (ICS) product and have released it into a world of ever-changing and constantly more aggressive cyber threats. How do you know if it is really protected? What do frameworks and approaches mean for the ongoing operation and protection of your environment? How do you protect your assets and how do you prove this to your stakeholders and customers? How do you manage the response to vulnerabilities in the open-source software that is part of your application? Which is more important for you to protect—our networks or your devices? How do you manage the ongoing care and feeding of applications? What about all that data? What about vulnerabilities and attacks against third party software that is part of your environment? In this course, we work through the steps to secure an organization, its products and services, and its operating environment, including prioritizing how we protect the asset classes that make up the environment: the networks, devices, applications, data, and users that support a product. Course content includes threats, exploits, and compromises drawn from the news (sadly, there are always pertinent things in the cybersecurity news that we can use as the basis of discussion), as well as the Cybersecurity and Infrastructure Security Agency (CISA's) Zero Trust Maturity Model, CISA's Known Exploitable Vulnerability (KEV) lists, risk management concepts, and whatever is topical at the time in the news.
Registration Closes: January 22, 2026
Credits: 4
View Tuition Information Term
Spring Term 2026
Part of Term
Full Term
Format
Flexible Attendance Web Conference
Credit Status
Graduate, Noncredit, Undergraduate
Section Status
Open