search menu icon-carat-right cmu-wordmark

Courses

Courses, workshops, and seminars help transition SEI technology and research to the broader community, disseminating recent advances relevant to our mission.

Knowledge and Techniques That You Can Apply Today

SEI courses, workshops, and seminars are created and delivered by recognized experts who have practical experience in the disciplines they teach. Our courses feature hands-on tasks and real-world scenarios. In just a matter of days, you’ll be more informed and ready to perform at a higher level.

Professional Development and Workforce Development

Whether you want to learn at your own pace online, experience the networking opportunities of our classroom facilities, or develop your workforce by bringing our instructors on-site, SEI courses give you the tools you need to create and maintain software, systems, and organizations that are efficient, secure, and reliable. Organizations can help their workforce gain competencies in software development, software acquisition, and cybersecurity.

Delivery Modes

Classroom

The SEI has training facilities in its offices in Pittsburgh, Pennsylvania, and Arlington, Virginia.

Classroom Training

Course List

  • Acquisition Essentials for Software-Reliant Systems

    Acquisition

    The challenges and failures of software development and acquisition of software-reliant systems have been well documented. There are many reasons software-reliant acquisitions fail, including unrealistic estimates, overly ambitious requirements, and inadequate software engineering and testing. This hour-long course is part of a series of...

    Learn More
  • Assessing Information Security Risk Using the OCTAVE Approach - eLearning

    Risk Assessment & Insider Threat

    In this 11 module, online course participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context....

    Learn More
  • Big Data: Architectures and Technologies - eLearning

    Software Architecture

    Scalable "big data" systems are significant long-term investments that must scale to handle ever-increasing data volumes, and therefore represent high-risk applications in which the software and data architecture are fundamental components of ensuring success. This online course is presented to you by the Software Engineering Institute's research...

    Learn More
  • Building an Insider Threat Program

    Risk Assessment & Insider Threat

    This seven (7) hour online course provides a thorough understanding of the organizational models for an insider threat program, the necessary components to have an effective program, the key stakeholders who need to be involved in the process, and basic education on the implementation and guidance of the program. This training is based upon the...

    Learn More
  • CERT Certificate in Digital Forensics

    Incident Handling

    In today's networked world, it is essential for system and network administrators to understand the fundamental areas and the major issues in computer forensics. Knowledgeable first responders apply good forensic practices to routine administrative procedures and alert verification, and know how routine actions can adversely affect the forensic...

    Learn More
  • CERT Cybersecurity Engineering and Software Assurance Professional Certificate

    Network & Software Security

    Software-reliant systems are acquired, built, deployed, and maintained through a coordinated set of activities referred to as a lifecycle. When implementing software-reliant systems, desired capabilities and performance parameters have historically received much more attention-and funding-than requirements for quality attributes. Yet quality...

    Learn More
  • CERT Secure Coding in C and C++ Professional Certificate

    Network & Software Security

    The CERT Secure Coding in C and C++ Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding Standards have been curated from the contribution of 1900+ experts for the C and C++ programming language. The CERT Secure Coding team teaches the essentials of...

    Learn More
  • CERT Secure Coding in Java Professional Certificate

    Network & Software Security

    The CERT Secure Coding in Java Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards. The CERT Secure Coding team teaches the essentials of designing and developing secure software in Java. Completion of this Professional Certificate will enable software developers to increase...

    Learn More
  • Cyber Intelligence for Decision Makers

    Risk Assessment & Insider Threat

    With the rapidly changing nature of cyber threats and high-profile exploitations of vulnerabilities, organizations are recognizing the need to address the systemic analytical challenges of cyber intelligence. This course presents a non-technical approach to cyber intelligence for organizational managers and decision makers. It explains the...

    Learn More
  • Data Rights and DoD Acquisition

    Acquisition

    This series of three 1-hour webinars will provide insight into what should be considered with respect to data rights when acquiring software. Whether your software is developed as part of a larger weapons system or is a stand-alone product, software data rights can be an issue. Data rights also play a very important role during sustainment, but...

