In Software Requirements Elicitation for Secure Software Development, we're going to discuss the overall software requirements process as it applies in waterfall, spiral, and agile models. You'll learn about each of these processes and your goals as a software requirements analyst. This is not an easy task! Who do you talk to, when, and what kind of knowledge are you trying to obtain, in any software life cycle? How do you handle obstacles as you go?
About this Course
Skills you will gain
- 5 stars71.68%
- 4 stars18.54%
- 3 stars6.45%
- 2 stars1.98%
- 1 star1.32%
TOP REVIEWS FROM REQUIREMENTS GATHERING FOR SECURE SOFTWARE DEVELOPMENT
Professor seems a little underconfident. A little more training on her presentation skills would benefit her Other than that course and questions are easy which makes this a fun course.
More examples may be added to illustrate on how security of a software is impacted if proper care is not taken during requirements gathering phase.
I love your format: short lectures but rich with visual presentations in the form of slides that are EASILY ACCESSIBLE at the end of the module for subsequent study review.
This coures is perfect learning a software development and thank you
About the Requirements Engineering: Secure Software Specifications Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.