Informações sobre o curso

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 5 horas para completar

Sugerido: 4 weeks, 1-2 hours per week...

Inglês

Legendas: Inglês

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 5 horas para completar

Sugerido: 4 weeks, 1-2 hours per week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
4 horas para concluir

Risk Analysis, Assessment and Prioritization

Once requirements have been somewhat/mostly determined, we next need to go carefully through our work. This involves analyzing risk, assessing alternative plans, and prioritizing. In this module, we examine how to begin documenting conflicts and generating conflict resolution.

...
3 vídeos ((Total 16 mín.)), 2 leituras, 3 testes
3 videos
Documenting Conflicts6min
Generating Conflict Resolution5min
2 leituras
Introduction | Documenting Conflicts | Conflict Resolution - Slides30min
Bringing Security into Risk Analysis2h
3 exercícios práticos
Module 1.1 Practice Quiz6min
Module 1.2 Practice Quiz6min
Managing Conflicts30min
Semana
2
4 horas para concluir

Dealing with Risk

Risk goes far beyond security. Most non-functional requirements are part of risk analysis. In this lesson, we discuss different types of risks, how they can be identified, and how to visualize a causal linking of failures, causes, and consequences using risk trees and cut-set trees.

...
2 vídeos ((Total 12 mín.)), 3 leituras, 2 testes
2 videos
Risk and Cut-Set Trees4min
3 leituras
A risk taxonomy proposal for software maintenance2h
What is Risk? A taxonomy document1h
What is a Risk? |Cut-Set Trees - Slides30min
2 exercícios práticos
Module 2 Practice Quiz6min
Dealing with Risk30min
Semana
3
2 horas para concluir

Controlling Risk

In writing use cases and scenarios, we'll discover risk in the interactions. Interactions may happen out of order, to quickly or slowly, or not occur at all. In risk assessment, we assess the likelihood of risks and their severity, the likelihood of consequences, and thus, attempt to control high-priority risks.

...
2 vídeos ((Total 11 mín.)), 2 leituras, 2 testes
2 videos
Risk Control and Countermeasures5min
2 leituras
Software risk management: principles and practices1h
Risk Assessment | Risk Control and Countermeasures - Slides30min
2 exercícios práticos
Module 3 Practice Quiz6min
Controlling Risk30min
Semana
4
5 horas para concluir

Incorporating Risk Management into Your Process

Many approaches can be used to incorporate risk management into your software requirements engineering process. One is Defect Detection Prevention (DDP). We can also analyze alternatives qualitatively and quantitatively. We discuss Defect Detection Prevention, Value Cost Prioritization, and the Analytic Hierarchal Process in this module and how these techniques can be scaled for every day use.

...
4 vídeos ((Total 27 mín.)), 4 leituras, 3 testes
4 videos
Evaluating Alternatives3min
Quantitative Risk Prioritization: Analytic Hierarchic Process13min
Risk Analysis, Assessment, and Prioritization Conclusions... and Reminders1min
4 leituras
Risk-Driven Revision of Requirements Models2h
AHP using Excel11min
Reducing the cost of AHP using Machine Learning1h 30min
Risk Management through Analysis, Assessment, Prioritization | Conclusions - Slides10min
3 exercícios práticos
Module 4.1 Practice Quiz6min
Module 4.2 Practice Quiz6min
Risk Management30min

Instrutores

Avatar

Kristen Walcott-Justice

Assistant Professor
Department of Computer Science

Sobre Sistema de Universidades do ColoradoUniversidade do Colorado

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Sobre o Programa de cursos integrados Requirements Engineering: Secure Software Specifications

This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional degree in computer science, these courses will additionally give you a broad understanding of how requirements engineering is performed and help you get a first foot forward into your upcoming careers. The Software Requirements specialization focuses on traditional software requirements elicitation and writing techniques, while also looking at requirements from a security standpoint. In traditional methods, non-functional requirements, such as security, are often ignored overall. In this specialization, students will be introduced to ways of eliciting requirements from stakeholders, how to analyze these requirements, conduct risk mitigation and analysis, prioritize requirements, document, and bring security concerns into the software lifecycle early on....
Requirements Engineering: Secure Software  Specifications

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.