    Learn More
  • Documenting Software Architectures - eLearning

    Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    Learn More
  • Examination of Software Architecture: Principles and Practices

    Software Architecture

    To ensure continued excellence in software architecture practices, the SEI objectively validates a student's understanding of software architecture before students are eligible to receive professional certificates in software architecture or become certified to lead SEI Authorized ATAM evaluations. This includes understanding of enterprise,...

    Learn More
  • Information Security for Technical Staff - eLearning

    Network & Software Security

    This 13 module, online course is designed to provide participants with practical techniques for protecting the security of an organization's information assets and resources, beginning with concepts and proceeding on to technical implementations. The course focuses on understanding and applying the concept of survivability through the effective...

    Learn More
  • Insider Threat Awareness Training

    Risk Assessment & Insider Threat

    This one hour course provides a basic understanding of insider threats within an organization and what employees should be aware of in their responsibilities to protect an organization's critical assets. This course explains how your work can be affected and how you can be targeted by Insider Threats. This training is based upon the research of...

    Learn More
  • Insider Threat Overview: Preventing, Detecting and Responding to Insider Threats

    Risk Assessment & Insider Threat

    This five (5) hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators and outlines mitigation strategies. This training is based upon the research of the CERT Insider Threat Center of the Software Engineering...

    Learn More
  • Insider Threat Program Manager Certificate Examination

    Risk Assessment & Insider Threat

    To ensure continued excellence in Insider Threat program development, implementation, and operation, the SEI objectively validates the student's understanding and eligibility to receive the Insider Threat Program Manager (ITPM) Certificate. The certificate exam evaluates the student's comprehension of insider threat planning, identification and...

    Learn More
  • Insider Threat Vulnerability Assessor Certificate Examination

    Risk Assessment & Insider Threat

    To insure the ability of a candidate assessor to identify and manage insider threat risk within organizations, the Insider Threat Vulnerability Assessor (ITVA) Certificate Examination evaluates a candidate assessor's comprehension of the CERT insider threat assessment methodology. The Insider Threat Vulnerability Assessor Certificate Examination...

    Learn More
  • Managing Technical Debt of Software - eLearning

    Software Architecture

    Technical debt occurs when a design or construction approach is taken that is expedient in the short term, but increases complexity and cost in the long term. In the course Managing Technical Debt of Software, the concept of technical debt is examined from multiple perspectives, including how it manifests, accumulates, and impacts the enterprise....

    Learn More
  • Modeling System Architectures Using the Architecture Analysis and Design Language (AADL) - eLearning

    Software Architecture

    Available soon. Contact us to receive an email notification when training registration is available. Modeling and validating quality attributes for real-time, embedded systems is often done with low-fidelity software models and disjointed architectural specifications by various engineers using their own specialized notations. These models are...

    Learn More
  • Secure DevOps Process and Implementation

    Network & Software Security

    This 4.5 hour virtual, asynchronous course is designed for managers, developers and operational teams to offer a comprehensive training on DevOps principles and process, and to identify techniques for project planning, development, and deployment from start to finish. Specifically, this course will expose attendees to reference architectures and...

    Learn More
  • Software Architecture: Principles and Practices - eLearning

    Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    Learn More
  • Software Product Lines - eLearning

    Software Product Lines

    A software product line is a set of software-reliant systems that share a common, managed set of features satisfying a particular market or mission area, and are built from a common set of core assets in a prescribed way. Producing a set of related products as a product line has allowed organizations to achieve increased quality and...

    Learn More
  • Twenty Questions to Assess Your Program's Chances of Success

    Acquisition Risk Assessment & Insider Threat

    This online course introduces risk management concepts and explains the 20 key drivers that compose the SEI risk-based method for assessing complex projects, the Mission Diagnostic Protocol. This course explains what these drivers are and how the assessment of a program using the drivers creates a profile of a program's chances of success. This...

    Learn More
  • Secure Coding in C and C++

    4 Network & Software Security

    Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in C and C++ programming. This four-day course provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code...

    Learn More
  • Secure Coding in Java

    4 Network & Software Security

    Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in Java programming. This four-day course provides a detailed explanation of common programming errors in Java and describes how these errors can lead to code that is...

