icon-carat-right menu search cmu-wordmark

Events

Dec 2

Introduction to the CERT Resilience Management Model

Dec 3-4, 2024
Training

This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.

Register
Dec 9

Insider Threat Analyst

Dec 10-12, 2024
Training

This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.

Register
Dec 31

CERT Applied Data Science for Cybersecurity Certificate Examination

Jan 1-Dec 31, 2025
Training

This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of NetFlow, malware, and digital forensics data.

Register
Dec 31

CERT Applied Data Science for Cybersecurity Certificate Package

Jan 1-Dec 31, 2025
Training

This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity.

Register
Dec 31

CERT Certificate in Digital Forensics

Jan 1-Dec 31, 2025
Training

The CERT Certificate in Digital Forensics is designed to familiarize experienced system and network computer professionals with the essential elements of digital forensics and build on their existing technical skill set. Completion of this Professional Certificate will prepare administrators to approach both routine and unusual events in a systematic forensic manner.

Register
Dec 31

CERT Cybersecurity Engineering and Software Assurance Professional Certificate

Jan 1-Dec 31, 2025
Training

The CERT Cybersecurity Engineering and Software Assurance Professional Certificate program targets software-reliant systems engineering and acquisition activities to infuse an awareness of cybersecurity and an approach to identifying security requirements, engineering risks, and supply chain risks early in the lifecycle.

Register
Dec 31

CERT Cybersecurity Leadership Examination

Jan 1-Dec 31, 2025
Training

The CERT Cybersecurity Leadership Examination objectively assesses the student's understanding of cybersecurity principles that reflect basic awareness and knowledge of cybersecurity within the context of a business organization and from the perspective of organizational leadership.

Register
Dec 31

CERT Secure Coding in C and C++ Professional Certificate

Jan 1-Dec 31, 2025
Training

The CERT Secure Coding in C and C++ Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards.

Register
Dec 31

CERT Secure Coding in Java Professional Certificate

Jan 1-Dec 31, 2025
Training

The CERT Secure Coding in Java Professional Certificate, taught by the CERT Secure Coding team, provides software developers with practical instruction on the essentials of designing and developing secure software in Java.

Register
Dec 31

Cyber Intelligence for Decision Makers

Jan 1-Dec 31, 2025
Training

This course presents a non-technical approach to cyber intelligence for organizational managers and decision-makers. It explains the important contextual understanding of cyber intelligence with regard to your organization and the organizational roles and competencies involved.

Register
Dec 31

Documenting Software Architectures - eLearning

Jan 1-Dec 31, 2025
Training

This eLearning course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).

Register
Dec 31

Fundamentals of Statistics Applied to Cybersecurity

Jan 1-Dec 31, 2025
Training

This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity.

Register
Dec 31

Insider Risk Management Measures of Effectiveness Certificate Examination

Jan 1-Dec 31, 2025
Training

The Insider Risk Management Measures of Effectiveness Certificate Examination is an objective evaluation of your understanding of the best practices for measuring Insider Threat risk. It is required for conferral of the Software Engineering Institute's Insider Risk Management Measures of Effectiveness Professional Certificate.

Register
Dec 31

Insider Threat Awareness Training

Jan 1-Dec 31, 2025
Training

This one-hour course provides a basic understanding of insider threats within an organization, explains how insider threats can target you, and outlines employees' responsibilities to protect an organization's critical assets.

Register
Dec 31

Examination of Software Architecture: Principles and Practices

Jan 1-Dec 31, 2025
Training

To maintain high standards in software architecture, the SEI validates students' understanding before awarding professional certificates. This exam is mandatory for those seeking the SEI Software Architecture Professional Certificate and Service-Based Architecture Professional Certificate.

Register
Dec 31

Advanced Analytics: Malware

Jan 1-Dec 31, 2025
Training

This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of netflow, malware, and digital forensics data.

Register
Dec 31

Advanced Analytics: Netflow

Jan 1-Dec 31, 2025
Training

This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of NetFlow, malware, and digital forensics data.

