search menu icon-carat-right cmu-wordmark

Courses

Courses, workshops, and seminars help transition SEI technology and research to the broader community, disseminating recent advances relevant to our mission.

Learn more about the new CERT Applied Data Science for Cybersecurity Professional Certificate: 

To learn how data science and machine learning address cybersecurity challenges, watch this webcast.

New Courses

Knowledge and Techniques That You Can Apply Today

SEI courses, workshops, and seminars are created and delivered by recognized experts who have practical experience in the disciplines they teach. Our courses feature hands-on tasks and real-world scenarios. In just a matter of days, you’ll be more informed and ready to perform at a higher level.

Professional Development and Workforce Development

Whether you want to learn at your own pace online, experience the networking opportunities of our classroom facilities, or develop your workforce by bringing our instructors on-site, SEI courses give you the tools you need to create and maintain software, systems, and organizations that are efficient, secure, and reliable. Organizations can help their workforce gain competencies in software development, software acquisition, and cybersecurity.

Delivery Modes

Classroom

The SEI has training facilities in its offices in Pittsburgh, Pennsylvania, and Arlington, Virginia.

Classroom Training

Course List

  • Advanced Analytics: Digital Forensics

    AI Engineering and Machine Learning

    After learning about digital forensics related to cybersecurity, aspiring data scientists can: Gain a fundamental understanding of forensic based data science problems Become fluent in natural language processing techniques for insider threat analysis with the help of a scripting language Better understand the procedure for a digital...

    Online
    Learn More
    AI Engineering and Machine Learning
  • Advanced Analytics: Malware

    AI Engineering and Machine Learning

    After learning about malware related to cybersecurity, aspiring data scientists can: Gain knowledge of common problems that a data scientist encounters Become fluent in malware with the help of a scripting language Understand principles of investigating and analyzing properties of malware captured at run time Understand how to detect several...

    Online
    Learn More
    AI Engineering and Machine Learning
  • Advanced Analytics: Netflow

    AI Engineering and Machine Learning

    After learning about NetFlow related to cybersecurity, aspiring data scientists can: Gain knowledge of common problems that a data scientist encounters Become fluent in NetFlow with the help of a scripting language Understand NetFlow architecture Identify types of attacks with network flow data Gain experience with different types of...

    Online
    Learn More
    AI Engineering and Machine Learning
  • Assessing Information Security Risk Using the OCTAVE Approach - eLearning

    Risk Assessment & Insider Threat

    In this 11 module, online course participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context....

    Online
    Learn More
    Risk Assessment & Insider Threat
  • Building an Insider Threat Program

    Risk Assessment & Insider Threat

    This seven (7) hour online course provides a thorough understanding of the organizational models for an insider threat program, the necessary components to have an effective program, the key stakeholders who need to be involved in the process, and basic education on the implementation and guidance of the program. This training is based upon the...

    Online
    Learn More
    Risk Assessment & Insider Threat
  • CERT Applied Data Science for Cybersecurity Certificate Examination

    AI Engineering and Machine Learning

    This examination provides an objective validation of conceptual knowledge and practical understanding of data analysis for cybersecurity from netflow, malware, and digital forensics activity, as presented in the required courses. The examination consists of 60 multiple choice questions. Students proceed through the examination at their convenience...

    OnsiteExam
    Learn More
    AI Engineering and Machine Learning
  • CERT Applied Data Science for Cybersecurity Certificate Package

    AI Engineering and Machine Learning

    Students who wish to purchase the certificate program package (four eLearning courses, certificate exam) will receive a discount from the total cost. CERT Applied Data Science for Cybersecurity Certificate Package consists of the following courses: Fundamentals of Statistics Applied to Cybersecurity Advanced Analytics: Netflow Advanced...

    Online
    Learn More
    AI Engineering and Machine Learning
  • CERT Certificate in Digital Forensics

    Incident Handling

    In today's networked world, it is essential for system and network administrators to understand the fundamental areas and the major issues in computer forensics. Knowledgeable first responders apply good forensic practices to routine administrative procedures and alert verification, and know how routine actions can adversely affect the forensic...

    Online
    Learn More
    Incident Handling
  • CERT Cybersecurity Engineering and Software Assurance Professional Certificate

    Network & Software Security

    Software-reliant systems are acquired, built, deployed, and maintained through a coordinated set of activities referred to as a lifecycle. When implementing software-reliant systems, desired capabilities and performance parameters have historically received much more attention-and funding-than requirements for quality attributes. Yet quality...

