Training Courses
Training courses, workshops, and seminars help transition SEI technology and research to the broader community, disseminating recent advances relevant to our mission.
Learn more about the new CERT Applied Data Science for Cybersecurity Professional Certificate:
To learn how data science and machine learning address cybersecurity challenges, watch this webcast.
Important Notice
Carnegie Mellon University/Software Engineering Institute offices will be closed for winter break, December 21, 2024-January 1, 2025. SEI course registrations received during this period will be confirmed and enrollment completed upon our return on January 2, 2025.
Take Our Survey
Please take our quick, 5-question SEI-AI Training Survey; help guide future professional development training from the SEI.
Featured Courses
Knowledge and Techniques That You Can Apply Today
SEI courses, workshops, and seminars are created and delivered by recognized experts who have practical experience in the disciplines they teach. Our courses feature hands-on tasks and real-world scenarios. In just a matter of days, you’ll be more informed and ready to perform at a higher level.
Professional Development and Workforce Development
Whether you want to learn at your own pace online, experience the networking opportunities of our classroom facilities, or develop your workforce by bringing our instructors on-site, SEI courses give you the tools you need to create and maintain software, systems, and organizations that are efficient, secure, and reliable. Organizations can help their workforce gain competencies in software development, software acquisition, and cybersecurity.
Delivery Methods
Classroom Training
The SEI has training facilities in its offices in Pittsburgh, Pennsylvania, and Arlington, Virginia.
Classroom Training Review COVID GuidanceLive-Online
The SEI's online learning platforms provide expert instruction as well as exercises, assessments, and other resources. Our live-online training offers synchronous learning where you and your instructor can interact during classes.
LIVE-ONLINE TRAININGOn-Site
All SEI training can be brought to your site for a qualified group of students. This approach is typically cost effective for groups of eight or more students. In some cases, courses can be offered in a workshop format to increase student participation and address the specific challenges facing your team.
ASK ABOUT ON-SITE TRAININGCourse List
Filter by
AADL in Practice Workshop
Software Architecture, Cyber Workforce Development
The AADL in Practice Workshop, a comprehensive program that combines AADL training and an AADL modeling workshop, is designed to provide practical knowledge and an opportunity to practice skills in a realistic setting.
Advanced Analytics: Digital Forensics
ONLINE • Artificial Intelligence Engineering, Cybersecurity Engineering
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of netflow, malware, and digital forensics data.
Advanced Analytics: Malware
ONLINE • Artificial Intelligence Engineering, Reverse Engineering for Malware Analysis
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of netflow, malware, and digital forensics data.
Advanced Analytics: Netflow
ONLINE • Artificial Intelligence Engineering, Cybersecurity Engineering
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of NetFlow, malware, and digital forensics data.
Advanced Topics in Incident Handling
Cybersecurity Center Development
This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.
Agile Adoption Readiness and Fit Workshop
Agile, Cyber Workforce Development
This 2-day workshop leverages the SEI Readiness and Fit Analysis (RFA) technique to help people involved in systems of systems from all enterprise levels make explicit the adoption risks related to an Agile governance or acquisition approach.
Agile in Government: Concepts for Senior Executives
Agile, Cyber Workforce Development
This 2-4 hour tutorial is designed for a small group of senior executives in a program or enterprise who are contemplating or are already in progress with the adoption of Agile approaches in the organization within their purview.
Agile in Government: Practical Considerations
Agile, Cyber Workforce Development
This 1-2 day live-delivery tutorial enables attendees to understand basic Agile concepts that developers use and focuses on introducing the interactions government program offices can and should have with developers using Agile methods to develop government systems.
Agile Requirements Elicitation Workshop
Agile, Cyber Workforce Development
This 2-day workshop aims to capitalize on pre-existing work on requirements for the system in question, bringing information into a consistent form, filling gaps in requirements when uncovered, and paying attention to non-functional architectural drivers.
Agile Requirements Prioritization Workshop
Agile, Cyber Workforce Development
Requirements prioritization, especially for an Agile development effort, is a crucial step before development. This 1-day workshop aims to teach members of an organization how to prioritize requirements using their own requirements for a development effort.
Agile Virtual Schoolhouse
Agile, Cyber Workforce Development
Each SEI Agile Virtual Schoolhouse delivery is tailored to meet the audience's learning and organizational goals. We recommend virtual learning begins by introducing the Agile/Lean principles that inform organizational change and then building upon those fundamentals by exploring how to implement principles into software-intensive programs.
