search menu icon-carat-right cmu-wordmark

Creating a Computer Security Incident Response Team

This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their CSIRT.

The course is composed of lectures and class exercises. Participants will learn the requirements for establishing an effective CSIRT, the various organizational models for a CSIRT, the variety and level of services that can be provided by a CSIRT, and the types of resources and infrastructure needed to support a team. Additionally, attendees will identify policies and procedures that should be established and implemented when creating a CSIRT.

Attendees may also want to register for the three-day companion course, Managing Computer Security Incident Response Teams.


  • current and prospective CSIRT managers; C-level managers such as CIOs, CSOs, CROs; and project leaders interested in establishing or starting a CSIRT
  • other staff who interact with CSIRTs and would like to gain a deeper understanding of how CSIRTs operate. For example, CSIRT constituents; higher-level management; media relations, legal counsel, law enforcement, human resources, audit, or risk management staff


This course will help participants to

  • understand the requirements for establishing an effective CSIRT
  • strategically plan the development and implementation of a new CSIRT
  • highlight issues associated with assembling a responsive, effective team of computer security professionals
  • identify policies and procedures that should be established and implemented
  • understand various organizational models for a new CSIRT
  • understand the variety and level of services that can be provided by a CSIRT


  • incident management and the relationship to CSIRTs
  • prerequisites to planning a CSIRT
  • creating a CSIRT vision
  • CSIRT mission, objectives, and level of authority
  • CSIRT organizational issues and models
  • range and levels of provided services
  • funding issues
  • hiring and training initial CSIRT staff
  • implementing CSIRT policies and procedures
  • requirements for a CSIRT infrastructure
  • implementation and operational issues and strategies
  • collaboration and communication issues


Participants will receive a course notebook, CSIRT action plan, and electronic course materials downloadable from the SEI Learning Portal. Students attending in-person offerings in an SEI Training Facility are required to bring a laptop to be used only during course exercises.


This course has no prerequisites.

Course Fees [USD]

  • U.S. Industry: $700.00
  • U.S. Govt/Academic: $550.00
  • International: $1,200.00


This one-day course meets at the following times:

8:30 a.m.-4:30 p.m.

This course may be offered by special arrangement at customer sites. For details, please email or telephone at +1 412-268-1817.

Course Questions?

Phone: 412-268-7388

Related Courses

  • Advanced Topics in Incident Handling

    4 - Day Course

    This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...

    Learn More
  • Managing Computer Security Incident Response Teams

    3 - Day Course

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with...

    Learn More
  • Assessing Information Security Risk Using the OCTAVE Approach

    3 - Day Course

    In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...

    Learn More

Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.