Register
Dec 31

Assessing Information Security Risk Using the OCTAVE Approach - eLearning

Jan 1-Dec 31, 2025
Training

Through 27 video lectures the course covers the OCTAVE-prescribed activities for risk identification, analysis, and response.

Register
Dec 31

Modeling System Architectures Using the Architecture Analysis and Design Language (AADL) - eLearning

Jan 1-Dec 31, 2025
Training

This eLearning course builds on the SAE AADL standard and focuses on fundamental MBE concepts for engineering real-time, embedded software systems through defining and documenting software and system architecture.

Register
Dec 31

Overview of Creating and Managing CSIRTs - eLearning

Jan 1-Dec 31, 2025
Training

This 3-hour course provides a consolidated overview of information in the Creating a CSIRT and Managing CSIRTs courses. It highlights best practices in planning, implementing, operating, and evaluating a computer security incident response team (CSIRT).

Register
Dec 31

Overview of Insider Threat Concepts and Activities

Jan 1-Dec 31, 2025
Training

This 3-hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators, and outlines mitigation strategies.

Register
Dec 31

Advanced Analytics: Digital Forensics

Jan 1-Dec 31, 2025
Training

This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of netflow, malware, and digital forensics data.

Register
Dec 31

Building an Insider Threat Program

Jan 1-Dec 31, 2025
Training

This 7-hour online course provides a thorough understanding of insider threat program organizational models, essential components for effectiveness, key stakeholder involvement, and basic implementation guidance.

Register
Dec 31

Software Architecture: Principles and Practices - eLearning

Jan 1-Dec 31, 2025
Training

This eLearning course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.

Register
Dec 31

Understanding Software Architecture, Quality, and Security Through Code Analysis

Jan 1-Dec 31, 2025
Training

This 3.5-hour eLearning course introduces what distinguishes high-quality code and how to achieve it better using static and dynamic analysis, coding standards, metrics, and more. While primarily technical, the course also shows how understanding code analysis basics is key to acquisition success.

Register
Dec 31

Insider Threat Program Manager Certificate Examination

Jan 1-Dec 31, 2025
Training

To ensure continued excellence in Insider Threat program development, implementation, and operation, the SEI objectively validates the student's understanding and eligibility to receive the Insider Threat Program Manager (ITPM) Certificate.

Register
Dec 31

Secure DevOps Process and Implementation

Jan 1-Dec 31, 2025
Training

This 4.5-hour virtual, asynchronous course, designed for managers, developers, and operational teams, offers comprehensive DevOps principles and processes training. This course will expose attendees to reference architectures and use cases on Continuous Integration (CI) tools and practices, including technical demonstrations and practical scenarios.

Register
Jan 14

Cybersecurity Oversight for the Business Executive

Jan 15-16, 2025
Training

This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.

Register
Jan 21

Insider Threat Program Manager: Implementation and Operation

Jan 22-24, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Jan 21

Insider Threat Program Manager (ITPM) Certificate Package

Jan 22-24, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Jan 28

Probing the Limits: A Workshop on Red-Teaming AI Systems

Jan 28, 2025
Free
Hybrid Event
Online Access
Public
SEI Speaking
Register Now
Feb 10

Software Architecture Design and Analysis

Feb 11-14, 2025
Training

This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.

Register
Feb 18

Insider Risk Management: Measures of Effectiveness

Feb 19-21, 2025
Training

This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.

Register
Feb 18

Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package

Feb 19-21, 2025
Training

Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Feb 24

Insider Threat Program Manager (ITPM) Certificate Package

Feb 25-27, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Feb 24

Insider Threat Program Manager: Implementation and Operation

Feb 25-27, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Mar 3

Insider Threat Program Manager: Implementation and Operation

Mar 4-6, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Mar 3

Insider Threat Program Manager (ITPM) Certificate Package

Mar 4-6, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Mar 4

FloCon 2025

Mar 4, 2025 · 8AM-5PM (ET)
In-Person Event
Public
SEI Exhibiting
SEI Speaking
Register Now
Mar 17

Insider Threat Analyst

Mar 18-20, 2025
Training

This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.