    Learn More
  • Analyzing Project Management Indicators

    3 Measurement & Analysis

    Do you receive reports on your project, but are uncertain how to use them? Do you feel you don't receive the information you need to manage your project? This three-day course teaches managers and practitioners how to use measurement as the foundation for making informed decisions about projects. Participants learn to use measurement to analyze...

    Learn More
  • Designing Products and Processes Using Six Sigma

    5 Measurement & Analysis

    This five-day course takes a hands-on, measurement-oriented approach to product development, providing participants with a toolkit of analysis methods and leveraging industry best practices, such as the Design-for-Six-Sigma methodology of DMADV (Define, Measure, Analyze, Design, Verify). This course builds upon basic statistical concepts from the...

    Learn More
  • Designing Products and Processes Using Six Sigma Instructor Training

    2 Measurement & Analysis

    This two-day course is for those interested in becoming SEI-Certified Instructors of the Designing Products and Processes Using Six Sigma (DPPSS) course. The DPPSS course introduces a method and toolbox originating from the Design-for-Six-Sigma paradigm called Define-Measure-Analyze-Design-Verify (DMADV). The method can be used for designing...

    Learn More
  • Implementing Goal-Driven Measurement

    3 Measurement & Analysis

    Does your organization collect data that is never used? Does it still make decisions based on opinion and assertion? This three-day course teaches managers and practitioners how to identify and define indicators (i.e., graphical displays) and measures that directly support decision making and an organization's business, process improvement, and...

    Learn More
  • Implementing Goal-Driven Measurement Instructor Training

    3 Measurement & Analysis

    This three-day course is for those interested in becoming SEI-Certified Instructors of the Implementing Goal-Driven Measurement course. This course introduces a method for identifying and defining indicators (i.e., graphical displays) and measures that directly support an organization's business goals related to product development, process...

    Learn More
  • Improving Process Performance Using Six Sigma

    5 Measurement & Analysis

    Does your organization experience the same product and business problems repeatedly? Are you tired of process improvement projects that never produce results? Are your competitors consistently beating you to market? Do you have data but don't know what to do with it? Many process improvement projects aim for modest improvements of 1-5%. Through...

    Learn More
  • Improving Process Performance Using Six Sigma Instructor Training

    2 Measurement & Analysis

    Please review the prerequisites before registering below. This two-day course is for those interested in becoming SEI-Certified Instructors of the Improving Process Performance Using Six Sigma (IPPSS) course. The IPPSS course introduces a method for driving improvement based on performance using a method and toolbox originating with the Six Sigma...

    Learn More
  • AADL in Practice Workshop

    Software Architecture

    The AADL in Practice Workshop combines AADL training and an AADL modeling workshop to provide practical knowledge as well as an opportunity to practice skills in a realistic setting. This Workshop will transfer expertise to participants through an effective combination of training and mentoring during practice. Organizations seeking to increase...

    Learn More
  • ATAM Evaluator Training

    2 Software Architecture

    Most complex software systems must be modifiable and perform well. They might also need to be secure, interoperable, portable, and reliable. But What precisely do quality attributes such as modifiability, security, performance, and reliability mean? Can a system be analyzed to determine whether it has certain desired qualities? How soon can such...

    Learn More
  • Big Data: Architectures and Technologies

    1 Software Architecture

    Scalable "big data" systems are significant long-term investments that must scale to handle ever-increasing data volumes, and therefore represent high-risk applications in which the software and data architecture are fundamental components of ensuring success. This one-day course is designed for architects and technical stakeholders such as...

    Learn More
  • Design Guidelines and Patterns for Microservices

    2 Software Architecture

    In modern service-based solutions, services are developed and deployed as microservices. It is not an easy job to create a sound design for systems in this space, which often need to be elastic to thousands of machines, automatically deployable, resilient to simian armies, and accessible via a comprehensive API. There are countless technology and...

    Learn More
  • Designing Modern Service-Based Systems

    1 Software Architecture

    From a buzzword in the early 2000s, service-oriented architecture (SOA) has evolved into an established paradigm for developing distributed software systems. But SOA today has a different face. Microservices, API gateways, REST constraints, and event-driven messaging are just some of the design concepts that developers of modern service-based...

