Online Training
The SEI's online learning platforms provide expert instruction as well as exercises, assessments, and other resources.
Online learning enables you to
- learn at your own pace
- communicate easily with instructors
- access courses 24/7
- study at home, or work, or on the road
- read materials online or download them for later
- track your course progress
Within two business days of when you registered for an online course, we send you login information in email using the email address you provided on the registration form.
Online Courses
-
Advanced Analytics: Digital Forensics
AI Engineering and Machine Learning
After learning about digital forensics related to cybersecurity, aspiring data scientists can: Gain a fundamental understanding of forensic based data science problems Become fluent in natural language processing techniques for insider threat analysis with the help of a scripting language Better understand the procedure for a digital...
AI Engineering and Machine Learning -
Advanced Analytics: Malware
AI Engineering and Machine Learning
After learning about malware related to cybersecurity, aspiring data scientists can: Gain knowledge of common problems that a data scientist encounters Become fluent in malware with the help of a scripting language Understand principles of investigating and analyzing properties of malware captured at run time Understand how to detect several...
AI Engineering and Machine Learning -
Advanced Analytics: Netflow
AI Engineering and Machine Learning
After learning about NetFlow related to cybersecurity, aspiring data scientists can: Gain knowledge of common problems that a data scientist encounters Become fluent in NetFlow with the help of a scripting language Understand NetFlow architecture Identify types of attacks with network flow data Gain experience with different types of...
AI Engineering and Machine Learning -
Assessing Information Security Risk Using the OCTAVE Approach - eLearning
Risk Assessment & Insider Threat
In this 11 module, online course participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context....
Risk Assessment & Insider Threat -
Building an Insider Threat Program
Risk Assessment & Insider Threat
This seven (7) hour online course provides a thorough understanding of the organizational models for an insider threat program, the necessary components to have an effective program, the key stakeholders who need to be involved in the process, and basic education on the implementation and guidance of the program. This training is based upon the...
Risk Assessment & Insider Threat -
CERT Applied Data Science for Cybersecurity Certificate Examination
AI Engineering and Machine Learning
This examination provides an objective validation of conceptual knowledge and practical understanding of data analysis for cybersecurity from netflow, malware, and digital forensics activity, as presented in the required courses. The examination consists of 60 multiple choice questions. Students proceed through the examination at their convenience...
AI Engineering and Machine Learning -
CERT Applied Data Science for Cybersecurity Certificate Package
AI Engineering and Machine Learning
Students who wish to purchase the certificate program package (four eLearning courses, certificate exam) will receive a discount from the total cost. CERT Applied Data Science for Cybersecurity Certificate Package consists of the following courses: Fundamentals of Statistics Applied to Cybersecurity Advanced Analytics: Netflow Advanced...
AI Engineering and Machine Learning -
CERT Certificate in Digital Forensics
Incident Handling
In today's networked world, it is essential for system and network administrators to understand the fundamental areas and the major issues in computer forensics. Knowledgeable first responders apply good forensic practices to routine administrative procedures and alert verification, and know how routine actions can adversely affect the forensic...
Incident Handling -
CERT Cybersecurity Engineering and Software Assurance Professional Certificate
Network & Software Security
Software-reliant systems are acquired, built, deployed, and maintained through a coordinated set of activities referred to as a lifecycle. When implementing software-reliant systems, desired capabilities and performance parameters have historically received much more attention-and funding-than requirements for quality attributes. Yet quality...
Network & Software Security -
CERT Cybersecurity Leadership Examination
Risk Assessment & Insider Threat
The CERT Cybersecurity Leadership Examination objectively assesses the student's understanding of cybersecurity principles that reflect basic awareness and knowledge of cybersecurity within the context of a business organization and from the perspective of organizational leadership. The examination is administered online. Learners can begin the...
Risk Assessment & Insider Threat -
CERT Secure Coding in C and C++ Professional Certificate
Network & Software Security
The CERT Secure Coding in C and C++ Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding Standards have been curated from the contribution of 1900+ experts for the C and C++ programming language. The CERT Secure Coding team teaches the essentials of...
Network & Software Security -
CERT Secure Coding in Java Professional Certificate
Network & Software Security
The CERT Secure Coding in Java Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding team teaches the essentials of designing and developing secure software in Java. Completion of this Professional Certificate will enable software developers to increase...