    Online
    Learn More
    Network & Software Security
  • CERT Cybersecurity Leadership Examination

    Risk Assessment & Insider Threat

    The CERT Cybersecurity Leadership Examination objectively assesses the student's understanding of cybersecurity principles that reflect basic awareness and knowledge of cybersecurity within the context of a business organization and from the perspective of organizational leadership. The examination is administered online. Learners can begin the...

    OnsiteExam
    Learn More
    Risk Assessment & Insider Threat
  • CERT Secure Coding in C and C++ Professional Certificate

    Network & Software Security

    The CERT Secure Coding in C and C++ Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding Standards have been curated from the contribution of 1900+ experts for the C and C++ programming language. The CERT Secure Coding team teaches the essentials of...

    Online
    Learn More
    Network & Software Security
  • CERT Secure Coding in Java Professional Certificate

    Network & Software Security

    The CERT Secure Coding in Java Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding team teaches the essentials of designing and developing secure software in Java. Completion of this Professional Certificate will enable software developers to increase...

    Online
    Learn More
    Network & Software Security
  • Cyber Intelligence for Decision Makers

    Risk Assessment & Insider Threat

    With the rapidly changing nature of cyber threats and high-profile exploitations of vulnerabilities, organizations are recognizing the need to address the systemic analytical challenges of cyber intelligence. This course presents a non-technical approach to cyber intelligence for organizational managers and decision makers. It explains the...

    Online
    Learn More
    Risk Assessment & Insider Threat
  • Documenting Software Architectures - eLearning

    Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    Online
    Learn More
    Software Architecture
  • Examination of Software Architecture: Principles and Practices

    Software Architecture

    To ensure continued excellence in software architecture practices, the SEI objectively validates a student's understanding of software architecture before students are eligible to receive professional certificates in software architecture or become certified to lead SEI Authorized ATAM evaluations. This includes understanding of enterprise,...

    OnsiteExam
    Learn More
    Software Architecture
  • Fundamentals of Statistics Applied to Cybersecurity

    AI Engineering and Machine Learning

    Through the fundamentals of statistics related to cybersecurity, aspiring data scientists can: Gain knowledge of common problems that a data scientist encounters Become fluent in statistics with the help of a scripting language Increase predictive power and reduce risk within a model Better estimate parameters for a dataset Investigate and...

    Online
    Learn More
    AI Engineering and Machine Learning
  • Insider Risk Management Measures of Effectiveness Certificate Examination

    Risk Assessment & Insider Threat

    To ensure continued excellence in identifying security posture, measuring the capabilities of formal insider threat and insider risk management programs, and characterizing processes and practices that mature insider risk management programs, the SEI objectively validates the student's understanding and eligibility to receive the CERT Insider...

    OnsiteExam
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Awareness Training

    Risk Assessment & Insider Threat

    This one hour course provides a basic understanding of insider threats within an organization and what employees should be aware of in their responsibilities to protect an organization's critical assets. This course explains how your work can be affected and how you can be targeted by Insider Threats. This training is based upon the research of...

    Online
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager Certificate Examination

    Risk Assessment & Insider Threat

    To ensure continued excellence in Insider Threat program development, implementation, and operation, the SEI objectively validates the student's understanding and eligibility to receive the Insider Threat Program Manager (ITPM) Certificate. The certificate exam evaluates the student's comprehension of insider threat planning, identification and...

    OnsiteExam
    Learn More
    Risk Assessment & Insider Threat
  • Modeling System Architectures Using the Architecture Analysis and Design Language (AADL) - eLearning

    Software Architecture

    Modeling and validating quality attributes for real-time, embedded systems is often done with low-fidelity software models and disjointed architectural specifications by various engineers using their own specialized notations. These models are typically not maintained or analyzed throughout the lifecycle, making it difficult to predict the impact...

    Online
    Learn More
    Software Architecture
  • Overview of Creating and Managing CSIRTs - eLearning

    Incident Handling

    This three-hour course provides a high-level, consolidated view of information that is contained in two other CERT courses: Creating a CSIRT and Managing CSIRTs. Its main purpose is to highlight best practices in planning, implementing, operating, and evaluating a computer security incident response team (CSIRT). Much of the course material is...

    Online
    Learn More
    Incident Handling
  • Overview of Insider Threat Concepts and Activities

    Risk Assessment & Insider Threat

    This three (3) hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators and outlines mitigation strategies. This instruction is based upon the research of the CERT National Insider Threat Center (NITC) of the...

    Online
    Learn More
    Risk Assessment & Insider Threat
  • Secure DevOps Process and Implementation

    Agile & DevOps

    This 4.5 hour virtual, asynchronous course is designed for managers, developers and operational teams to offer a comprehensive training on DevOps principles and process, and to identify techniques for project planning, development, and deployment from start to finish. Specifically, this course will expose attendees to reference architectures and...

