search menu icon-carat-right cmu-wordmark

Online Training

The SEI's online learning platforms provide expert instruction as well as exercises, assessments, and other resources.

Online learning enables you to

  • learn at your own pace
  • communicate easily with instructors
  • access courses 24/7
  • study at home, or work, or on the road
  • read materials online or download them for later
  • track your course progress

Within two business days of when you registered for an online course, we send you login information in email using the email address you provided on the registration form.

Online Courses

     
  • Acquisition Essentials for Software-Reliant Systems

    Acquisition

    The challenges and failures of software development and acquisition of software-reliant systems have been well documented. There are many reasons software-reliant acquisitions fail, including unrealistic estimates, overly ambitious requirements, and inadequate software engineering and testing. This hour-long course is part of a series of...

    Learn More
  •  
  • Agile in Government: Practical Considerations

    2 Acquisition

    This 1-2 day live-delivery tutorial enables attendees to understand basic Agile concepts that developers use, but primarily focuses on introducing the interactions that government program offices can and should have with developers (either organic or contracted) who are using Agile methods to develop government systems. A combination of lecture,...

    Learn More
  •  
  • Assessing Information Security Risk Using the OCTAVE Approach - eLearning

    Risk Assessment & Insider Threat

    In this 11 module, online course participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context....

    Learn More
  •  
  • Big Data: Architectures and Technologies - eLearning

    Software Architecture

    Scalable "big data" systems are significant long-term investments that must scale to handle ever-increasing data volumes, and therefore represent high-risk applications in which the software and data architecture are fundamental components of ensuring success. This online course is presented to you by the Software Engineering Institute's research...

    Learn More
  •  
  • Building an Insider Threat Program

    Risk Assessment & Insider Threat

    This seven (7) hour online course provides a thorough understanding of the organizational models for an insider threat program, the necessary components to have an effective program, the key stakeholders who need to be involved in the process, and basic education on the implementation and guidance of the program. This training is based upon the...

    Learn More
  •  
  • CERT Certificate in Digital Forensics

    Incident Handling

    In today's networked world, it is essential for system and network administrators to understand the fundamental areas and the major issues in computer forensics. Knowledgeable first responders apply good forensic practices to routine administrative procedures and alert verification, and know how routine actions can adversely affect the forensic...

    Learn More
  •  
  • CERT Secure Coding in C and C++ Professional Certificate

    Network & Software Security

    The CERT Secure Coding in C and C++ Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding Standards have been curated from the contribution of 1900+ experts for the C and C++ programming language. The CERT Secure Coding team teaches the essentials of...

    Learn More
  •  
  • CERT Secure Coding in Java Professional Certificate

    Network & Software Security

    The CERT Secure Coding in Java Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding team teaches the essentials of designing and developing secure software in Java. Completion of this Professional Certificate will enable software developers to increase...

    Learn More
  •  
  • Cyber Intelligence for Decision Makers

    Risk Assessment & Insider Threat

    With the rapidly changing nature of cyber threats and high-profile exploitations of vulnerabilities, organizations are recognizing the need to address the systemic analytical challenges of cyber intelligence. This course presents a non-technical approach to cyber intelligence for organizational managers and decision makers. It explains the...

    Learn More
  •  
  • Data Rights and DoD Acquisition

    Acquisition

    This series of three 1-hour webinars will provide insight into what should be considered with respect to data rights when acquiring software. Whether your software is developed as part of a larger weapons system or is a stand-alone product, software data rights can be an issue. Data rights also play a very important role during sustainment, but...

    Learn More
  •  
  • Documenting Software Architectures - eLearning

    Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    Learn More
  •  
  • Examination of Software Architecture: Principles and Practices

    Software Architecture

    To ensure continued excellence in software architecture practices, the SEI objectively validates a student's understanding of software architecture before students are eligible to receive professional certificates in software architecture or become certified to lead SEI Authorized ATAM evaluations. This includes understanding of enterprise,...

    Learn More
  •  
  • Information Security for Technical Staff - eLearning

    Network & Software Security

    This 13 module, online course is designed to provide participants with practical techniques for protecting the security of an organization's information assets and resources, beginning with concepts and proceeding on to technical implementations. The course focuses on understanding and applying the concept of survivability through the effective...

    Learn More
  •  
  • Insider Threat Awareness Training

    Risk Assessment & Insider Threat

    This one hour course provides a basic understanding of insider threats within an organization and what employees should be aware of in their responsibilities to protect an organization's critical assets. This course explains how your work can be affected and how you can be targeted by Insider Threats. This training is based upon the research of...

    Learn More
  •  
  • Insider Threat Overview: Preventing, Detecting and Responding to Insider Threats

    Risk Assessment & Insider Threat

    This five (5) hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators and outlines mitigation strategies. This training is based upon the research of the CERT Insider Threat Center of the Software Engineering...

    Learn More
  •  
  • Insider Threat Program Manager Certificate Examination

    Risk Assessment & Insider Threat

    To ensure continued excellence in Insider Threat program development, implementation, and operation, the SEI objectively validates the student's understanding and eligibility to receive the Insider Threat Program Manager (ITPM) Certificate. The certificate exam evaluates the student's comprehension of insider threat planning, identification and...

    Learn More
  •  
  • Insider Threat Vulnerability Assessor Certificate Examination

    Risk Assessment & Insider Threat

    To insure the ability of a candidate assessor to identify and manage insider threat risk within organizations, the Insider Threat Vulnerability Assessor (ITVA) Certificate Examination evaluates a candidate assessor's comprehension of the CERT insider threat assessment methodology. The Insider Threat Vulnerability Assessor Certificate Examination...

    Learn More
  •  
  • Managing Technical Debt of Software - eLearning

    Software Architecture

    Technical debt occurs when a design or construction approach is taken that is expedient in the short term, but increases complexity and cost in the long term. In the course Managing Technical Debt of Software, the concept of technical debt is examined from multiple perspectives, including how it manifests, accumulates, and impacts the enterprise....

    Learn More
  •  
  • Modeling System Architectures Using the Architecture Analysis and Design Language (AADL) - eLearning

    Software Architecture

    Available soon. Contact us to receive an email notification when training registration is available. Modeling and validating quality attributes for real-time, embedded systems is often done with low-fidelity software models and disjointed architectural specifications by various engineers using their own specialized notations. These models are...

    Learn More
  •  
  • Secure DevOps Process and Implementation

    Network & Software Security

    This 4.5 hour virtual, asynchronous course is designed for managers, developers and operational teams to offer a comprehensive training on DevOps principles and process, and to identify techniques for project planning, development, and deployment from start to finish. Specifically, this course will expose attendees to reference architectures and...

    Learn More
  •  
  • Software Architecture: Principles and Practices - eLearning

    2 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    Learn More
  •  
  • Software Product Lines - eLearning

    Software Product Lines

    A software product line is a set of software-reliant systems that share a common, managed set of features satisfying a particular market or mission area, and are built from a common set of core assets in a prescribed way. Producing a set of related products as a product line has allowed organizations to achieve increased quality and...

    Learn More
  •  
  • Twenty Questions to Assess Your Program's Chances of Success

    Acquisition Risk Assessment & Insider Threat

    This online course introduces risk management concepts and explains the 20 key drivers that compose the SEI risk-based method for assessing complex projects, the Mission Diagnostic Protocol. This course explains what these drivers are and how the assessment of a program using the drivers creates a profile of a program's chances of success. This...

    Learn More

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.