Events
Introduction to the CERT Resilience Management Model
Dec 3-4, 2024
This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.
RegisterInsider Threat Analyst
Dec 10-12, 2024
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterCERT Applied Data Science for Cybersecurity Certificate Examination
Jan 1-Dec 31, 2025
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of NetFlow, malware, and digital forensics data.
RegisterCERT Applied Data Science for Cybersecurity Certificate Package
Jan 1-Dec 31, 2025
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity.
RegisterCERT Certificate in Digital Forensics
Jan 1-Dec 31, 2025
The CERT Certificate in Digital Forensics is designed to familiarize experienced system and network computer professionals with the essential elements of digital forensics and build on their existing technical skill set. Completion of this Professional Certificate will prepare administrators to approach both routine and unusual events in a systematic forensic manner.
RegisterCERT Cybersecurity Engineering and Software Assurance Professional Certificate
Jan 1-Dec 31, 2025
The CERT Cybersecurity Engineering and Software Assurance Professional Certificate program targets software-reliant systems engineering and acquisition activities to infuse an awareness of cybersecurity and an approach to identifying security requirements, engineering risks, and supply chain risks early in the lifecycle.
RegisterCERT Cybersecurity Leadership Examination
Jan 1-Dec 31, 2025
The CERT Cybersecurity Leadership Examination objectively assesses the student's understanding of cybersecurity principles that reflect basic awareness and knowledge of cybersecurity within the context of a business organization and from the perspective of organizational leadership.
RegisterCERT Secure Coding in C and C++ Professional Certificate
Jan 1-Dec 31, 2025
The CERT Secure Coding in C and C++ Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards.
RegisterCERT Secure Coding in Java Professional Certificate
Jan 1-Dec 31, 2025
The CERT Secure Coding in Java Professional Certificate, taught by the CERT Secure Coding team, provides software developers with practical instruction on the essentials of designing and developing secure software in Java.
RegisterCyber Intelligence for Decision Makers
Jan 1-Dec 31, 2025
This course presents a non-technical approach to cyber intelligence for organizational managers and decision-makers. It explains the important contextual understanding of cyber intelligence with regard to your organization and the organizational roles and competencies involved.
RegisterDocumenting Software Architectures - eLearning
Jan 1-Dec 31, 2025
This eLearning course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
RegisterFundamentals of Statistics Applied to Cybersecurity
Jan 1-Dec 31, 2025
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity.
RegisterInsider Risk Management Measures of Effectiveness Certificate Examination
Jan 1-Dec 31, 2025
The Insider Risk Management Measures of Effectiveness Certificate Examination is an objective evaluation of your understanding of the best practices for measuring Insider Threat risk. It is required for conferral of the Software Engineering Institute's Insider Risk Management Measures of Effectiveness Professional Certificate.
RegisterInsider Threat Awareness Training
Jan 1-Dec 31, 2025
This one-hour course provides a basic understanding of insider threats within an organization, explains how insider threats can target you, and outlines employees' responsibilities to protect an organization's critical assets.
RegisterExamination of Software Architecture: Principles and Practices
Jan 1-Dec 31, 2025
To maintain high standards in software architecture, the SEI validates students' understanding before awarding professional certificates. This exam is mandatory for those seeking the SEI Software Architecture Professional Certificate and Service-Based Architecture Professional Certificate.
RegisterAdvanced Analytics: Malware
Jan 1-Dec 31, 2025
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of netflow, malware, and digital forensics data.
RegisterAdvanced Analytics: Netflow
Jan 1-Dec 31, 2025
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of NetFlow, malware, and digital forensics data.
RegisterAssessing Information Security Risk Using the OCTAVE Approach - eLearning
Jan 1-Dec 31, 2025
Through 27 video lectures the course covers the OCTAVE-prescribed activities for risk identification, analysis, and response.
RegisterModeling System Architectures Using the Architecture Analysis and Design Language (AADL) - eLearning
Jan 1-Dec 31, 2025
This eLearning course builds on the SAE AADL standard and focuses on fundamental MBE concepts for engineering real-time, embedded software systems through defining and documenting software and system architecture.
RegisterOverview of Creating and Managing CSIRTs - eLearning
Jan 1-Dec 31, 2025
This 3-hour course provides a consolidated overview of information in the Creating a CSIRT and Managing CSIRTs courses. It highlights best practices in planning, implementing, operating, and evaluating a computer security incident response team (CSIRT).
RegisterOverview of Insider Threat Concepts and Activities
Jan 1-Dec 31, 2025
This 3-hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators, and outlines mitigation strategies.
RegisterAdvanced Analytics: Digital Forensics
Jan 1-Dec 31, 2025
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of netflow, malware, and digital forensics data.
