search menu icon-carat-right cmu-wordmark

Classroom Training

By participating in SEI classroom training, professionals prepare for the next steps in their careers and lives. Most importantly, they return to their organizations with fresh ideas, new business skills, and a greater capacity for addressing the challenges their organizations face.

Visitors on Campus

Effective 8/1/21, visitors (both indoors and outdoors) for one-time visits and/or recurring meetings/events on campus are permitted.

Facial Coverings

Facial coverings both indoors and outdoors are optional, but remain strongly recommended.

Notify Your Contacts

Individuals who test positive for COVID-19 are encouraged to notify their close contacts.

Lodging

Registrants are responsible for arranging their own travel and accommodations. The SEI has standard lodging recommendations for courses, workshops, and seminars held at the SEI offices in Pittsburgh, Pennsylvania, and Arlington, Virginia. For training events at other locations, the SEI sends travel and lodging information in the confirmation email sent to registrants.

Business Casual

We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.

What to Bring

See course descriptions for the recommended and required equipment and materials needed for each course.

Classroom Course List

  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging cybersecurity threats and attacks. Building on the methods and tools discussed in the...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Developing a National or Government CSIRT

    Incident Handling

    This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT. It discusses the basic components of CSIRTs in general and highlights the characteristics that make national or government versions of CSIRTs unique. Topics covered include capabilities and functions of each entity type, working...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Foundations of Incident Management

    4 Incident Handling

    This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work. This course was recently updated in September 2022, including a...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Software Architecture Design and Analysis

    4 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Cybersecurity Oversight for the Business Executive

    2 Risk Assessment & Insider Threat

    This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative and an enterprise-wide risk that spans all operations. The course provides background and context...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Risk Management Measures of...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management: Measures of Effectiveness

    Risk Assessment & Insider Threat

    This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; evaluate the effectiveness of formal insider threat and insider risk management programs; identify the maturity of an organization's insider risk management processes and...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based upon the...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • OCTAVE FORTE: Connecting the Board Room to Cyber Risk

    2 Risk Assessment & Insider Threat

    Organizations need an adaptable and agile process that allow executives to have a real-time view of cyber risks. To address this challenge, the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) process has been assisting organizations to assess their technical risks for the better part of two decades, and the SEI has...

    ClassroomOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Introduction to the CERT Resilience Management Model

    2 Risk Assessment & Insider Threat

    This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2. CERT-RMM is a maturity model that promotes the convergence of security, business continuity, and IT operations activities to help organizations actively direct, control, and...

    ClassroomOnsite
    Learn More
    Risk Assessment & Insider Threat

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.