Register
Mar 24

Creating a Computer Security Incident Response Team

Mar 25, 2025
Training

This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high level overview of the key issues and decisions that must be addressed when establishing a CSIRT.

Register
Mar 25

Managing Computer Security Incident Response Teams

Mar 26-28, 2025
Training

This 3-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face when operating an effective incident response team.

Register
Apr 7

Insider Threat Program Manager (ITPM) Certificate Package

Apr 8-10, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Apr 7

Insider Threat Program Manager: Implementation and Operation

Apr 8-10, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Apr 27

Documenting Software Architectures

Apr 28-May 1, 2025
Training

This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).

Register
Apr 28

RSA Conference 2025

Apr 28-May 1, 2025
In-Person Event
Public
SEI Exhibiting
SEI Speaking

At RSAC 2025, you're not just attending a conference—you're stepping into a vibrant, thriving community of thinkers, innovators, and achievers.

Come See Us
May 5

Insider Threat Analyst

May 6-8, 2025
Training

This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.

Register
May 5

Designing Modern Service-Based Systems

May 6, 2025
Training

SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.

Register
May 11

Design Guidelines and Patterns for Microservices

May 12-15, 2025
Training

This two-day course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.

Register
May 12

Foundations of Incident Management

May 13-16, 2025
Training

This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.

Register
Jun 9

Software Architecture Design and Analysis

Jun 10-13, 2025
Training

This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.

Register
Jun 23

Insider Threat Program Manager: Implementation and Operation

Jun 24-26, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Jun 23

Insider Threat Program Manager (ITPM) Certificate Package

Jun 24-26, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Jul 21

Insider Threat Program Manager (ITPM) Certificate Package

Jul 22-24, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Jul 21

Insider Threat Program Manager: Implementation and Operation

Jul 22-24, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Jul 28

Cybersecurity Oversight for the Business Executive

Jul 29-30, 2025
Training

This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.

Register
Aug 4

Insider Threat Program Manager: Implementation and Operation

Aug 5-7, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Aug 4

Insider Threat Program Manager (ITPM) Certificate Package

Aug 5-7, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Aug 11

Software Architecture Design and Analysis

Aug 12-15, 2025
Training

This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.

Register
Aug 17

Software Architecture: Principles and Practices

Aug 18-21, 2025
Training

This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.

Register
Sep 15

Insider Threat Program Manager (ITPM) Certificate Package

Sep 16-18, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Sep 15

Insider Threat Program Manager: Implementation and Operation

Sep 16-18, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Sep 22

Advanced Topics in Incident Handling

Sep 23-26, 2025
Training

This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.

Register
Oct 6

Developing a National or Government CSIRT

Oct 7-8, 2025
Training

This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT, discusses the basic components of CSIRTs in general, and highlights the characteristics that make national or government versions of CSIRTs unique.

Register
Oct 13

Software Architecture Design and Analysis

Oct 14-17, 2025
Training

This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.

Register
Oct 20

Insider Threat Program Manager (ITPM) Certificate Package

Oct 21-23, 2025
Training

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Oct 20

Insider Threat Program Manager: Implementation and Operation

Oct 21-23, 2025
Training

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Register
Oct 27

Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package

Oct 28-30, 2025
Training

Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Register
Oct 27

Insider Risk Management: Measures of Effectiveness

Oct 28-30, 2025
Training

This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.

Register
Nov 11

Risk Program Development - Governance and Appetite Workshop

Nov 12-13, 2025
Training

This 2-day course instructs attendees on constructing a risk management program within the three fundamental pillars of governance, appetite, and policy. Attendees will learn how best to structure decision-makers in the organization to gain the risk information they need to be more effective.

Register
Dec 1

Introduction to the CERT Resilience Management Model

Dec 2-3, 2025
Training

This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.

Register
Dec 8

Insider Threat Analyst

Dec 9-11, 2025
Training

This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.

Register

Press Inquiries

SEI Public Relations
Media Line: 412-268-4793
Email: public-relations@sei.cmu.edu