search menu icon-carat-right cmu-wordmark

Workforce Development

The SEI raises the state of the practice in cyber workforce development and identifies ways to transfer knowledge and skills to your cyber workforce.

STEPfwd Learning Management System

Train your workforce to effectively recognize, resist, and recover from attacks on your networked systems.

An alternative to the traditional classroom approach, STEP (Simulation, Training, and Exercise Platform) immerses students in an environment where they can recognize  and practice realistic cyber "protect," "detect," and "respond" scenarios.

STEPfwd, our learning management system, combines asynchronous classroom-style instruction and synchronous exercises to develop students' capabilities in information assurance, incident response, computer forensics, insider threat, software security, and other vital information security topics.

Simulated cyber training events allow participants to apply skills in environments that simulate real-world infrastructures and attacks.

Virtual training labs enable your workforce to develop technical skills in a focused, hands-on environment.

Take a look at STEPfwd

 

Cyber Workforce Assessment and Evaluation

Fill gaps in essential competencies for your organization's workforce.

Assess and evaluate your own cyber workforce with accurate, objective, scalable methods and technologies that we developed in collaboration with academia and government.

With these methods and technologies, you can identify gaps in essential competencies that are unique to your workforce.

Once gaps in essential competencies are identified, the SEI can develop a targeted plan to address them with expert content and robust curricula that meet your workforce development needs.

Contact us to develop A PLAN

Learn More

Using Augmented Reality to See Real Opportunity

Using Augmented Reality to See Real Opportunity

March 13, 2018 Video
Josh Hammerstein

Our team is developing a new prototype tool to help soldiers identify and exploit cyber opportunities in the physical environment.

watch
SEI Cyber Minute: Assessing the Skills of Cyber Operatives

SEI Cyber Minute: Assessing the Skills of Cyber Operatives

January 24, 2018 Video

Watch April Galyardt in this SEI Cyber Minute as she discusses "Assessing the Skills of Cyber Operatives".

watch
CYBER LEAPfwd (Learning & Experience Acceleration Platform)

CYBER LEAPfwd (Learning & Experience Acceleration Platform)

February 16, 2017 Video
Christopher May

Watch Chris May in this Cyber Minute as he discusses "CYBER LEAPfwd", a new educational platform aimed at the next generation of cybersecurity professionals.

watch
SEI Cyber Minute: Cyber Workforce Development Research

SEI Cyber Minute: Cyber Workforce Development Research

September 20, 2016 Video
Josh Hammerstein

Josh Hammerstein discusses "CERT Cyber Workforce Development Research."

watch
Generalized Automated Cyber-Readiness Evaluator (ACE)

Generalized Automated Cyber-Readiness Evaluator (ACE)

November 30, 2015 Webinar
Rotem D. Guttman

Rotem Guttman discusses how mission-readiness can be assessed at a DoD scale.

watch
Competency Development and Workforce Readiness

Competency Development and Workforce Readiness

August 27, 2014 Collection

The following publications relate to competency development and workforce readiness.

view
State of Cyber Workforce Development

State of Cyber Workforce Development

August 15, 2013 White Paper
Marie Baker

This paper summarizes the current posture of the cyber workforce and several initiatives designed to strengthen, grow, and retain cybersecurity professionals.

read
Developing Your Cyber Workforce

Developing Your Cyber Workforce

August 02, 2013 Webinar
Christopher May

In this 2013 webinar, Chris May discusses ways to research and develop solutions approaching the cyber workforce development challenge.

watch
Digital Investigation Workforce Development

Digital Investigation Workforce Development

March 01, 2012 White Paper
Dennis M. Allen

In this paper, the authors describe an approach for deriving measures of software security from well-established and commonly used standard practices.

read