search icon-carat-right cmu-wordmark

Live-Online Training

The SEI's online learning platforms provide expert instruction as well as exercises, assessments, and other resources. Our live-online training offers synchronous learning where you and your instructor can interact during classes.

Live-Online learning enables you to

  • learn from SEI experts in an interactive, online classroom environment
  • communicate directly and easily with SEI instructors
  • interact with other learners, during and after class sessions
  • review instructional content outside of class sessions
  • access electronic materials

Live-Online Courses

  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging cybersecurity threats and attacks. Building on the methods and tools discussed in the...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Creating a Computer Security Incident Response Team

    1 Incident Handling

    This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT) or similar capability. This course provides a high-level overview of the key issues and decisions that must be addressed in establishing an incident management capability. The course can also be...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Developing a National or Government CSIRT

    Incident Handling

    This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT. It discusses the basic components of CSIRTs in general and highlights the characteristics that make national or government versions of CSIRTs unique. Topics covered include capabilities and functions of each entity type, working...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Foundations of Incident Management

    4 Incident Handling

    This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work. This course was recently updated in September 2022, including a...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Managing Computer Security Incident Response Teams

    3 Incident Handling

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that incident management staff and managers may be expected to handle. The course also provides...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Design Guidelines and Patterns for Microservices

    4 Software Architecture

    In modern service-based solutions, services are developed and deployed as microservices. Microservice development involves countless technology and design choices, including industry standards, frameworks, design patterns, integration approaches, middleware products, and tools. And it is a moving landscape-new ideas and products for services and...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Designing Modern Service-Based Systems

    1 Software Architecture

    From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Documenting Software Architectures

    4 Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Software Architecture Design and Analysis

    4 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Software Architecture: Principles and Practices

    4 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Cybersecurity Oversight for the Business Executive

    2 Risk Assessment & Insider Threat

    This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative and an enterprise-wide risk that spans all operations. The course provides background and context...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Risk Management Measures of...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management: Measures of Effectiveness

    Risk Assessment & Insider Threat

    This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; evaluate the effectiveness of formal insider threat and insider risk management programs; identify the maturity of an organization's insider risk management processes and...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based upon the...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.