Classroom Training
By participating in SEI classroom training, professionals prepare for the next steps in their careers and lives. Most importantly, they return to their organizations with fresh ideas, new business skills, and a greater capacity for addressing the challenges their organizations face.
Lodging
Registrants are responsible for arranging their own travel and accommodations. The SEI has standard lodging recommendations for courses, workshops, and seminars held at the SEI offices in Pittsburgh, Pennsylvania, and Arlington, Virginia. For training events at other locations, the SEI sends travel and lodging information in the confirmation email sent to registrants.
Business Casual
We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.
What to Bring
See course descriptions for the recommended and required equipment and materials needed for each course.
We recommend business casual attire. You need not wear a suit. Choose clothing that allows you to be comfortable participating in training at a place of business. Training room temperatures may be too cool for some participants. We suggest bringing a sweater.
Accessibility
Carnegie Mellon University (CMU) makes every effort to provide accessible facilities and programs for individuals with disabilities. To arrange accommodations/services, please contact the SEI by email (course-info@sei.cmu.edu) or telephone (412-268-1817) at least three weeks prior to the course start date. CMU may not be able to provide an accommodation without sufficient notice.
Course List
Filter by
Advanced Topics in Incident Handling
Cybersecurity Center Development
This four-day course, designed for computer security incident response team and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks.
Creating a Computer Security Incident Response Team
Cybersecurity Center Development, Cyber Workforce Development
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high level overview of the key issues and decisions that must be addressed when establishing a CSIRT.
Cybersecurity Oversight for the Business Executive
Situational Awareness, Cybersecurity Engineering
This 2-day course, targeted towards today's business executive, examines the dynamic intersection of business and technology.
Design Guidelines and Patterns for Microservices
Software Architecture, Cyber Workforce Development
This two-day course will give you the knowledge to see the microservices landscape clearly. We will cover six guidelines for microservice designs and look at strategies available today to realize each design guideline, including design patterns, architecture tactics, and infrastructure elements.
Designing Modern Service-Based Systems
Software Architecture, Cyber Workforce Development
SOA, now a cornerstone of modern distributed systems, focuses on microservices, messaging, and container orchestration. This course explores essential tools like REST, gRPC, message brokers, and API gateways, along with security and containerization for microservices.
Developing a National or Government CSIRT
Cybersecurity Center Development, Cyber Workforce Development
This course focuses on the key decisions and considerations encountered when developing a national or government CSIRT, discusses the basic components of CSIRTs in general, and highlights the characteristics that make national or government versions of CSIRTs unique.
Documenting Software Architectures
Software Architecture, Cyber Workforce Development
This 4-day course covers effective software architecture documentation practices for all stakeholders, incorporating models like Rational Unified Process (RUP), Siemens Four Views, ISO/IEC 42010 standard, and Unified Modeling Language (UML).
Foundations of Incident Management
Cybersecurity Center Development, Situational Awareness
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
Insider Risk Management: Measures of Effectiveness
Insider Threat, Enterprise Risk and Resilience Management
This 3-day, instructor-led course focuses on developing skills to assess an organization's insider threat capabilities, evaluate insider threat programs, determine the maturity of insider risk management processes, and create tailored metrics for program operations.
Insider Risk Management Measures of Effectiveness (IRM-MoE) Certificate Package
Insider Threat, Enterprise Risk and Resilience Management
Students who wish to purchase the Insider Risk Management Measures of Effectiveness (IRM-MoE) certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
Insider Threat Analyst
Insider Threat, Situational Awareness
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
Insider Threat Program Manager: Implementation and Operation
Insider Threat, Cyber Workforce Development
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
Insider Threat Program Manager (ITPM) Certificate Package
Insider Threat, Cyber Workforce Development
Students who wish to purchase the certificate program package (two eLearning courses, instructor-led course, certificate exam) will receive a discount from the total cost. The program packages correspond with scheduled course dates, so select the program package that best meets your scheduling needs.
Introduction to the CERT Resilience Management Model
Insider Threat, Enterprise Risk and Resilience Management
This 2-day course introduces a model-based process improvement approach to managing operational resilience using the CERT Resilience Management Model (CERT-RMM) v1.2.
Managing Computer Security Incident Response Teams
Cybersecurity Center Development, Cyber Workforce Development
This 3-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face when operating an effective incident response team.
Risk Program Development - Governance and Appetite Workshop
Insider Threat
This 2-day course instructs attendees on constructing a risk management program within the three fundamental pillars of governance, appetite, and policy. Attendees will learn how best to structure decision-makers in the organization to gain the risk information they need to be more effective.
Software Architecture Design and Analysis
Software Architecture, Cyber Workforce Development
This two-day course, based on the books Designing Software Architectures: A Practical Approach and Software Architecture in Practice, 3rd edition, provides in-depth coverage of the concepts needed to design and analyze a software architecture effectively.
Software Architecture: Principles and Practices
Software Architecture, Cyber Workforce Development
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.