CERT Training Courses
CERT Training Courses
Learn More About STEPfwd
STEPfwd is a virtual training environment that offers a rich library of cybersecurity and information assurance training.
CERT Training Courses
Insider Threat Certificates and Training
Our Insider Threat training and certificate programs are available for program managers, vulnerability assessors, and program evaluators.
CERT Training Courses
Secure Coding Certificates
Eliminate security vulnerabilities before products ship. Available for C and C++, and Java.
CERT Training Courses
Latest CERT Cybersecurity Training & Education Catalog
Download our updated catalog to learn about the courses and certificate programs we offer that help you tackle cybersecurity challenges.
Our Cybersecurity Certificates and Courses
Take our courses individually or earn a certificate by combining courses. We have flexible delivery options, which include classroom delivery in our Arlington, VA office, onsite delivery at customer facilities, synchronous delivery, and asynchronous delivery via the CERT STEPfwd environment.
Certificates
Formally acknowledge your professional accomplishments by earning one of our professional certificates in fields such as insider threat, digital forensics, and security management. You can benefit from the skills you acquire and the recognition the certificate provides in your continuing education and professional development. We currently offer the following certificates:
- CERT Certificate in Digital Forensics
- Insider Threat Program Manager (ITPM) Certificate
- Insider Threat Vulnerability Assessor (ITVA) Certificate
- Insider Threat Program Evaluator (ITPE) Certificate
- SEI Certificate in Incident Response Process
- SEI Certificate in Information Security
- CISO-Executive Certificate
- CERT Secure Coding in C and C++ Professional Certificate
- CERT Secure Coding in Java Professional Certificate
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials.
Courses by Topic
CERT training is offered in the following areas:
Incident Handling
Incident Handling training helps managers, project leaders, CSIRT staff, and computer forensic professionals to create and manage CSIRTs, prepares incident handlers to respond to system compromises at the administrator level, teaches technical staff the best practices they can use for analyzing malicious code, and describes tools and best practices that can be used to support organizations' incident response and forensic analysis investigations.
Courses
Network & Software Security
Network Security training provides technical staff members, engineers, software managers, and technical leads best practices and practical techniques for protecting the security of their organization's information assets and resources. Topics covered include the SQUARE methodology, secure coding in C and C++, and four critical software assurance areas--security requirements, software supply chain assurance, mission thread analysis, and measurement.
Courses
- Applied Cybersecurity, Incident Response and Forensics
- DevOps in Practice Workshop
- Information Security for Technical Staff
- Information Security for Technical Staff - eLearning
- Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth
- Secure Coding in C and C++
- Secure DevOps Process and Implementation
- CERT Secure Coding in C and C++ Professional Certificate
- CERT Secure Coding in Java Professional Certificate
- Secure Coding in Java
- Security Requirements Engineering Using the SQUARE Method
- Software Assurance Methods in Support of Cyber Security
- Vulnerability Response Capability Development
Risk Assessment & Insider Threat
Risk Assessment & Insider Threat training teaches managers, executives, security and business continuity professionals, risk managers, compliance personnel, and insider threat program managers to develop strategies for protecting their organizations from security threats, and to better manage their risks. Topics covered include the CERT Resilience Management Model (CERT-RMM), OCTAVE Allegro method, and insider threat program management best practices.
Courses
- Assessing Information Security Risk Using the OCTAVE Approach
- Assessing Information Security Risk Using the OCTAVE Approach - eLearning
- Building an Insider Threat Program
- CERT Resilience Management Model Appraisal Boot Camp
- CERT Resilience Management Model (CERT-RMM) Users Group Workshop Series
- Insider Threat Awareness Training
- Insider Threat Overview: Preventing, Detecting and Responding to Insider Threats
- Insider Threat Program Manager: Implementation and Operation
- Insider Threat Program Manager Certificate Examination
- Insider Threat Vulnerability Assessor Training
- Insider Threat Vulnerability Assessor Certificate Examination
- Introduction to the CERT Resilience Management Model
- Measuring What Matters: Security Metrics Workshop
- Practical Risk Management: Principles and Methods
- Twenty Questions to Assess Your Program's Chances of Success
- SGMM Navigator Training
Curricula
Be sure to take a look at other curricula:

- Legal
- Terms of Use
- Privacy Statement
- Intellectual Property
Contact Us