Live-Online Training
The SEI's online learning platforms provide expert instruction as well as exercises, assessments, and other resources. Our live-online training offers synchronous learning where you and your instructor can interact during classes.
Live-Online learning enables you to
- learn from SEI experts in an interactive, online classroom environment
- communicate directly and easily with SEI instructors
- interact with other learners, during and after class sessions
- review instructional content outside of class sessions
- access electronic materials
Live-Online Courses
-
Advanced Topics in Incident Handling
4 Incident Handling
This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging cybersecurity threats and attacks. Building on the methods and tools discussed in the...
Incident Handling -
Software Architecture Design and Analysis
4 Software Architecture
A system's software architecture is widely regarded as one of the most important software artifacts. Software professionals routinely make decisions that impact that architecture, yet many times that impact is not fully considered or well understood. Which design decisions will lead to a software architecture that successfully addresses the...
Software Architecture -
Insider Threat Analyst
3 Risk Assessment & Insider Threat
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability. This training is based upon the...
Risk Assessment & Insider Threat -
Insider Threat Program Evaluator
3 Risk Assessment & Insider Threat
This three-day, instructor-led, course presents strategies for measuring and evaluating an operational insider threat program within an organization. Using scenario-based exercises, this course takes participants through the steps to conduct an insider threat program evaluation. This training is for insider threat program managers, evaluators, and...
Risk Assessment & Insider Threat -
Insider Threat Program Evaluator (ITPE) Certificate Package
Risk Assessment & Insider Threat
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Evaluator...
Risk Assessment & Insider Threat -
Insider Threat Program Manager (ITPM) Certificate Package
Risk Assessment & Insider Threat
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs. The Insider Threat Program Manager Certificate...
Risk Assessment & Insider Threat -
Insider Threat Program Manager: Implementation and Operation
3 Risk Assessment & Insider Threat
This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course presents a process roadmap that can be followed to build the various parts of a robust Insider Threat Program. It discusses various techniques and methods...
Risk Assessment & Insider Threat -
System Assessment and Authorization Process
2 Risk Assessment & Insider Threat
This two-day course introduces the NIST Risk Management Framework (RMF) process for system assessment and authorization. The RMF is the cybersecurity framework mandated for Federal Government departments and agencies, including the U.S. Department of Defense (DoD). Like other NIST guidance, the RMF is also used by organizations outside of the...
Risk Assessment & Insider Threat
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.