About this Course
4.1
8 ratings
1 reviews
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 8 hours to complete

Suggested: 4 weeks, 2-5 hours/week...
Available languages

English

Subtitles: English
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 8 hours to complete

Suggested: 4 weeks, 2-5 hours/week...
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
4 hours to complete

Goal Creation

After learning a lot from your customers, you now need to analyze, evaluate, and negotiate. One way to begin working with the data is to write out explicit goals from the information you've gathered. Goals can be written at high and low levels, but they need to be clear and measurable at any level. The first step is determining behavioral goals....
Reading
5 videos (Total 35 min), 3 readings, 3 quizzes
Video5 videos
Generating Goals6m
Goal Overview6m
High Level Goal Types6m
Low Level Goal Types8m
Reading3 readings
Introduction to Goal Development and Language Conflict Analysis30m
Fuzzy goals for requirements-driven adaptations
Goal Development | Language Conflict Analysis |Goal Types - Slides10m
Quiz3 practice exercises
Module 1.1 Practice Quiz8m
Module 1.2 Practice Quiz6m
Module 1 Graded Quiz30m
Week
2
Hours to complete
5 hours to complete

Use, Misuse, and Abuse Cases

Once goals have been identified, they can be pulled together to create use cases; these are easy to read and understand by both customer and developer. To address security, misuse cases and abuse cases can also be defined, in written or drawn form. ...
Reading
4 videos (Total 21 min), 4 readings, 3 quizzes
Video4 videos
The Use Case and Use Case Description7m
Misuse Cases for Security3m
Benefits of Misuse Cases5m
Reading4 readings
Use Case | Description | ATM System - Slides8m
Eliciting security requirements with misuse casess
Misuse and abuse cases: Getting past the positives
Misuse Cases| Security Benefits - Slides8m
Quiz2 practice exercises
Module 2.1 Practice Quiz6m
Module 2.2 Practice Quiz6m
Week
3
Hours to complete
4 hours to complete

Group Sessions for Elicitation, Analysis, and Negotiation

While writing use cases, you'll likely realize that you are missing many components, have questions, and realize that some statements conflict. Group Sessions can help you get more information quickly and begin the negotiation process. Here you'll learn about different types of group sessions and how to make group sessions efficient and effective. ...
Reading
4 videos (Total 17 min), 4 readings, 3 quizzes
Video4 videos
Group Sessions: Tips and Tricks4m
Structured and Unstructured Sessions3m
Group Session Benefits6m
Reading4 readings
Group Sessions - Slides20m
JAD: Joint application design45m
QFD: Quality Function Deployment30m
Structured & Unstructured Sessions | Group Session Benefits - Slides10m
Quiz3 practice exercises
Module 3.1 Practice Quiz6m
Module 3.2 Practice Quiz6m
Module 3 Graded Quiz30m
Week
4
Hours to complete
5 hours to complete

Finding Conflicts and Risks

Inconsistency and conflicts often arise due to language that's being used. There are many types of inconsistency that you can identify early on. The conflicts identified need to be clarified and fixed. In this module, identifying inconsistency, identifying clashes, and handling conflict are discussed....
Reading
3 videos (Total 14 min), 3 readings, 2 quizzes
Video3 videos
Dealing with Conflict4m
Goal Development and Language Conflict Summary1m
Reading3 readings
Software Requirements Negotiation and Renegotiation Aids: A Theory-W Based Spiral Approachs
Applying WinWin to quality requirements: a case study30m
Inconsistency | Conflict | Boundary Condition - Slides10m
Quiz2 practice exercises
Module 4 Practice Quiz6m
Module 4 Graded Quiz30m

Instructor

Avatar

Kristen Walcott-Justice

Assistant Professor
Department of Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Requirements Engineering: Secure Software Specifications Specialization

This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional degree in computer science, these courses will additionally give you a broad understanding of how requirements engineering is performed and help you get a first foot forward into your upcoming careers. The Software Requirements specialization focuses on traditional software requirements elicitation and writing techniques, while also looking at requirements from a security standpoint. In traditional methods, non-functional requirements, such as security, are often ignored overall. In this specialization, students will be introduced to ways of eliciting requirements from stakeholders, how to analyze these requirements, conduct risk mitigation and analysis, prioritize requirements, document, and bring security concerns into the software lifecycle early on....
Requirements Engineering: Secure Software  Specifications

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.