About this Course
4.3
11 ratings
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 10 hours to complete

Suggested: 4 weeks of study, 1-2 hours per week ...
Available languages

English

Subtitles: English...
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 10 hours to complete

Suggested: 4 weeks of study, 1-2 hours per week ...
Available languages

English

Subtitles: English...

Syllabus - What you will learn from this course

Week
1
Hours to complete
3 hours to complete

Artifact Driven Elicitation

One step of gathering domain knowledge and knowledge of the system that was and the system to be is through artifact-driven elicitation. Here we will discuss what artifact-driven elicitation entails, how to go about learning background from the stakeholders, and methods to obtain and deal with the data....
Reading
4 videos (Total 23 min), 4 readings, 4 quizzes
Video4 videos
Artifact gathering - Questionnaires7m
Repertory grids4m
Card sorts/conceptual laddering4m
Reading4 readings
Artifact-driven Elicitation - Slides20m
Artifact Gathering - Slides20m
Repertory Grids - Slide20m
Card Sorts / Conceptual Laddering - Slide20m
Quiz4 practice exercises
Artifact Driven Elicitation Challenge Questions4m
Artifact Gathering Practice Questions4m
Practice Questions Repertory Grids6m
Artifact Driven Elicitation30m
Week
2
Hours to complete
4 hours to complete

Storyboarding and Scenarios

As you talk with customers early on, developing storyboards and scenarios help. They are easily communicable to both the customer and later to developers and work in all software development lifecycles. Mockups and prototypes can also be used- CAREFULLY. Here we explain these concepts along with their large benefits and dangers....
Reading
4 videos (Total 31 min), 4 readings, 4 quizzes
Video4 videos
Scenarios7m
Scenario Advantages and Disadvantages7m
Mockups and Prototypes7m
Reading4 readings
Storyboarding5m
Scenarios / Scenarios Advantages & Disadvantages - Slides8m
Requirements Elicitation: Towards the Unknown Unknownsm
Mockups and Prototypes - Slides10m
Quiz3 practice exercises
Challenge/Practice Questions Storyboarding/Scenarios6m
Challenge questions Mockups/Prototypes4m
Storyboarding and Putting a Project Together30m
Week
3
Hours to complete
4 hours to complete

Reusing Existing Knowledge

In understanding the system to be and the system that was, existing knowledge of the domain and current scenarios needed are helpful. These can be related back to models. This lesson discusses knowledge that can be obtained, from what resources, and how that can be mapped to existing models for help in further elicitation. ...
Reading
2 videos (Total 13 min), 3 readings, 3 quizzes
Video2 videos
Meta-Model Usage and Reuse Pros and Cons7m
Reading3 readings
Knowledge Reuse - Slides30m
Meta-Model Usage and Reuse Pros and Cons - Slides30m
Inferring declarative requirements specifications from operational scenariosm
Quiz3 practice exercises
Practice Questions for Knowledge ReUse4m
Challenge Questions Meta-model Useage6m
Reusing Existing Knowledge30m
Week
4
Hours to complete
3 hours to complete

Interviewing- Learning from the Sources

Knowledge of the system-as-is and the system-to-be can be obtained through interviews. While the concept of conducting an interview seems easy overall, an efficient and effective interview is challenging to conduct. Here we'll talk about guides to meeting effectiveness and guidelines for conducting a useful interview, specifically for determining what the stakeholder has and needs....
Reading
6 videos (Total 31 min), 5 readings, 4 quizzes
Video6 videos
SAMOSAs- Leading to Meeting Effectiveness4m
Interview Pros and Cons3m
Guidelines for Effective Interviews6m
Observation and Ethnographic Studies6m
Combining Techniques4m
Reading5 readings
Stakeholder Elicitation: Starting Interviewing Techniques - Slides20m
SAMOSAs - Leading to Meeting Effectiveness - Slides20m
Guidelines for Effective Interviews - Slide20m
Observation and Ethnographic Studies - Slides20m
Combining Techniques and Conclusions - Slides20m
Quiz4 practice exercises
Stakeholder Elicitation-Interviewing Techniques Challenge Questions6m
Practice Questions: SAMOSAs, Interview techniques8m
Practice Questions Combining Techniques/Ethnographic studies10m
Interviewing- Learning from the Sources30m

Instructor

Avatar

Kristen Walcott-Justice

Assistant Professor
Department of Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Requirements Engineering: Secure Software Specifications Specialization

This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional degree in computer science, these courses will additionally give you a broad understanding of how requirements engineering is performed and help you get a first foot forward into your upcoming careers. The Software Requirements specialization focuses on traditional software requirements elicitation and writing techniques, while also looking at requirements from a security standpoint. In traditional methods, non-functional requirements, such as security, are often ignored overall. In this specialization, students will be introduced to ways of eliciting requirements from stakeholders, how to analyze these requirements, conduct risk mitigation and analysis, prioritize requirements, document, and bring security concerns into the software lifecycle early on....
Requirements Engineering: Secure Software  Specifications

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.