This specialization is designed for software engineers, product managers, testers, and security engineers seeking to enhance their knowledge and skills in requirements engineering, with a specific focus on secure software specifications.
The course covers various aspects such as requirements elicitation, stakeholder analysis, conflict resolution, risk analysis, and documentation. It emphasizes incorporating security concerns into the software development process from the outset, ensuring that non-functional requirements, such as security, are given due attention.
Students will gain insights into traditional and modern software development methodologies, including waterfall, spiral, and agile models. They will also learn to prioritize requirements, conduct risk assessments, and document software requirements using diagrammatic notations and written specifications.
By the end of the specialization, learners will have acquired a comprehensive understanding of how to gather, analyze, prioritize, and document software requirements, with a particular emphasis on integrating security considerations.
Certificate Available ✔
Get Started / More InfoThis specialization comprises five modules covering various aspects of requirements engineering, including requirements gathering, stakeholder analysis, conflict resolution, risk analysis, and documentation.
In the Requirements Gathering for Secure Software Development module, students will explore the software requirements process in different development models, such as waterfall, spiral, and agile. They will learn the goals and challenges of a software requirements analyst and how to handle obstacles encountered in the process.
The Requirements Elicitation: Artifact and Stakeholder Analysis module focuses on using recorded and unrecorded knowledge in elicitation techniques. It guides students in learning about existing products, the system to be developed, and the domain in which the system will operate.
Requirements Specifications: Goals and Conflict Analysis module delves into the process of writing precise requirements goals, developing use cases, and addressing misuse and abuse cases. It also covers handling group meetings, inconsistency, and conflict resolution between stakeholders.
The Software Requirements Prioritization: Risk Analysis module examines managing and documenting conflicts at system and lower levels, along with analyzing and prioritizing requirements based on risk assessments. It covers qualitative and quantitative approaches to risk analysis.
In the SRS Documents: Requirements and Diagrammatic Notations module, students learn to document requirements using a balance of storytelling and complex diagrams. The module emphasizes creating documents that are understandable to customers and developers, conveying the overall idea, scope, domain, resources, and expectations.
Learn how to use TextMesh Pro to enhance dialog boxes with diverse text styles and visual effects in Unity. This course is Part 2 of a series and is designed to...
Introduction to Java Enterprise Edition (EE) is a comprehensive course covering JEE as a platform, web basics, servlet hierarchy, and control transfer mechanisms...
Learn to optimize SQL commands, improve database performance, and implement various indexing techniques and join strategies in under 2 hours.
Programmatic Prompting with OpenAI: Refining and Filtering