SEI-Authorized CERT Instructor
What Services Do SEI-Authorized CERT Instructors Offer?
Individuals who successfully complete credential requirements are permitted to teach any of these SEI courses for which they have also completed the corresponding instructor training:
Benefits of the CERT Instructor Authorization
This credential will benefit security professionals, business continuity planners, compliance personnel, risk managers, and other professionals who need to teach skills and methods related to the security of information systems, build an incident response capability, or both.
Upon completing the authorization process, participants will be entitled to refer to themselves as SEI-Authorized CERT Instructors. If their sponsoring organization has chosen to be listed in the SEI Partner Directory, participants' names will also appear in the directory as SEI-Authorized Individuals.
Who Should Get This Credential?
Candidates should have some of the following skills:
- experience staffing or leading a computer security incident response team (CSIRT) and handling incidents
- system and network administration
- identifying and responding to security incidents
- performing or leading risk assessments
- project management
- software development
Term and Renewal
There is no term limit for CERT Instructor authorization once you are authorized to teach these courses. The only maintenance requirement is that you continue to be sponsored by an SEI Partner for CERT Information Security.
Summary of Fees
There are fees for courses and instructor training. Training fees are set by the SEI.
SEI Partners pay annual support fees for authorizations.
For more information about fees, please contact the SEI at email@example.com.
How to Apply
- Applicant must be sponsored by an SEI Partner for CERT Information Security.
- Applicant's sponsoring organization submits the Application for Candidate Sponsorship.
- Applicant submits a resume or CV.
- Applicant signs the Code of Professional Conduct Commitment Form.
Only complete applications can be accepted. You will receive a confirmation email when submission is complete.
- Submit all application materials (see details above).
- Register for and successfully complete the course that you plan to teach, if you haven't already.
- Successfully complete instructor training for the course you plan to teach.
Contact us with questions about this authorization at firstname.lastname@example.org.
4 - Day Course
This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...Register
1 - Day Course
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can...Register
4 - Day Course
• Incident Handling
This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work. The course provides an introduction to the basic concepts and...Register
3 - Day Course
This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with...Register
3 - Day Course
• Risk Assessment & Insider Threat
In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...Register
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.