    Online
    Learn More
    Agile & DevOps
  • Software Architecture: Principles and Practices - eLearning

    Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. In this course we answer these questions What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture...

    Online
    Learn More
    Software Architecture
  • Understanding Software Architecture, Quality, and Security Through Code Analysis

    Software Architecture

    Code analysis can often reveal important aspects regarding the overall health of your software. Whether you are the developer, project manager, or acquirer of a code base, the code has a story to tell and an understanding of code analysis will help you to ensure that its quality is built in using solid, best-practice processes. This 3.5-hour...

    Online
    Learn More
    Software Architecture
  • DevSecOps Process and Implementation

    2.5 Agile & DevOps

    DevOps is a set of software development principles that emphasize collaboration, communication, and automation among all stakeholders, including IT operations, testers, developers, customers, and security personnel at the inception of a project. A variety of tools help stakeholders collaborate and communicate. Automation is a greater challenge....

    Onsite
    Learn More
    Agile & DevOps
  • Secure Coding in C and C++

    4 Network & Software Security

    Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in C and C++ programming. This four-day course provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code...

    Onsite
    Learn More
    Network & Software Security
  • Secure Coding in Java

    4 Network & Software Security

    Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in Java programming. This four-day course provides a detailed explanation of common programming errors in Java and describes how these errors can lead to code that is...

    Onsite
    Learn More
    Network & Software Security
  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging cybersecurity threats and attacks. Building on the methods and tools discussed in the...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Creating a Computer Security Incident Response Team

    1 Incident Handling

    This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT) or similar capability. This course provides a high-level overview of the key issues and decisions that must be addressed in establishing an incident management capability. The course can also be...

    Onsite
    Learn More
    Incident Handling
  • Developing a National or Government CSIRT

    Incident Handling

    This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT. It discusses the basic components of CSIRTs in general and highlights the characteristics that make national or government versions of CSIRTs unique. Topics covered include capabilities and functions of each entity type, working...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Foundations of Incident Management

    4 Incident Handling

    This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work. This course was recently updated in September 2022, including a...

    ClassroomLive-OnlineOnsite
    Learn More
    Incident Handling
  • Managing Computer Security Incident Response Teams

    3 Incident Handling

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that incident management staff and managers may be expected to handle. The course also provides...

    Onsite
    Learn More
    Incident Handling
  • AADL in Practice Workshop

    Software Architecture

    The AADL in Practice Workshop combines AADL training and an AADL modeling workshop to provide practical knowledge as well as an opportunity to practice skills in a realistic setting. This Workshop will transfer expertise to participants through an effective combination of training and mentoring during practice. Organizations seeking to increase...

    Onsite
    Learn More
    Software Architecture
  • Design Guidelines and Patterns for Microservices

    4 Software Architecture

    In modern service-based solutions, services are developed and deployed as microservices. Microservice development involves countless technology and design choices, including industry standards, frameworks, design patterns, integration approaches, middleware products, and tools. And it is a moving landscape-new ideas and products for services and...

    Onsite
    Learn More
    Software Architecture
  • Designing Modern Service-Based Systems

    1 Software Architecture

    From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, event-driven messaging, eventual consistency, container orchestration, and API gateways are just some of the design concepts that developers...

    Onsite
    Learn More
    Software Architecture
  • Documenting Software Architectures

    4 Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    Onsite
    Learn More
    Software Architecture
  • Managing Technical Debt of Software

    1 Software Architecture

    Technical debt occurs when a design or construction approach is taken that's expedient in the short term, but increases complexity and cost in the long term. In the course Managing Technical Debt of Software, the concept of technical debt is examined from multiple perspectives, including how it manifests, accumulates, and impacts the software...

    Onsite
    Learn More
    Software Architecture
  • Modeling System Architectures Using the Architecture Analysis and Design Language (AADL)

    4 Software Architecture

    Modeling and validating of quality attributes for real-time, embedded systems is often done with low-fidelity software models and disjointed architectural specifications by various engineers using their own specialized notations. These models are typically not maintained or documented throughout the life cycle, making it difficult to predict the...

