icon-carat-right menu search cmu-wordmark

Classroom Training

By participating in SEI classroom training, professionals prepare for the next steps in their careers and lives. Most importantly, they return to their organizations with fresh ideas, new business skills, and a greater capacity for addressing the challenges their organizations face.

Course Registration Questions?

E-mail: courseregistration@sei.cmu.edu

Phone: 412-268-7388

Lodging

Registrants are responsible for arranging their own travel and accommodations. The SEI has standard lodging recommendations for courses, workshops, and seminars held at the SEI offices in Pittsburgh, Pennsylvania, and Arlington, Virginia. For training events at other locations, the SEI sends travel and lodging information in the confirmation email sent to registrants.

Business Casual

We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.

What to Bring

See course descriptions for the recommended and required equipment and materials needed for each course.

We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.

Photo of downtown Pittsburgh from the North Side

Accessibility

Carnegie Mellon University (CMU) makes every effort to provide accessible facilities and programs for individuals with disabilities. To arrange accommodations/services, please contact the SEI by email (course-info@sei.cmu.edu) or telephone (412-268-1817) at least three weeks prior to the course start date. CMU may not be able to provide an accommodation without sufficient notice.

Course List

Filter by

Advanced Topics in Incident Handling

Cybersecurity Center Development

This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.

Classroom Live-Online Onsite
LEARN MORE

Creating a Computer Security Incident Response Team

Cybersecurity Center Development, Cyber Workforce Development

This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high level overview of the key issues and decisions that must be addressed when establishing a CSIRT.

Classroom Live-Online Onsite
LEARN MORE

Cybersecurity Oversight for the Business Executive

Situational Awareness, Cybersecurity Engineering

This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.

Classroom Live-Online Onsite
LEARN MORE

Design Guidelines and Patterns for Microservices

Software Architecture, Cyber Workforce Development

This two-day course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.

Classroom Live-Online Onsite
LEARN MORE

Designing Modern Service-Based Systems

Software Architecture, Cyber Workforce Development

SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.

Classroom Live-Online Onsite
LEARN MORE

Developing a National or Government CSIRT

Cybersecurity Center Development, Cyber Workforce Development

This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT, discusses the basic components of CSIRTs in general, and highlights the characteristics that make national or government versions of CSIRTs unique.

Classroom Live-Online Onsite
LEARN MORE

Documenting Software Architectures

Software Architecture, Cyber Workforce Development

This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).

Classroom Live-Online Onsite
LEARN MORE

Foundations of Incident Management

Cybersecurity Center Development, Situational Awareness

This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.

Classroom Live-Online Onsite
LEARN MORE

Insider Risk Management: Measures of Effectiveness

Insider Threat, Enterprise Risk and Resilience Management

This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.

Classroom Live-Online Onsite
LEARN MORE

Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package

Insider Threat, Enterprise Risk and Resilience Management

Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Classroom Live-Online Onsite
LEARN MORE

Insider Threat Analyst

Insider Threat, Situational Awareness

This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.

Live-Online Classroom Onsite
LEARN MORE

Insider Threat Program Manager: Implementation and Operation

Insider Threat, Cyber Workforce Development

This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.

Live-Online Onsite Classroom
LEARN MORE

Insider Threat Program Manager (ITPM) Certificate Package

Insider Threat, Cyber Workforce Development

Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.

Classroom Onsite Live-Online
LEARN MORE

Introduction to the CERT Resilience Management Model

Insider Threat, Enterprise Risk and Resilience Management

This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.

Onsite Classroom
LEARN MORE

Managing Computer Security Incident Response Teams

Cybersecurity Center Development, Cyber Workforce Development

This 3-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face when operating an effective incident response team.

Classroom Live-Online Onsite
LEARN MORE

Risk Program Development - Governance and Appetite Workshop

Insider Threat

This 2-day course instructs attendees on constructing a risk management program within the three fundamental pillars of governance, appetite, and policy. Attendees will learn how best to structure decision-makers in the organization to gain the risk information they need to be more effective.

Classroom Onsite
LEARN MORE

Software Architecture Design and Analysis

Software Architecture, Cyber Workforce Development

This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.

Classroom Live-Online Onsite
LEARN MORE

Software Architecture: Principles and Practices

Software Architecture, Cyber Workforce Development

This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.

Classroom Live-Online Onsite
LEARN MORE

    Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.