Acquisition training addresses the skills needed in a program office to manage software acquisition, enabling program managers to recognize the needs of their programs. These courses also present a broad range of from the traditional (continuous risk management, or CRM) to the leading edge (Mission Success in Complex Environments, or MSCE).
This hour-long course acquaints acquisition staff with key aspects of software-reliant systems acquisition. This course provides an overview of three fundamental software acquisition topics, Software Requirements, Software Architecture, and Software Testing.
This introductory online course presents an overview of key issues and lessons learned in applying Agile development methods in the DoD environment based on actual DoD program experience and extensive research. This course debunks the myth that Agile and DoD practices are incompatible and provides considerations for deciding when to use Agile.
This online course introduces risk management concepts and explains the 20 key drivers that comprise the SEI risk-based method for assessing complex projects, the Mission Diagnostic Protocol. This course explains what these drivers are and how the assessment of a program using the drivers creates a profile of a program's chances of success.
This set of webinars will provide basic information on why data rights are important, a risk-based method of helping to determine what rights are needed, and information on how to include data rights in your acquisitions.
This three-day course introduces participants to the unique challenges associated with acquiring software-intensive systems.
This two-day course provides the foundation for a more practical approach to risk management that builds from a straightforward, broad-view method to a complex array of techniques needed for in-depth analyses of complex risks. Through an interactive learning environment using discussion, examples, worksheets, and exercises, participants will be able to grasp the essentials of the practical, easy-to-use techniques.
This two day course covers the intersection of safety-, security-, and requirements engineering. Safety and security have a great deal in common with related concepts, analysis techniques, and goals, to protect valuable assets from unauthorized harm due to dangers (hazards and threats) which naturally suggest a risk-based approach to requirements analysis.
This course addresses the process and techniques that can be employed in the evaluation of commercial off-the-shelf (COTS) products in software-intensive systems.
This workshop introduces key concepts for acquisition in the context of systems of systems. The focus is on how to integrate classical program management activities, system development practices, operational activities, and sustainment into an effective set of practices to attain interoperable capability enabled by systems exchanging information and operating on that information according to specified, agreed-to operational semantics across systems of systems.
Please tell us what you
think with this short
(< 5 minute) survey.