Secure Applications: Managing the Deployment Infrastructure
Harvard Extension School
CSCI E-117
Section 1
CRN 26436
You have spent time designing, developing, and testing your web-facing, internet accessible, or internet of things (IoT) product and have released it into a world of ever-changing and constantly more aggressive cyber threats. How do you know if you can handle a data breach or a cybersecurity compromise? How do you continue to protect the data your application processes and keep your application available and secure, and how do you prove this to your customers? Thanks to the President's Executive Order (EO) 14028 on Improving the Nation's Cybersecurity, the US Securities and Exchange Commission cybersecurity actions, and the latest technology advances (such as generative artificial intelligence [AI]), this is getting harder and more time consuming. In this course, we work through the steps to secure your product and its operating environment, including prioritizing how we protect the asset classes that make up your environment beyond just the software application itself (so, the networks, devices, applications, data, and users that support your product) and how to detect and respond to attacks against the overall ecosystem and individual assets. Course content includes threats, exploits, and compromises drawn from the news (sadly there are always pertinent things in the cybersecurity news that we can use as the basis of discussion), as well as the Cybersecurity and Infrastructure Security Agency (CISA's) Zero Trust Maturity Model, CISA's Known Exploitable Vulnerability (KEV) lists, risk management concepts, and whatever is topical at the time in the news.
Registration Closes: January 23, 2025
Credits: 4
View Tuition Information Term
Spring Term 2025
Part of Term
Full Term
Format
Flexible Attendance Web Conference
Credit Status
Graduate, Noncredit, Undergraduate
Section Status
Open