Acerca de este Curso
4.6
16 ratings
Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. How do you manage and document conflict, along with alternatives? In analyzing alternatives, you must consider risks. In this course, we'll look into how to analyze risk, evaluate risk, document risks, and use this information for prioritization of requirements. Qualitative and Quantitative approaches will be covered....
Globe

Cursos 100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Calendar

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Beginner Level

Nivel principiante

Clock

Sugerido: 4 weeks, 1-2 hours per week

Aprox. 4 horas para completar
Comment Dots

English

Subtítulos: English
Globe

Cursos 100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Calendar

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Beginner Level

Nivel principiante

Clock

Sugerido: 4 weeks, 1-2 hours per week

Aprox. 4 horas para completar
Comment Dots

English

Subtítulos: English

Programa - Qué aprenderás en este curso

1

Sección
Clock
4 horas para completar

Risk Analysis, Assessment and Prioritization

Once requirements have been somewhat/mostly determined, we next need to go carefully through our work. This involves analyzing risk, assessing alternative plans, and prioritizing. In this module, we examine how to begin documenting conflicts and generating conflict resolution. ...
Reading
3 videos (Total: 16 min), 2 readings, 3 quizzes
Video3 videos
Documenting Conflicts6m
Generating Conflict Resolution5m
Reading2 lecturas
Introduction | Documenting Conflicts | Conflict Resolution - Slides30m
Bringing Security into Risk Analysism
Quiz3 ejercicios de práctica
Module 1.1 Practice Quiz6m
Module 1.2 Practice Quiz6m
Managing Conflicts30m

2

Sección
Clock
4 horas para completar

Dealing with Risk

Risk goes far beyond security. Most non-functional requirements are part of risk analysis. In this lesson, we discuss different types of risks, how they can be identified, and how to visualize a causal linking of failures, causes, and consequences using risk trees and cut-set trees....
Reading
2 videos (Total: 12 min), 3 readings, 2 quizzes
Video2 videos
Risk and Cut-Set Trees4m
Reading3 lecturas
A risk taxonomy proposal for software maintenancem
What is Risk? A taxonomy documentm
What is a Risk? |Cut-Set Trees - Slides30m
Quiz2 ejercicios de práctica
Module 2 Practice Quiz6m
Dealing with Risk30m

3

Sección
Clock
2 horas para completar

Controlling Risk

In writing use cases and scenarios, we'll discover risk in the interactions. Interactions may happen out of order, to quickly or slowly, or not occur at all. In risk assessment, we assess the likelihood of risks and their severity, the likelihood of consequences, and thus, attempt to control high-priority risks. ...
Reading
2 videos (Total: 11 min), 2 readings, 2 quizzes
Video2 videos
Risk Control and Countermeasures5m
Reading2 lecturas
Software risk management: principles and practicesm
Risk Assessment | Risk Control and Countermeasures - Slides30m
Quiz2 ejercicios de práctica
Module 3 Practice Quiz6m
Controlling Risk30m

4

Sección
Clock
5 horas para completar

Incorporating Risk Management into Your Process

Many approaches can be used to incorporate risk management into your software requirements engineering process. One is Defect Detection Prevention (DDP). We can also analyze alternatives qualitatively and quantitatively. We discuss Defect Detection Prevention, Value Cost Prioritization, and the Analytic Hierarchal Process in this module and how these techniques can be scaled for every day use. ...
Reading
4 videos (Total: 27 min), 4 readings, 3 quizzes
Video4 videos
Evaluating Alternatives3m
Quantitative Risk Prioritization: Analytic Hierarchic Process13m
Risk Analysis, Assessment, and Prioritization Conclusions... and Reminders1m
Reading4 lecturas
Risk-Driven Revision of Requirements Modelsm
AHP using Excel11m
Reducing the cost of AHP using Machine Learning30m
Risk Management through Analysis, Assessment, Prioritization | Conclusions - Slides10m
Quiz3 ejercicios de práctica
Module 4.1 Practice Quiz6m
Module 4.2 Practice Quiz6m
Risk Management30m

Instructor

Kristen Walcott-Justice

Assistant Professor
Department of Computer Science

Acerca de University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Acerca del programa especializado Requirements Engineering: Secure Software Specifications

This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional degree in computer science, these courses will additionally give you a broad understanding of how requirements engineering is performed and help you get a first foot forward into your upcoming careers. The Software Requirements specialization focuses on traditional software requirements elicitation and writing techniques, while also looking at requirements from a security standpoint. In traditional methods, non-functional requirements, such as security, are often ignored overall. In this specialization, students will be introduced to ways of eliciting requirements from stakeholders, how to analyze these requirements, conduct risk mitigation and analysis, prioritize requirements, document, and bring security concerns into the software lifecycle early on....
Requirements Engineering: Secure Software  Specifications

Preguntas Frecuentes

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.