Requirements Engineering: Secure Software Specifications Specialization

Starts Dec 25

Requirements Engineering: Secure Software Specifications Specialization

Requirements Engineering: Secure Software Specifications Specialization

From Customers to Secure Software Products. This specialization helps learners to create secure software from beginning to end of development.

About This Specialization

This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional degree in computer science, these courses will additionally give you a broad understanding of how requirements engineering is performed and help you get a first foot forward into your upcoming careers. The Software Requirements specialization focuses on traditional software requirements elicitation and writing techniques, while also looking at requirements from a security standpoint. In traditional methods, non-functional requirements, such as security, are often ignored overall. In this specialization, students will be introduced to ways of eliciting requirements from stakeholders, how to analyze these requirements, conduct risk mitigation and analysis, prioritize requirements, document, and bring security concerns into the software lifecycle early on.

Created by:

courses
5 courses

Follow the suggested order or choose your own.

projects
Projects

Designed to help you practice and apply the skills you learn.

certificates
Certificates

Highlight your new skills on your resume or LinkedIn.

Projects Overview

Courses
Beginner Specialization.
No prior experience required.
  1. COURSE 1

    Requirements Gathering for Secure Software Development

    Upcoming session: Dec 25
    Commitment
    4 weeks, 1-2 hours a week
    Subtitles
    English

    About the Course

    In Software Requirements Elicitation for Secure Software Development, we're going to discuss the overall software requirements process as it applies in waterfall, spiral, and agile models. You'll learn about each of these processes and your go
  2. COURSE 2

    Requirements Elicitation: Artifact and Stakeholder Analysis

    Current session: Dec 11
    Commitment
    4 weeks of study, 1-2 hours per week
    Subtitles
    English

    About the Course

    In Elicitation: Artifact and Stakeholder Driven Analysis, you will learn to use both recorded and presently unrecorded knowledge in your elicitation techniques. As you get started in finding out about the new product, you must first learn about the
  3. COURSE 3

    Requirements Specifications: Goals and Conflict Analysis

    Current session: Dec 11
    Commitment
    4 weeks, 2-5 hours/week
    Subtitles
    English

    About the Course

    In Requirements Goal Development and Language Analysis, we move from the spoken word to precise writing. A first step in this is writing goals. We will talk about goals used in requirements engineering and, from this, writing use cases from what we lea
  4. COURSE 4

    Software Requirements Prioritization: Risk Analysis

    Current session: Dec 11
    Commitment
    4 weeks, 1-2 hours per week
    Subtitles
    English

    About the Course

    Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. How do you manage and document conflict, along with alternatives? In analyzing alternati
  5. COURSE 5

    SRS Documents: Requirements and Diagrammatic Notations

    Current session: Dec 11
    Commitment
    4 weeks, 1-2 hours/week
    Subtitles
    English

    About the Course

    As requirements are being gathered and prioritized, they also need to be documented. In Diagrammatic Notations and Software Requirements Specification Writing, we discuss and practice the process of turning requirements into something readable to the cust

Creators

  • University of Colorado System

    The University of Colorado, Colorado Springs is a quickly growing research university with a NSA/DHS awarded Center of Academic Excellence in Information Assurance and Cyber Defense and many security and software engineering relationships. UCCS cyber security programs are certified by the Committee on National Security Standards (CNSS).

    The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.

  • Kristen Walcott-Justice

    Kristen Walcott-Justice

    Assistant Professor

FAQs