Acquisition training addresses the skills needed in a program office to manage software acquisition, enabling program managers to recognize the needs of their programs. These courses also present a broad range of from the traditional (continuous risk management, or CRM) to the leading edge (Mission Success in Complex Environments, or MSCE).
This 3 day live-delivery course enables attendees to understand basic Agile and lean concepts that developers use, but primarily focuses on introducing the interactions that government program offices can and should have with developers (either organic or contracted) who are using Agile team methods and the Scaled Agile Framework scaling approach to develop government systems. A combination of lecture, discussion, simulation, and short exercises are used to provide attendees with information that will translate into their work settings.
This hour-long course acquaints acquisition staff with key aspects of software-reliant systems acquisition. This course provides an overview of three fundamental software acquisition topics, Software Requirements, Software Architecture, and Software Testing.
This online course introduces risk management concepts and explains the 20 key drivers that comprise the SEI risk-based method for assessing complex projects, the Mission Diagnostic Protocol. This course explains what these drivers are and how the assessment of a program using the drivers creates a profile of a program's chances of success.
This set of webinars will provide basic information on why data rights are important, a risk-based method of helping to determine what rights are needed, and information on how to include data rights in your acquisitions.
This three-day course introduces participants to the unique challenges associated with acquiring software-intensive systems.
This two-day course provides the foundation for a more practical approach to risk management that builds from a straightforward, broad-view method to a complex array of techniques needed for in-depth analyses of complex risks. Through an interactive learning environment using discussion, examples, worksheets, and exercises, participants will be able to grasp the essentials of the practical, easy-to-use techniques.
This two day course covers the intersection of safety-, security-, and requirements engineering. Safety and security have a great deal in common with related concepts, analysis techniques, and goals, to protect valuable assets from unauthorized harm due to dangers (hazards and threats) which naturally suggest a risk-based approach to requirements analysis.
This course addresses the process and techniques that can be employed in the evaluation of commercial off-the-shelf (COTS) products in software-intensive systems.
This workshop introduces key concepts for acquisition in the context of systems of systems. The focus is on how to integrate classical program management activities, system development practices, operational activities, and sustainment into an effective set of practices to attain interoperable capability enabled by systems exchanging information and operating on that information according to specified, agreed-to operational semantics across systems of systems.