    Learn More
  • Documenting Software Architectures

    2 Software Architecture

    Software architecture has become a widely accepted conceptual basis for the development of nontrivial software in all application areas and by organizations of all sizes. However, the treatment of architecture to date has largely concentrated on its design and, to a lesser extent, its validation. Effectively documenting an architecture is as...

    Learn More
  • Managing Technical Debt of Software

    1 Software Architecture

    Technical debt occurs when a design or construction approach is taken that's expedient in the short term, but increases complexity and cost in the long term. In the course Managing Technical Debt of Software, the concept of technical debt is examined from multiple perspectives, including how it manifests, accumulates, and impacts the software...

    Learn More
  • Modeling System Architectures Using the Architecture Analysis and Design Language (AADL)

    4 Software Architecture

    Modeling and validating of quality attributes for real-time, embedded systems is often done with low-fidelity software models and disjointed architectural specifications by various engineers using their own specialized notations. These models are typically not maintained or documented throughout the life cycle, making it difficult to predict the...

    Learn More
  • Software Architecture Design and Analysis

    2 Software Architecture

    A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...

    Learn More
  • Software Architecture: Principles and Practices

    2 Software Architecture

    Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. What is software architecture? How do you use software architectures in practice? What does a software architect do for an organization? What value does software architecture provide? This course introduces the...

    Learn More
  • Software Product Lines

    2 Software Product Lines

    A software product line is a set of software-reliant systems that share a common, managed set of features satisfying a particular market or mission area, and are built from a common set of core assets in a prescribed way. Producing a set of related products as a product line has allowed organizations to achieve increased quality and...

    Learn More
  • Insider Threat Analyst

    3 Risk Assessment & Insider Threat

    This 3-day classroom course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based...

    Learn More
  • Insider Threat Program Evaluator

    3 Risk Assessment & Insider Threat

    This three-day, instructor-led, classroom-based course presents strategies for measuring and evaluating an operational insider threat program within an organization. Using scenario-based exercises, this course takes participants through the steps to conduct an insider threat program evaluation. This training is for insider threat program managers,...

    Learn More
  • Insider Threat Program Evaluator (ITPE) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Program Evaluator Certificate Examination

    Risk Assessment & Insider Threat

    To insure the ability of a candidate evaluator to reduce exposure to insider risk and to strengthen insider threat programs within organizations, the Insider Threat Program Evaluator (ITPE) Certificate Examination evaluates a candidate evaluator's comprehension of the CERT insider threat program evaluation methodology. The Insider Threat Program...

    Learn More
  • Insider Threat Program Manager (ITPM) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Program Manager: Implementation and Operation

    3 Risk Assessment & Insider Threat

    This three day course builds upon the initial concepts presented in the prerequisite courses Insider Threat Overview: Preventing, Detecting, and Responding to Insider Threats and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses...

    Learn More
  • Insider Threat Vulnerability Assessor (ITVA) Certificate Package

    Risk Assessment & Insider Threat

    Students who wish to purchase the certificate program package (two eLearning courses, classroom course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled classroom course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager...

    Learn More
  • Insider Threat Vulnerability Assessor Training

    3 Risk Assessment & Insider Threat

    This 3-day course develops the skills and competencies necessary to perform an insider threat vulnerability assessment of an organization. This training is based upon the research of the CERT Insider Threat Center of the Software Engineering Institute. The CERT Insider Threat Center has been researching the insider threat problem since 2001 in...

    Learn More
  • Measuring What Matters: Security Metrics Workshop

    2 Measurement & Analysis Risk Assessment & Insider Threat

    It is critical to measure the right things in order to make informed management decisions, take the appropriate actions, and change behaviors. But how do managers figure out what those right things are? Public and private organizations today often base cyber risk management decisions on fear, uncertainty, and doubt (FUD) and the latest attack;...

    Learn More
  • Practical Risk Management: Principles and Methods

    2 Acquisition Risk Assessment & Insider Threat

    Although most programs and organizations implement some type of risk management approach, preventable failures continue to occur. Many of these approaches tend to be bureaucratic and time-intensive, which can consume valuable program resources. Most programs would benefit by improving, or in some cases replacing, their current risk management...

