search menu icon-carat-right cmu-wordmark

Classroom Training

By participating in SEI classroom training, professionals prepare for the next steps in their careers and lives. Most importantly, they return to their organizations with fresh ideas, new business skills, and a greater capacity for addressing the challenges their organizations face.

Lodging

Registrants are responsible for arranging their own travel and accommodations. The SEI has standard lodging recommendations for courses, workshops, and seminars held at the SEI offices in Pittsburgh, Pennsylvania, and Arlington, Virginia. For training events at other locations, the SEI sends travel and lodging information in the confirmation email sent to registrants.

Business Casual

We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.

What to Bring

See course descriptions for the recommended and required equipment and materials needed for each course.

Classroom Course List

  • Design Guidelines and Patterns for Microservices

    2 Software Architecture

    In modern service-based solutions, services are developed and deployed as microservices. It is not an easy job to create a sound design for systems in this space, which often need to be elastic to thousands of machines, automatically deployable, resilient to simian armies, and accessible via a comprehensive API. There are countless technology and...

    Learn More
  • Designing Modern Service-Based Systems

    1 Software Architecture

    From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, API gateways, REST constraints, and event-driven messaging are just some of the design concepts that developers of modern service-based...

    Learn More
  • Modeling System Architectures Using the Architecture Analysis and Design Language (AADL)

    4 Software Architecture

    Modeling and validating of quality attributes for real-time, embedded systems is often done with low-fidelity software models and disjointed architectural specifications by various engineers using their own specialized notations. These models are typically not maintained or documented throughout the life cycle, making it difficult to predict the...

    Learn More
  • Software Architecture Design and Analysis

    2 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    Learn More
  • Software Architecture: Principles and Practices

    2 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    Learn More
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day classroom course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based...

    Learn More
  • Insider Threat Program Evaluator

    3 Risk Assessment & Insider Threat

    This three-day, instructor-led, classroom-based course presents strategies for measuring and evaluating an operational insider threat program within an organization. Using scenario-based exercises, this course takes participants through the steps to conduct an insider threat program evaluation. This training is for insider threat program managers,...

    Learn More
  • Insider Threat Program Evaluator (ITPE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Insider Threat Overview: Preventing, Detecting, and Responding to Insider Threats and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses...

    Learn More
  • Insider Threat Vulnerability Assessor (ITVA) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Vulnerability Assessor Training

    3 Risk Assessment & Insider Threat

    This 3-day course develops the skills and competencies necessary to perform an insider threat vulnerability assessment of an organization. This training is based upon the research of the CERT Insider Threat Center of the Software Engineering Institute. The CERT Insider Threat Center has been researching the insider threat problem since 2001 in...

    Learn More
  • Measuring What Matters: Security Metrics Workshop

    2 Measurement & Analysis Risk Assessment & Insider Threat

    It is critical to measure the right things in order to make informed management decisions, take the appropriate actions, and change behaviors. But how do managers figure out what those right things are? Public and private organizations today often base cyber risk management decisions on fear, uncertainty, and doubt (FUD) and the latest attack;...

    Learn More
  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...

    Learn More
  • Assessing Information Security Risk Using the OCTAVE Approach

    3 Risk Assessment & Insider Threat

    In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...

    Learn More

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.