RegisterBuilding an Insider Threat Program
Jan 1-Dec 31, 2025
This 7-hour online course provides a thorough understanding of insider threat program organizational models, essential components for effectiveness, key stakeholder involvement, and basic implementation guidance.
RegisterSoftware Architecture: Principles and Practices - eLearning
Jan 1-Dec 31, 2025
This eLearning course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterUnderstanding Software Architecture, Quality, and Security Through Code Analysis
Jan 1-Dec 31, 2025
This 3.5-hour eLearning course introduces what distinguishes high-quality code and how to achieve it better using static and dynamic analysis, coding standards, metrics, and more. While primarily technical, the course also shows how understanding code analysis basics is key to acquisition success.
RegisterInsider Threat Program Manager Certificate Examination
Jan 1-Dec 31, 2025
To ensure continued excellence in Insider Threat program development, implementation, and operation, the SEI objectively validates the student's understanding and eligibility to receive the Insider Threat Program Manager (ITPM) Certificate.
RegisterSecure DevOps Process and Implementation
Jan 1-Dec 31, 2025
This 4.5-hour virtual, asynchronous course, designed for managers, developers, and operational teams, offers comprehensive DevOps principles and processes training. This course will expose attendees to reference architectures and use cases on Continuous Integration (CI) tools and practices, including technical demonstrations and practical scenarios.
RegisterCybersecurity Oversight for the Business Executive
Jan 15-16, 2025
This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.
RegisterInsider Threat Program Manager: Implementation and Operation
Jan 22-24, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Jan 22-24, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterProbing the Limits: A Workshop on Red-Teaming AI Systems
Jan 28, 2025
Software Architecture Design and Analysis
Feb 11-14, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Risk Management: Measures of Effectiveness
Feb 19-21, 2025
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterInsider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Feb 19-21, 2025
Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Feb 25-27, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Feb 25-27, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager: Implementation and Operation
Mar 4-6, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Mar 4-6, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterFloCon 2025
Mar 4, 2025 · 8AM-5PM (ET)
Insider Threat Analyst
Mar 18-20, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterCreating a Computer Security Incident Response Team
Mar 25, 2025
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high level overview of the key issues and decisions that must be addressed when establishing a CSIRT.
RegisterManaging Computer Security Incident Response Teams
Mar 26-28, 2025
This 3-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face when operating an effective incident response team.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Apr 8-10, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Apr 8-10, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterDocumenting Software Architectures
Apr 28-May 1, 2025
This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
RegisterRSA Conference 2025
Apr 28-May 1, 2025
At RSAC 2025, you're not just attending a conference—you're stepping into a vibrant, thriving community of thinkers, innovators, and achievers.
Come See UsInsider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterDesigning Modern Service-Based Systems
May 6, 2025
SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.
RegisterDesign Guidelines and Patterns for Microservices
May 12-15, 2025
This two-day course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.
RegisterFoundations of Incident Management
May 13-16, 2025
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
RegisterSoftware Architecture Design and Analysis
Jun 10-13, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Threat Program Manager: Implementation and Operation
Jun 24-26, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Jun 24-26, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Jul 22-24, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Jul 22-24, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterCybersecurity Oversight for the Business Executive
Jul 29-30, 2025
This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.
RegisterInsider Threat Program Manager: Implementation and Operation
Aug 5-7, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Aug 5-7, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterSoftware Architecture Design and Analysis
Aug 12-15, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterSoftware Architecture: Principles and Practices
Aug 18-21, 2025
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Sep 16-18, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Sep 16-18, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterAdvanced Topics in Incident Handling
Sep 23-26, 2025
This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.
RegisterDeveloping a National or Government CSIRT
Oct 7-8, 2025
This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT, discusses the basic components of CSIRTs in general, and highlights the characteristics that make national or government versions of CSIRTs unique.
RegisterSoftware Architecture Design and Analysis
Oct 14-17, 2025
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
RegisterInsider Threat Program Manager (ITPM) Certificate Package
Oct 21-23, 2025
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Threat Program Manager: Implementation and Operation
Oct 21-23, 2025
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
RegisterInsider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Oct 28-30, 2025
Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
RegisterInsider Risk Management: Measures of Effectiveness
Oct 28-30, 2025
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
RegisterRisk Program Development - Governance and Appetite Workshop
Nov 12-13, 2025
This 2-day course instructs attendees on constructing a risk management program within the three fundamental pillars of governance, appetite, and policy. Attendees will learn how best to structure decision-makers in the organization to gain the risk information they need to be more effective.
RegisterIntroduction to the CERT Resilience Management Model
Dec 2-3, 2025
This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.
RegisterInsider Threat Analyst
Dec 9-11, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
Register