    Learn More
  • Agile in Government: Practical Considerations

    2 Acquisition

    This 1-2 day live-delivery tutorial enables attendees to understand basic Agile concepts that developers use, but primarily focuses on introducing the interactions that government program offices can and should have with developers (either organic or contracted) who are using Agile methods to develop government systems. A combination of lecture,...

    Learn More
  • Leading SAFe/Agile in Government

    3 Acquisition

    This 3 day live-delivery course enables attendees to understand basic Agile and lean concepts that developers use, but primarily focuses on introducing the interactions that government program offices can and should have with developers (either organic or contracted) who are using Agile team methods and the Scaled Agile Framework scaling approach...

    Learn More
  • Software Acquisition Survival Skills

    3 Acquisition

    This three-day course is designed for program managers and their staff members. It presents an integrated, unique acquisition perspective on key topics in software system acquisition, including risk management, requirements management, pre-award activities, systems engineering, software architecture, technical evaluation, project metrics, and...

    Learn More
  • Advanced Forensic Response and Analysis

    3 Incident Handling

    The CERT Advanced Forensic Response and Analysis course is designed for computer forensic professionals who are looking to build on a solid knowledge base in incident response and forensic analysis. The course builds on core forensic topics to provide a process for conducting more complete incident response and forensic analysis investigations....

    Learn More
  • Advanced Topics in Incident Handling

    4 Incident Handling

    This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...

    Learn More
  • Applied Cybersecurity, Incident Response and Forensics

    5 Network & Software Security

    This four-day hands-on course is designed to increase the knowledge and skills of technical staff charged with administering and securing information systems and networks. Security topics such as vulnerability assessment, systems administration, network monitoring, incident response, and digital forensics will offer a comprehensive...

    Learn More
  • Assessing Information Security Risk Using the OCTAVE Approach

    3 Risk Assessment & Insider Threat

    In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...

    Learn More
  • CERT-Certified Computer Security Incident Handler Qualification Examination

    Incident Handling

    This examination is designed to demonstrate that cyber-security professionals have sufficient knowledge and skill in key areas to successfully conduct network security...

    Learn More
  • Creating a Computer Security Incident Response Team

    1 Incident Handling

    This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can...

    Learn More
  • Fundamentals of Incident Handling

    5 Incident Handling

    This five-day course is for computer security incident response team (CSIRT) technical staff who have little or no incident handling experience. It provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work. It is recommended to those new to incident...

    Learn More
  • Information Security for Technical Staff

    5 Network & Software Security

    This five-day course is designed to provide participants with practical techniques for protecting the security of an organization's information assets and resources, beginning with concepts and proceeding on to technical implementations. The course focuses on understanding and applying the concept of survivability through the effective management...

    Learn More
  • Introduction to the CERT Resilience Management Model

    2 Risk Assessment & Insider Threat

    This two-day course introduces a model-based process improvement approach to managing operational resilience using the CERT® Resilience Management Model (CERT-RMM) v1.2 Resilience Management Model (CERT-RMM) v1.2. CERT-RMM is a maturity model that promotes the convergence of security, business continuity, and IT operations activities to help...

    Learn More
  • Managing Computer Security Incident Response Teams

    3 Incident Handling

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with...

    Learn More
  • Security Requirements Engineering Using the SQUARE Method

    1 Network & Software Security

    Through the SQUARE project, CERT researchers have developed an end-to-end process for security requirements engineering to help organizations build security into the early stages of the production life cycle. The SQUARE methodology consists of nine steps that generate a final deliverable of categorized and prioritized security requirements. This...

    Learn More
  • Software Assurance Methods in Support of Cyber Security

    1 Network & Software Security

    This workshop is focused on four critical software assurance areas: security requirements, software supply chain assurance, mission thread analysis, and measurement. The purpose of this course is to expose managers, engineers, and acquirers to concepts and resources available now for their use to address software security assurance across the...

    Learn More
  • Advanced Software Architecture Workshop

    2 Software Architecture

    You can now directly put into practice your knowledge of successful architecture principles through the Advanced Software Architecture Workshop. In this workshop, you will apply what you've learned in other architecture courses offered by the Software Engineering Institute (SEI) to a concrete architecture problem. This course is helpful if you...

