Training and Developmental Courses


Support for a vibrant domestic manufacturing sector, a solid defense industrial base, and resilient supply chains is a national priority. KBR is ready to meet this mission by providing top-rated developmental workshops and courses geared toward leadership and digital innovation.

Training Opportunities:

KBR offers a variety of cutting-edge education and consulting services based on its extensive digital modernization capabilities and expertise. Some courses are already built out and others are up-and-coming or can be requested based on necessity or desire. Our goal is to mold warriors capable of adapting to any contingency!

Course Examples

Acquisition Instructor Course (AQIC)

This course prepares acquisition officers, engineers, program managers, and support staff to be change agents in the Air Force (AF). AQIC graduates will become expert instructors, learning how to facilitate tactical acquisition skills to acquirers and operators. By integrating acquisitions into the weapons school, this strategy helps to bridge the gap between the warfighter (operators) and acquisition professionals. Students will learn to remove typical functional stovepipes to provide integrated requirement and system development.

Defense Business Systems (DBS) Workshop

The Defense Business Systems (DBS) Workshop is designed to provide valuable educational material for the mid-grade DBS program management office (PMO) staff. The acquisition of business systems will be aligned to commercial or government best practices and will minimize the need for customization of commercial products to the maximum extent practicable. Thorough industry analysis and market research of both process and information technology (IT) are expected.

Practical Approach to Agile Software Development, DevOps and DevSecOps or Weapons System Acquisition

This course provides a comprehensive education in application-level agile; DevOps and DevSecOps; the iterative approach employed in agile; the application of agile and its impact on software development life cycles (SDLC); enterprise implementation; system integration; and program collaboration, such as lesson learned to date in implementation across the Air Force and DoD.

New & Upcoming

Project Execution for Program Managers

Provide AF program managers with tools and techniques to:

  • Apply project health status, forecasting, and recovery concepts
  • Enhance earned value management; particularly variances and Estimate at Completion (EAC)
  • Upgrade integrated master schedule development and analysis
  • Strengthen Program Evaluation and Review Technique (PERT) and Critical Path Method (CRP) methods of schedule development
  • Schedule health and risk assessments
  • Support systems engineering
  • Schedule recovery options (i.e. crashing and fast-tracking)
  • Reprogramming, re-baselining and other recovery options

Supply Chain Risk Management (SCRM)

Provide leads with tools and techniques to:

  • Understanding SCRM
  • Understanding cybersecurity for SCRM
  • Applying knowledge for the creation of a SCRM team

Expected Outcomes:

KBR’s courses aid in each students’ understanding and practical application of strategic methodologies and skillsets. Training offers expert insight and guidance based on decades of experience, which will help students implement modernized solutions and solve problems in the real-world development life cycle.

“Cultivating a lethal, agile force requires more than just new technologies and posture changes; it depends on the ability of our warfighters and the department workforce to integrate new capabilities, adapt warfighting approaches, and change business practices to achieve mission success.”

– Jim Mattis, SECDEF (2018)

Why is Training Necessary?

Educational Need

Knowledge of Agile Software Development (ASD) within the AF acquisition career fields vary widely, based on the general lack of training and education within DoD. Although ASD has been around for decades, usage in DoD and experience levels in ASD have varied. Nearly 100 programs reported using some form of ASD (e.g., Scrum, Kanban, Extreme Programming, SAFe, etc.) with nearly 1,000 acquisition and sustainment personnel impacted. Some acquisition personnel have become skilled in applying ASD, mainly in the software maintenance groups working on software development and modification.

Adversarial Threats

Adversarial threats attack every aspect of the development lifecycle and supply chain:

  • Cybersecurity-malicious insertion
  • Physical tampering/chain of custody/counterfeits parts
  • Theft of intellectual or physical property
  • Sabotage, terrorism, crime, and war

© 2021 Kellogg Brown & Root LLC. All rights reserved. Terms of Use | Privacy Policy | Accessibility | Cookies Disclosure Statement