search icon-carat-right cmu-wordmark

Classroom Training

By participating in SEI classroom training, professionals prepare for the next steps in their careers and lives. Most importantly, they return to their organizations with fresh ideas, new business skills, and a greater capacity for addressing the challenges their organizations face.

Visitors on Campus

Effective 8/1/21, visitors (both indoors and outdoors) for one-time visits and/or recurring meetings/events on campus are permitted.

Facial Coverings

Facial coverings both indoors and outdoors are optional, but remain strongly recommended.

Notify Your Contacts

Individuals who test positive for COVID-19 are encouraged to notify their close contacts.

Lodging

Registrants are responsible for arranging their own travel and accommodations. The SEI has standard lodging recommendations for courses, workshops, and seminars held at the SEI offices in Pittsburgh, Pennsylvania, and Arlington, Virginia. For training events at other locations, the SEI sends travel and lodging information in the confirmation email sent to registrants.

Business Casual

We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.

What to Bring

See course descriptions for the recommended and required equipment and materials needed for each course.

Classroom Course List

  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging cybersecurity threats and attacks. Building on the methods and tools discussed in the...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Creating a Computer Security Incident Response Team

    1 Incident Handling

    This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT) or similar capability. This course provides a high-level overview of the key issues and decisions that must be addressed in establishing an incident management capability. The course can also be...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Developing a National or Government CSIRT

    Incident Handling

    This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT. It discusses the basic components of CSIRTs in general and highlights the characteristics that make national or government versions of CSIRTs unique. Topics covered include capabilities and functions of each entity type, working...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Foundations of Incident Management

    4 Incident Handling

    This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work. This course was recently updated in September 2022, including a...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Managing Computer Security Incident Response Teams

    3 Incident Handling

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that incident management staff and managers may be expected to handle. The course also provides...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Design Guidelines and Patterns for Microservices

    4 Software Architecture

    In modern service-based solutions, services are developed and deployed as microservices. Microservice development involves countless technology and design choices, including industry standards, frameworks, design patterns, integration approaches, middleware products, and tools. And it is a moving landscape-new ideas and products for services and...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Designing Modern Service-Based Systems

    1 Software Architecture

    From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Documenting Software Architectures

    4 Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Software Architecture Design and Analysis

    4 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Software Architecture: Principles and Practices

    4 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Cybersecurity Oversight for the Business Executive

    2 Risk Assessment & Insider Threat

    This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative and an enterprise-wide risk that spans all operations. The course provides background and context...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Risk Management Measures of...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management: Measures of Effectiveness

    Risk Assessment & Insider Threat

    This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; evaluate the effectiveness of formal insider threat and insider risk management programs; identify the maturity of an organization's insider risk management processes and...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based upon the...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Risk Program Development - Governance and Appetite Workshop

    2 Risk Assessment & Insider Threat

    In this course, students learn how to construct a risk management program within the three fundamental pillars of governance, appetite, and policy. Specifically, the course will educate the student on how best to structure decision-makers in the organization to gain the risk information they need to be more effective. Furthermore, the audience...

    ClassroomOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Introduction to the CERT Resilience Management Model

    2 Risk Assessment & Insider Threat

    This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2. CERT-RMM is a maturity model that promotes the convergence of security, business continuity, and IT operations activities to help organizations actively direct, control, and...

    ClassroomOnsite
    Learn More
    Risk Assessment & Insider Threat

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.