    Learn More
  • Agile Adoption Readiness and Fit Workshop

    2 Acquisition

    When adopting new governance practices, leaders often find mismatches between assumptions and the realities within their organizations. This 2-day workshop leverages the SEI Readiness and Fit Analysis (RFA) technique to help people involved in systems of systems from all levels of the enterprise-senior leaders, policy makers, program managers,...

    Learn More
  • Agile in Government: Concepts for Senior Executives

    0.5 Acquisition

    This 2-4 hour tutorial is designed for a small group of senior executives in a program or enterprise who are contemplating or are already in progress with adoption of Agile approaches in the organization within their purview. The tutorial includes the opportunity for discussion about practical application of concepts at the executive...

    Learn More
  • DevOps in Practice Workshop

    1 Network & Software Security

    This DevOps workshop is intended to offer a comprehensive, hands-on review of DevOps topics and process, and to identify techniques for project planning, development, and deployment from start to finish. Specifically, this workshop will expose attendees to reference architectures and hands-on experience with Continuous Integration (CI) tools and...

    Learn More
  • Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth

    3 Network & Software Security

    This three-day course begins with a brief review of the conceptual foundations of information security. Next, students will be introduced to the CERT Defense-in-Depth Framework: eight operationally focused and interdependent management components which will be synergistically applied to a fictitious organization's Information Technology (IT)...

    Learn More
  • Overview of Creating and Managing CSIRTs

    1 Incident Handling

    This one-day course provides a consolidated view of information that is contained in two other CERT courses: Creating a CSIRT and Managing CSIRTs. Its main purpose is to highlight best practices in planning, implementing, operating, and evaluating a computer security incident response team (CSIRT). The course will explore the relationship between...

    Learn More
  • Performance-Driven Improvement "Analyze" Workshop

    1 Measurement & Analysis

    This one-day facilitated workshop provides hands-on coaching in the implementation of the tools and techniques from the "Analyze" phase of the Define-Measure-Analyze-Improve-Control (DMAIC) Six Sigma business improvement methodology - as taught in the SEI Improving Process Performance Using Six Sigma course. This workshop is intended to be a...

    Learn More
  • Performance-Driven Improvement "Control" Workshop

    1 Measurement & Analysis

    This one-day facilitated workshop provides hands-on coaching in the implementation of the tools and techniques from the "Control" phase of the Define-Measure-Analyze-Improve-Control (DMAIC) Six Sigma business improvement methodology, as taught in the SEI Improving Process Performance Using Six Sigma course. This just-in-time workshop helps to...

    Learn More
  • Performance-Driven Improvement "Define" Workshop

    1 Measurement & Analysis

    This one-day facilitated workshop provides hands-on coaching in the implementation of the tools and techniques from the "Define" phase of the Define-Measure-Analyze-Improve-Control (DMAIC) Six Sigma business improvement methodology, as taught in the SEI Improving Process Performance Using Six Sigma course. This just-in-time workshop will help you...

    Learn More
  • Performance-Driven Improvement "Improve" Workshop

    1 Measurement & Analysis

    This one-day facilitated workshop provides hands-on coaching in the implementation of the tools and techniques from the "Improve" phase of the Define-Measure-Analyze-Improve-Control (DMAIC) Six Sigma business improvement methodology, as taught in the SEI Improving Process Performance Using Six Sigma course. This just-in-time workshop helps to...

    Learn More
  • Performance-Driven Improvement "Measure" Workshop

    1 Measurement & Analysis

    This one-day facilitated workshop provides hands-on coaching in the implementation of the tools and techniques from the "Measure" phase of the Define-Measure-Analyze-Improve-Control (DMAIC) Six Sigma business improvement methodology, as taught in the SEI Improving Process Performance Using Six Sigma course. This just-in-time workshop will help to...

    Learn More
  • Vulnerability Response Capability Development

    1 Network & Software Security

    This one-day course is designed for managers and project leaders who are trying to respond to vulnerabilities reported in their products. This course will provide a high-level overview of the key issues, processes, and decisions that must be made to build your organization's vulnerability response capability. As part of the course, attendees will...

    Learn More

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.