    Onsite
    Learn More
    Software Architecture
  • Software Architecture Design and Analysis

    4 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    ClassroomLive-OnlineOnsite
    Learn More
    Software Architecture
  • Software Architecture: Principles and Practices

    4 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    Onsite
    Learn More
    Software Architecture
  • Cybersecurity Oversight for the Business Executive

    2 Risk Assessment & Insider Threat

    This course examines the dynamic intersection of business and technology over the course of an immersive 2-days. Targeted towards today's business executive, the courseware explores the pressing reality that cybersecurity is a business imperative and an enterprise-wide risk that spans all operations. The course provides background and context...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Risk Management Measures of...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Risk Management: Measures of Effectiveness

    Risk Assessment & Insider Threat

    This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; evaluate the effectiveness of formal insider threat and insider risk management programs; identify the maturity of an organization's insider risk management processes and...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based upon the...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods...

    ClassroomLive-OnlineOnsite
    Learn More
    Risk Assessment & Insider Threat
  • OCTAVE FORTE: Connecting the Board Room to Cyber Risk

    2 Risk Assessment & Insider Threat

    Organizations need an adaptable and agile process that allow executives to have a real-time view of cyber risks. To address this challenge, the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) process has been assisting organizations to assess their technical risks for the better part of two decades, and the SEI has...

    ClassroomOnsite
    Learn More
    Risk Assessment & Insider Threat
  • System Assessment and Authorization Process

    2 Risk Assessment & Insider Threat

    This two-day course introduces the NIST Risk Management Framework (RMF) process for system assessment and authorization. The RMF is the cybersecurity framework mandated for Federal Government departments and agencies, including the U.S. Department of Defense (DoD). Like other NIST guidance, the RMF is also used by organizations outside of the...

    Onsite
    Learn More
    Risk Assessment & Insider Threat
  • Agile in Government: Practical Considerations

    2 Agile & DevOps

    This 1-2 day live-delivery tutorial enables attendees to understand basic Agile concepts that developers use, but primarily focuses on introducing the interactions that government program offices can and should have with developers (either organic or contracted) who are using Agile methods to develop government systems. A combination of lecture,...

    Onsite
    Learn More
    Agile & DevOps
  • Agile Requirements Elicitation Workshop

    2 Agile & DevOps

    Requirements elicitation and capture, especially for an agile development effort, requires some care. It is important to capture enough detail so that developers can implement the system, without capturing so much detail that the solution is unnecessarily constrained. The purpose of this 2-day workshop is to capitalize on pre-existing work on...

    Onsite
    Learn More
    Agile & DevOps
  • Agile Requirements Prioritization Workshop

    1 Agile & DevOps

    Requirements prioritization, especially for an Agile development effort is a crucial step prior to development. Specifically, requirements should be ordered in such a way as to provide maximum benefit to the organization as quickly as possible. The purpose of this 1-day workshop is to teach members of an organization how to prioritize...

    Onsite
    Learn More
    Agile & DevOps
  • Agile Virtual Schoolhouse

    Agile & DevOps

    Learning is a key enabler of a successful organizational transformation. Introducing Agile knowledge to key staff can build a shared understanding and alignment in challenging, highly regulated environments. This training channel leverages best of breed resources with SEI subject matter expertise in a flexible online format for virtual and remote...

    Onsite
    Learn More
    Agile & DevOps
  • Leading SAFe/Agile in Government

    3 Agile & DevOps

    This 3 day live-delivery course enables attendees to understand basic Agile and lean concepts that developers use, but primarily focuses on introducing the interactions that government program offices can and should have with developers (either organic or contracted) who are using Agile team methods and the Scaled Agile Framework scaling approach...

    Onsite
    Learn More
    Agile & DevOps
  • Assessing Information Security Risk Using the OCTAVE Approach

    3 Risk Assessment & Insider Threat

    In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...

    Onsite
    Learn More
    Risk Assessment & Insider Threat
  • Introduction to the CERT Resilience Management Model

    2 Risk Assessment & Insider Threat

    This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2. CERT-RMM is a maturity model that promotes the convergence of security, business continuity, and IT operations activities to help organizations actively direct, control, and...

    ClassroomOnsite
    Learn More
    Risk Assessment & Insider Threat
  • Agile Adoption Readiness and Fit Workshop

    2 Agile & DevOps

    When adopting new governance practices, leaders often find mismatches between assumptions and the realities within their organizations. This 2-day workshop leverages the SEI Readiness and Fit Analysis (RFA) technique to help people involved in systems of systems from all levels of the enterprise-senior leaders, policy makers, program managers,...

    Onsite
    Learn More
    Agile & DevOps
  • Agile in Government: Concepts for Senior Executives

    0.5 Agile & DevOps

    This 2-4 hour tutorial is designed for a small group of senior executives in a program or enterprise who are contemplating or are already in progress with adoption of Agile approaches in the organization within their purview. The tutorial includes the opportunity for discussion about practical application of concepts at the executive...

    Onsite
    Learn More
    Agile & DevOps

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.