Assessing Information Security Risk Using the OCTAVE Approach - eLearning
ONLINE • Enterprise Risk and Resilience Management
Through 27 video lectures the course covers the OCTAVE-prescribed activities for risk identification, analysis, and response.
Building an Insider Threat Program
ONLINE • Insider Threat
This 7-hour online course provides a thorough understanding of insider threat program organizational models, essential components for effectiveness, key stakeholder involvement, and basic implementation guidance.
CERT Applied Data Science for Cybersecurity Certificate Examination
ONLINE • Artificial Intelligence Engineering, Cybersecurity Engineering
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of NetFlow, malware, and digital forensics data.
CERT Applied Data Science for Cybersecurity Certificate Package
ONLINE • Artificial Intelligence Engineering, Cybersecurity Engineering
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity.
CERT Certificate in Digital Forensics
ONLINE • Situational Awareness, Cyber Workforce Development
The CERT Certificate in Digital Forensics is designed to familiarize experienced system and network computer professionals with the essential elements of digital forensics and build on their existing technical skill set. Completion of this Professional Certificate will prepare administrators to approach both routine and unusual events in a systematic forensic manner.
CERT Cybersecurity Engineering and Software Assurance Professional Certificate
ONLINE • Cybersecurity Engineering, Cyber Workforce Development
The CERT Cybersecurity Engineering and Software Assurance Professional Certificate program targets software-reliant systems engineering and acquisition activities to infuse an awareness of cybersecurity and an approach to identifying security requirements, engineering risks, and supply chain risks early in the lifecycle.
CERT Cybersecurity Leadership Examination
ONLINE • Cybersecurity Engineering, Cyber Workforce Development
The CERT Cybersecurity Leadership Examination objectively assesses the student's understanding of cybersecurity principles that reflect basic awareness and knowledge of cybersecurity within the context of a business organization and from the perspective of organizational leadership.
CERT Secure Coding in C and C++ Professional Certificate
ONLINE • Secure Development, Cyber Workforce Development
The CERT Secure Coding in C and C++ Professional Certificate provides software developers with practical instruction based upon the CERT Secure Coding Standards.
CERT Secure Coding in Java Professional Certificate
ONLINE • Secure Development, Cyber Workforce Development
The CERT Secure Coding in Java Professional Certificate, taught by the CERT Secure Coding team, provides software developers with practical instruction on the essentials of designing and developing secure software in Java.
Creating a Computer Security Incident Response Team
Cybersecurity Center Development, Cyber Workforce Development
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high level overview of the key issues and decisions that must be addressed when establishing a CSIRT.
Cyber Intelligence for Decision Makers
ONLINE • Situational Awareness, Cyber Workforce Development
This course presents a non-technical approach to cyber intelligence for organizational managers and decision-makers. It explains the important contextual understanding of cyber intelligence with regard to your organization and the organizational roles and competencies involved.
Cybersecurity Oversight for the Business Executive
Situational Awareness, Cybersecurity Engineering
This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.
Design Guidelines and Patterns for Microservices
Software Architecture, Cyber Workforce Development
This two-day course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.
Designing Modern Service-Based Systems
Software Architecture, Cyber Workforce Development
SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.
Developing a National or Government CSIRT
Cybersecurity Center Development, Cyber Workforce Development
This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT, discusses the basic components of CSIRTs in general, and highlights the characteristics that make national or government versions of CSIRTs unique.
DevSecOps Process and Implementation
DevSecOps, Agile
DevOps is a set of software development principles that emphasize collaboration, communication, and automation among all stakeholders, including IT operations, testers, developers, customers, and security personnel at the inception of a project.
Documenting Software Architectures
Software Architecture, Cyber Workforce Development
This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
Documenting Software Architectures - eLearning
ONLINE • Software Architecture, Cyber Workforce Development
This eLearning course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
Examination of Software Architecture: Principles and Practices
ONLINE • Software Architecture, Cyber Workforce Development
To maintain high standards in software architecture, the SEI validates students' understanding before awarding professional certificates. This exam is mandatory for those seeking the SEI Software Architecture Professional Certificate and Service-Based Architecture Professional Certificate.
Foundations of Incident Management
Cybersecurity Center Development, Situational Awareness
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
Fundamentals of Statistics Applied to Cybersecurity
ONLINE • Artificial Intelligence Engineering, Cybersecurity Engineering
This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity.
Insider Risk Management: Measures of Effectiveness
Insider Threat, Enterprise Risk and Resilience Management
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
Insider Risk Management Measures of Effectiveness Certificate Examination
ONLINE • Insider Threat, Enterprise Risk and Resilience Management
The Insider Risk Management Measures of Effectiveness Certificate Examination is an objective evaluation of your understanding of the best practices for measuring Insider Threat risk. It is required for conferral of the Software Engineering Institute's Insider Risk Management Measures of Effectiveness Professional Certificate.
Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Insider Threat, Enterprise Risk and Resilience Management
Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
Insider Threat Analyst
Insider Threat, Situational Awareness
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
Insider Threat Awareness Training
ONLINE • Insider Threat, Situational Awareness
This one-hour course provides a basic understanding of insider threats within an organization, explains how insider threats can target you, and outlines employees' responsibilities to protect an organization's critical assets.
Insider Threat Program Manager Certificate Examination
ONLINE • Insider Threat, Cyber Workforce Development
To ensure continued excellence in Insider Threat program development, implementation, and operation, the SEI objectively validates the student's understanding and eligibility to receive the Insider Threat Program Manager (ITPM) Certificate.
Insider Threat Program Manager: Implementation and Operation
Insider Threat, Cyber Workforce Development
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
Insider Threat Program Manager (ITPM) Certificate Package
Insider Threat, Cyber Workforce Development
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
Introduction to the CERT Resilience Management Model
Insider Threat, Enterprise Risk and Resilience Management
This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.
Leading SAFe/Agile in Government
Agile, Cyber Workforce Development
This 3-day course offers participants a foundational understanding of Agile concepts developers use and focuses on interactions that government program offices should have with developers who utilize Agile methodologies, particularly the Scaled Agile Framework scaling approach to develop government systems.
Managing Computer Security Incident Response Teams
Cybersecurity Center Development, Cyber Workforce Development
This 3-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face when operating an effective incident response team.
Managing Technical Debt of Software
Software Architecture, Technical Debt
This 1-day course presents approaches to assess the technical debt landscape and teaches mechanisms by which it can be intentionally managed. The course uses an easy-to-understand analogy with an investment strategy to encourage active technical debt management and foster dialogue between the business and technical decision-makers.
Modeling System Architectures Using the Architecture Analysis and Design Language (AADL)
Software Architecture, Model-Based Systems Engineering
This 4-day course builds on the SAE AADL standard and focuses on fundamental MBE concepts for engineering real-time, embedded software systems through defining and documenting software and system architecture.
Modeling System Architectures Using the Architecture Analysis and Design Language (AADL) - eLearning
ONLINE • Software Architecture, Model-Based Systems Engineering
This eLearning course builds on the SAE AADL standard and focuses on fundamental MBE concepts for engineering real-time, embedded software systems through defining and documenting software and system architecture.
Overview of Creating and Managing CSIRTs - eLearning
ONLINE • Cybersecurity Center Development, Cyber Workforce Development
This 3-hour course provides a consolidated overview of information in the Creating a CSIRT and Managing CSIRTs courses. It highlights best practices in planning, implementing, operating, and evaluating a computer security incident response team (CSIRT).
Overview of Insider Threat Concepts and Activities
ONLINE • Insider Threat, Enterprise Risk and Resilience Management
This 3-hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators, and outlines mitigation strategies.
Risk Program Development - Governance and Appetite Workshop
Insider Threat
This 2-day course instructs attendees on constructing a risk management program within the three fundamental pillars of governance, appetite, and policy. Attendees will learn how best to structure decision-makers in the organization to gain the risk information they need to be more effective.
Secure Coding in C and C++
Secure Development, Cyber Workforce Development
This 4-day course provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation.
Secure Coding in Java
Secure Development, Cyber Workforce Development
This 4-day course provides a detailed explanation of common programming errors in Java and describes how these errors can lead to code that is vulnerable to exploitation.
Secure DevOps Process and Implementation
ONLINE • DevSecOps, Agile
This 4.5-hour virtual, asynchronous course, designed for managers, developers, and operational teams, offers comprehensive DevOps principles and processes training. This course will expose attendees to reference architectures and use cases on Continuous Integration (CI) tools and practices, including technical demonstrations and practical scenarios.
Software Architecture Design and Analysis
Software Architecture, Cyber Workforce Development
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
Software Architecture: Principles and Practices
Software Architecture, Cyber Workforce Development
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
Software Architecture: Principles and Practices - eLearning
ONLINE • Software Architecture, Cyber Workforce Development
This eLearning course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
Understanding Software Architecture, Quality, and Security Through Code Analysis
ONLINE • Software Architecture, Secure Development
This 3.5-hour eLearning course introduces what distinguishes high-quality code and how to achieve it better using static and dynamic analysis, coding standards, metrics, and more. While primarily technical, the course also shows how understanding code analysis basics is key to acquisition success.
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.