search menu icon-carat-right cmu-wordmark

Classroom Training

By participating in SEI classroom training, professionals prepare for the next steps in their careers and lives. Most importantly, they return to their organizations with fresh ideas, new business skills, and a greater capacity for addressing the challenges their organizations face.

Lodging

Registrants are responsible for arranging their own travel and accommodations. The SEI has standard lodging recommendations for courses, workshops, and seminars held at the SEI offices in Pittsburgh, Pennsylvania, and Arlington, Virginia. For training events at other locations, the SEI sends travel and lodging information in the confirmation email sent to registrants.

Business Casual

We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.

What to Bring

See course descriptions for the recommended and required equipment and materials needed for each course.

Classroom Course List

  • ATAM Evaluator Training

    2 Software Architecture

    Most complex software systems must be modifiable and perform well. They might also need to be secure, interoperable, portable, and reliable. But What precisely do quality attributes such as modifiability, security, performance, and reliability mean? Can a system be analyzed to determine whether it has certain desired qualities? How soon can such...

    Learn More
  • Big Data: Architectures and Technologies

    1 Software Architecture

    Scalable "big data" systems are significant long-term investments that must scale to handle ever-increasing data volumes, and therefore represent high-risk applications in which the software and data architecture are fundamental components of ensuring success. This one-day course is designed for architects and technical stakeholders such as...

    Learn More
  • Design Guidelines and Patterns for Microservices

    2 Software Architecture

    In modern service-based solutions, services are developed and deployed as microservices. It is not an easy job to create a sound design for systems in this space, which often need to be elastic to thousands of machines, automatically deployable, resilient to simian armies, and accessible via a comprehensive API. There are countless technology and...

    Learn More
  • Designing Modern Service-Based Systems

    1 Software Architecture

    From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, API gateways, REST constraints, and event-driven messaging are just some of the design concepts that developers of modern service-based...

    Learn More
  • Documenting Software Architectures

    2 Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    Learn More
  • Managing Technical Debt of Software

    1 Software Architecture

    Technical debt occurs when a design or construction approach is taken that's expedient in the short term, but increases complexity and cost in the long term. In the course Managing Technical Debt of Software, the concept of technical debt is examined from multiple perspectives, including how it manifests, accumulates, and impacts the software...

    Learn More
  • Software Architecture Design and Analysis

    2 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    Learn More
  • Software Architecture: Principles and Practices

    2 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    Learn More
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day classroom course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based...

    Learn More
  • Insider Threat Program Evaluator

    3 Risk Assessment & Insider Threat

    This three-day, instructor-led, classroom-based course presents strategies for measuring and evaluating an operational insider threat program within an organization. Using scenario-based exercises, this course takes participants through the steps to conduct an insider threat program evaluation. This training is for insider threat program managers,...

    Learn More
  • Insider Threat Program Evaluator (ITPE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Insider Threat Overview: Preventing, Detecting, and Responding to Insider Threats and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses...

    Learn More
  • Insider Threat Vulnerability Assessor (ITVA) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Vulnerability Assessor Training

    3 Risk Assessment & Insider Threat

    This 3-day course develops the skills and competencies necessary to perform an insider threat vulnerability assessment of an organization. This training is based upon the research of the CERT Insider Threat Center of the Software Engineering Institute. The CERT Insider Threat Center has been researching the insider threat problem since 2001 in...

    Learn More
  • Measuring What Matters: Security Metrics Workshop

    2 Measurement & Analysis Risk Assessment & Insider Threat

    It is critical to measure the right things in order to make informed management decisions, take the appropriate actions, and change behaviors. But how do managers figure out what those right things are? Public and private organizations today often base cyber risk management decisions on fear, uncertainty, and doubt (FUD) and the latest attack;...

    Learn More
  • OCTAVE FORTE: Connecting the Board Room to Cyber Risk

    2 Risk Assessment & Insider Threat

    Organizations need an adaptable and agile process that allow executives to have a real-time view of cyber risks. To address this challenge, the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) process has been assisting organizations to assess their technical risks for the better part of two decades, and the SEI has...

    Learn More
  • Agile in Government: Practical Considerations

    2 Acquisition

    This 1-2 day live-delivery tutorial enables attendees to understand basic Agile concepts that developers use, but primarily focuses on introducing the interactions that government program offices can and should have with developers (either organic or contracted) who are using Agile methods to develop government systems. A combination of lecture,...

    Learn More
  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...

    Learn More
  • Applied Cybersecurity, Incident Response and Forensics

    5 Network & Software Security

    This four-day hands-on course is designed to increase the knowledge and skills of technical staff charged with administering and securing information systems and networks. Security topics such as vulnerability assessment, systems administration, network monitoring, incident response, and digital forensics will offer a comprehensive...

    Learn More
  • Creating a Computer Security Incident Response Team

    1 Incident Handling

    This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can...

    Learn More
  • Introduction to the CERT Resilience Management Model

    2 Risk Assessment & Insider Threat

    This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2 Resilience Management Model (CERT-RMM) v1.2. CERT-RMM is a maturity model that promotes the convergence of security, business continuity, and IT operations activities to help...

    Learn More
  • Managing Computer Security Incident Response Teams

    3 Incident Handling

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with...

    Learn More

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.