Acerca de este Curso
2,912 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 8 horas para completar

Sugerido: 4 weeks, 2-5 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 8 horas para completar

Sugerido: 4 weeks, 2-5 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Los estudiantes que toman este Course son

  • Business Analysts
  • Entrepreneurs
  • Data Engineers
  • Product Managers
  • Data Scientists

Programa - Qué aprenderás en este curso

Semana
1
4 horas para completar

Goal Creation

5 videos (Total 35 minutos), 3 lecturas, 3 cuestionarios
5 videos
Generating Goals6m
Goal Overview6m
High Level Goal Types6m
Low Level Goal Types8m
3 lecturas
Introduction to Goal Development and Language Conflict Analysis30m
Fuzzy goals for requirements-driven adaptation2h
Goal Development | Language Conflict Analysis |Goal Types - Slides10m
3 ejercicios de práctica
Module 1.1 Practice Quiz8m
Module 1.2 Practice Quiz6m
Module 1 Graded Quiz30m
Semana
2
5 horas para completar

Use, Misuse, and Abuse Cases

4 videos (Total 21 minutos), 4 lecturas, 3 cuestionarios
4 videos
The Use Case and Use Case Description7m
Misuse Cases for Security3m
Benefits of Misuse Cases5m
4 lecturas
Use Case | Description | ATM System - Slides8m
Eliciting security requirements with misuse cases2h
Misuse and abuse cases: Getting past the positive1h
Misuse Cases| Security Benefits - Slides8m
2 ejercicios de práctica
Module 2.1 Practice Quiz6m
Module 2.2 Practice Quiz6m
Semana
3
4 horas para completar

Group Sessions for Elicitation, Analysis, and Negotiation

4 videos (Total 17 minutos), 4 lecturas, 3 cuestionarios
4 videos
Group Sessions: Tips and Tricks4m
Structured and Unstructured Sessions3m
Group Session Benefits6m
4 lecturas
Group Sessions - Slides20m
JAD: Joint application design45m
QFD: Quality Function Deployment1h 30m
Structured & Unstructured Sessions | Group Session Benefits - Slides10m
3 ejercicios de práctica
Module 3.1 Practice Quiz6m
Module 3.2 Practice Quiz6m
Module 3 Graded Quiz30m
Semana
4
5 horas para completar

Finding Conflicts and Risks

3 videos (Total 14 minutos), 3 lecturas, 2 cuestionarios
3 videos
Dealing with Conflict4m
Goal Development and Language Conflict Summary1m
3 lecturas
Software Requirements Negotiation and Renegotiation Aids: A Theory-W Based Spiral Approach2h
Applying WinWin to quality requirements: a case study1h 30m
Inconsistency | Conflict | Boundary Condition - Slides10m
2 ejercicios de práctica
Module 4 Practice Quiz6m
Module 4 Graded Quiz30m

Instructor

Avatar

Kristen Walcott-Justice

Assistant Professor
Department of Computer Science

Acerca de Sistema Universitario de Colorado

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Acerca de Programa especializado Requirements Engineering: Secure Software Specifications

This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional degree in computer science, these courses will additionally give you a broad understanding of how requirements engineering is performed and help you get a first foot forward into your upcoming careers. The Software Requirements specialization focuses on traditional software requirements elicitation and writing techniques, while also looking at requirements from a security standpoint. In traditional methods, non-functional requirements, such as security, are often ignored overall. In this specialization, students will be introduced to ways of eliciting requirements from stakeholders, how to analyze these requirements, conduct risk mitigation and analysis, prioritize requirements, document, and bring security concerns into the software lifecycle early on....
Requirements Engineering: Secure Software  Specifications

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.