Classroom Training
By participating in SEI classroom training, professionals prepare for the next steps in their careers and lives. Most importantly, they return to their organizations with fresh ideas, new business skills, and a greater capacity for addressing the challenges their organizations face.
Visitors on Campus
Effective 8/1/21, visitors (both indoors and outdoors) for one-time visits and/or recurring meetings/events on campus are permitted.
Facial Coverings
Facial coverings both indoors and outdoors are optional, but remain strongly recommended.
Notify Your Contacts
Individuals who test positive for COVID-19 are encouraged to notify their close contacts.
Lodging
Registrants are responsible for arranging their own travel and accommodations. The SEI has standard lodging recommendations for courses, workshops, and seminars held at the SEI offices in Pittsburgh, Pennsylvania, and Arlington, Virginia. For training events at other locations, the SEI sends travel and lodging information in the confirmation email sent to registrants.
Business Casual
We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.
What to Bring
See course descriptions for the recommended and required equipment and materials needed for each course.
Classroom Course List
-
Advanced Topics in Incident Handling
4 Incident Handling
This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging cybersecurity threats and attacks. Building on the methods and tools discussed in the...
Incident Handling -
Creating a Computer Security Incident Response Team
1 Incident Handling
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT) or similar capability. This course provides a high-level overview of the key issues and decisions that must be addressed in establishing an incident management capability. The course can also be...
Incident Handling -
Developing a National or Government CSIRT
Incident Handling
This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT. It discusses the basic components of CSIRTs in general and highlights the characteristics that make national or government versions of CSIRTs unique. Topics covered include capabilities and functions of each entity type, working...
Incident Handling -
Foundations of Incident Management
4 Incident Handling
This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work. This course was recently updated in September 2022, including a...
Incident Handling -
Managing Computer Security Incident Response Teams
3 Incident Handling
This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that incident management staff and managers may be expected to handle. The course also provides...
Incident Handling -
Design Guidelines and Patterns for Microservices
4 Software Architecture
In modern service-based solutions, services are developed and deployed as microservices. Microservice development involves countless technology and design choices, including industry standards, frameworks, design patterns, integration approaches, middleware products, and tools. And it is a moving landscape-new ideas and products for services and...
Software Architecture -
Designing Modern Service-Based Systems
1 Software Architecture
From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers...
Software Architecture -
Documenting Software Architectures
4 Software Architecture
Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...
Software Architecture -
Software Architecture Design and Analysis
4 Software Architecture
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...
Software Architecture -
Software Architecture: Principles and Practices
4 Software Architecture
Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...
Software Architecture -
Cybersecurity Oversight for the Business Executive
2 Risk Assessment & Insider Threat
This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative and an enterprise-wide risk that spans all operations. The course provides background and context...
Risk Assessment & Insider Threat -
Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Risk Assessment & Insider Threat
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Risk Management Measures of...
Risk Assessment & Insider Threat -
Insider Risk Management: Measures of Effectiveness
Risk Assessment & Insider Threat
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; evaluate the effectiveness of formal insider threat and insider risk management programs; identify the maturity of an organization's insider risk management processes and...
Risk Assessment & Insider Threat -
Insider Threat Analyst
3 Risk Assessment & Insider Threat
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based upon the...
Risk Assessment & Insider Threat -
Insider Threat Program Manager (ITPM) Certificate Package
Risk Assessment & Insider Threat
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...
Risk Assessment & Insider Threat -
Insider Threat Program Manager: Implementation and Operation
3 Risk Assessment & Insider Threat
This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods...
Risk Assessment & Insider Threat -
Risk Program Development - Governance and Appetite Workshop
2 Risk Assessment & Insider Threat
In this course, students learn how to construct a risk management program within the three fundamental pillars of governance, appetite, and policy. Specifically, the course will educate the student on how best to structure decision-makers in the organization to gain the risk information they need to be more effective. Furthermore, the audience...
Risk Assessment & Insider Threat -
Introduction to the CERT Resilience Management Model
2 Risk Assessment & Insider Threat
This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2. CERT-RMM is a maturity model that promotes the convergence of security, business continuity, and IT operations activities to help organizations actively direct, control, and...
Risk Assessment & Insider Threat
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.