Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. How do you manage and document conflict, along with alternatives? In analyzing alternatives, you must consider risks. In this course, we'll look into how to analyze risk, evaluate risk, document risks, and use this information for prioritization of requirements. Qualitative and Quantitative approaches will be covered.
Este curso forma parte de Programa Especializado - Requirements Engineering: Secure Software Specifications
ofrecido por


Acerca de este Curso
ofrecido por

Sistema Universitario de Colorado
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Programa - QuƩ aprenderƔs en este curso
Risk Analysis, Assessment and Prioritization
Once requirements have been somewhat/mostly determined, we next need to go carefully through our work. This involves analyzing risk, assessing alternative plans, and prioritizing. In this module, we examine how to begin documenting conflicts and generating conflict resolution.
Dealing with Risk
Risk goes far beyond security. Most non-functional requirements are part of risk analysis. In this lesson, we discuss different types of risks, how they can be identified, and how to visualize a causal linking of failures, causes, and consequences using risk trees and cut-set trees.
Controlling Risk
In writing use cases and scenarios, we'll discover risk in the interactions. Interactions may happen out of order, to quickly or slowly, or not occur at all. In risk assessment, we assess the likelihood of risks and their severity, the likelihood of consequences, and thus, attempt to control high-priority risks.
Incorporating Risk Management into Your Process
Many approaches can be used to incorporate risk management into your software requirements engineering process. One is Defect Detection Prevention (DDP). We can also analyze alternatives qualitatively and quantitatively. We discuss Defect Detection Prevention, Value Cost Prioritization, and the Analytic Hierarchal Process in this module and how these techniques can be scaled for every day use.
ReseƱas
Principales reseƱas sobre SOFTWARE REQUIREMENTS PRIORITIZATION: RISK ANALYSIS
A solid course with some very interesting readings/papers selected. A good, concise, brief overview as to the domain of risk analysis with a particular emphasis on software engineering risks.
Excellent course. The information was presented clearly. The quizzes captured the essential points documented and stated by the instructor.
Thank you, the material provided is quite simple and easy to understand. Hopefully it will be useful in the future, amen.
Excellent course. Introduces legit techniques and tools. Some of the documents in the links are difficult reading.
Acerca de Programa especializado: Requirements Engineering: Secure Software Specifications
This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools.

Preguntas Frecuentes
¿CuÔndo podré acceder a las lecciones y tareas?
¿Qué recibiré si me suscribo a este Programa especializado?
Is financial aid available?
¿Tienes mÔs preguntas? Visita el Centro de Ayuda al Alumno.