search menu icon-carat-right cmu-wordmark

Live-Online Training

The SEI's online learning platforms provide expert instruction as well as exercises, assessments, and other resources. Our live-online training offers synchronous learning where you and your instructor can interact during classes.

Live-Online learning enables you to

  • learn from SEI experts in an interactive, online classroom environment
  • communicate directly and easily with SEI instructors
  • interact with other learners, during and after class sessions
  • review instructional content outside of class sessions
  • access electronic materials

Live-Online Courses

  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Creating a Computer Security Incident Response Team

    1 Incident Handling

    This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Managing Computer Security Incident Response Teams

    3 Incident Handling

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Design Guidelines and Patterns for Microservices

    4 Software Architecture

    In modern service-based solutions, services are developed and deployed as microservices. Microservice development involves countless technology and design choices, including industry standards, frameworks, design patterns, integration approaches, middleware products, and tools. And it is a moving landscape-new ideas and products for services and...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Designing Modern Service-Based Systems

    1 Software Architecture

    From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Software Architecture Design and Analysis

    4 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Software Architecture: Principles and Practices

    4 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Cybersecurity Oversight for the Business Executive

    2 Risk Assessment & Insider Threat

    This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative and an enterprise-wide risk that spans all operations. The course provides background and context...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based upon the...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Evaluator

    3 Risk Assessment & Insider Threat

    This three-day, instructor-led, course presents strategies for measuring and evaluating an operational insider threat program within an organization. Using scenario-based exercises, this course takes participants through the steps to conduct an insider threat program evaluation. This training is for insider threat program managers, evaluators, and...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Evaluator (ITPE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Evaluator...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Vulnerability Assessor (ITVA) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Vulnerability Assessor Training

    3 Risk Assessment & Insider Threat

    This 3-day course develops the skills and competencies necessary to perform an insider threat vulnerability assessment of an organization. This training is based upon the research of the CERT Insider Threat Center of the Software Engineering Institute. The CERT Insider Threat Center has been researching the insider threat problem since 2001 in...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • System Assessment and Authorization Process

    2 Risk Assessment & Insider Threat

    This two-day course introduces the NIST Risk Management Framework (RMF) process for system assessment and authorization. The RMF is the cybersecurity framework mandated for Federal Government departments and agencies, including the U.S. Department of Defense (DoD). Like other NIST guidance, the RMF is also used by organizations outside of the...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Introduction to the CERT Resilience Management Model

    2 Risk Assessment & Insider Threat

    This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2 Resilience Management Model (CERT-RMM) v1.2. CERT-RMM is a maturity model that promotes the convergence of security, business continuity, and IT operations activities to help...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.