Network & Software Security -
Cyber Intelligence for Decision Makers
Risk Assessment & Insider Threat
With the rapidly changing nature of cyber threats and high-profile exploitations of vulnerabilities, organizations are recognizing the need to address the systemic analytical challenges of cyber intelligence. This course presents a non-technical approach to cyber intelligence for organizational managers and decision makers. It explains the...
Risk Assessment & Insider Threat -
Documenting Software Architectures - eLearning
Software Architecture
Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...
Software Architecture -
Examination of Software Architecture: Principles and Practices
Software Architecture
To ensure continued excellence in software architecture practices, the SEI objectively validates a student's understanding of software architecture before students are eligible to receive professional certificates in software architecture. This includes understanding of enterprise, system, and software architectures; the architecture business...
Software Architecture -
Fundamentals of Statistics Applied to Cybersecurity
AI Engineering and Machine Learning
Through the fundamentals of statistics related to cybersecurity, aspiring data scientists can: Gain knowledge of common problems that a data scientist encounters Become fluent in statistics with the help of a scripting language Increase predictive power and reduce risk within a model Better estimate parameters for a dataset Investigate and...
AI Engineering and Machine Learning -
Insider Risk Management Measures of Effectiveness Certificate Examination
Risk Assessment & Insider Threat
To ensure continued excellence in identifying security posture, measuring the capabilities of formal insider threat and insider risk management programs, and characterizing processes and practices that mature insider risk management programs, the SEI objectively validates the student's understanding and eligibility to receive the CERT Insider...
Risk Assessment & Insider Threat -
Insider Threat Awareness Training
Risk Assessment & Insider Threat
This one hour course provides a basic understanding of insider threats within an organization and what employees should be aware of in their responsibilities to protect an organization's critical assets. This course explains how your work can be affected and how you can be targeted by Insider Threats. This training is based upon the research of...
Risk Assessment & Insider Threat -
Insider Threat Program Manager Certificate Examination
Risk Assessment & Insider Threat
To ensure continued excellence in Insider Threat program development, implementation, and operation, the SEI objectively validates the student's understanding and eligibility to receive the Insider Threat Program Manager (ITPM) Certificate. The certificate exam evaluates the student's comprehension of insider threat planning, identification and...
Risk Assessment & Insider Threat -
Modeling System Architectures Using the Architecture Analysis and Design Language (AADL) - eLearning
Software Architecture
Modeling and validating quality attributes for real-time, embedded systems is often done with low-fidelity software models and disjointed architectural specifications by various engineers using their own specialized notations. These models are typically not maintained or analyzed throughout the lifecycle, making it difficult to predict the impact...
Software Architecture -
Overview of Creating and Managing CSIRTs - eLearning
Incident Handling
This three-hour course provides a high-level, consolidated view of information that is contained in two other CERT courses: Creating a CSIRT and Managing CSIRTs. Its main purpose is to highlight best practices in planning, implementing, operating, and evaluating a computer security incident response team (CSIRT). Much of the course material is...
Incident Handling -
Overview of Insider Threat Concepts and Activities
Risk Assessment & Insider Threat
This three (3) hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators and outlines mitigation strategies. This instruction is based upon the research of the CERT National Insider Threat Center (NITC) of the...
Risk Assessment & Insider Threat -
Secure DevOps Process and Implementation
Agile & DevOps
This 4.5 hour virtual, asynchronous course is designed for managers, developers and operational teams to offer a comprehensive training on DevOps principles and process, and to identify techniques for project planning, development, and deployment from start to finish. Specifically, this course will expose attendees to reference architectures and...
Agile & DevOps -
Software Architecture: Principles and Practices - eLearning
Software Architecture
Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. In this course we answer these questions What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture...
Software Architecture -
Understanding Software Architecture, Quality, and Security Through Code Analysis
Software Architecture
Code analysis can often reveal important aspects regarding the overall health of your software. Whether you are the developer, project manager, or acquirer of a code base, the code has a story to tell and an understanding of code analysis will help you to ensure that its quality is built in using solid, best-practice processes. This 3.5-hour...
Software Architecture