About this Course
5.0
5 ratings
1 reviews

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 9 hours to complete

Suggested: 4 weeks, 1-2 hours/week...

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 9 hours to complete

Suggested: 4 weeks, 1-2 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
2 hours to complete

Beginning to Write an SRS Document

Beginning to write a Software Requirements Specification (SRS) is a daunting process. As you start elicitation and move onward through the requirements cycle, you should plan your approach and begin writing as soon as possible. In this module, we discuss local and global rules that should be followed to lead to success....
4 videos (Total 39 min), 3 readings, 1 quiz
4 videos
Following Local Rules12m
Standardized Statement Templates5m
Global Organization Templates10m
3 readings
Introduction to Diagrammatic Notations - Slides20m
Local Rules | Standardized Templates - Slides20m
Global Organization Templates - Slides20m
1 practice exercise
Begin to Write an SRS Document30m
Week
2
4 hours to complete

Beginning Diagramming

Within a requirements document, you should tell a story. Pictures help in stories! In this lesson, we'll look into some of the "pictures" that you can create to clarify understanding for all readers and to help yourself know that all points are being covered clearly and completely. Specifically, we'll consider high, system-scope diagrams....
3 videos (Total 17 min), 5 readings, 1 quiz
3 videos
Context and Problem Diagrams3m
Frame Diagrams6m
5 readings
Diagramming-Adding Use/Misuse/Abuse Cases -Slides20m
Misuse Cases: Use Cases with Hostile Intents
Misuse and abuse cases: getting past the positive30m
Context and Problem | Frame Diagrams - Slides15m
Relating software requirements and architectures using problem framess
1 practice exercise
Use/Misuse Cases and High Level Diagramming30m
Week
3
3 hours to complete

Lower-Level Diagramming

At a lower level, Entity Relationship Diagrams, Data Flow Diagrams, and SADT diagrams can be used. All three sets of diagrams work together to explain lower-level relationships and dataflow for components in the system-to-be. In this lesson, we'll discuss what these diagrams look like and what information should be included in such diagrams....
3 videos (Total 18 min), 2 readings, 1 quiz
3 videos
SADT Diagrams: Actigrams and Datagrams5m
Data Flow Diagrams5m
2 readings
The entity-relationship model for multilevel securitys
Entity Relationship | SADT |Data Flow Diagrams - Slides20m
1 practice exercise
Lower-Level Diagramming30m
Week
4
4 hours to complete

Tracing Events

System level diagram and low level diagrams work together. Each low level diagram also relates to other low level diagrams. In addition to these diagrams, we also have diagrams to explain events. ...
4 videos (Total 24 min), 2 readings, 2 quizzes
4 videos
Event Trace Diagrams5m
State Machine Diagrams6m
Concurrent StateCharts and R-Nets6m
2 readings
Putting the Diagrams Together | Event Trace Diagrams - Slides20m
State Machine Diagrams | Concurrent State Charts & R-Nets - Slides15m
1 practice exercise
Tracing Events30m

Instructor

Avatar

Kristen Walcott-Justice

Assistant Professor
Department of Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Requirements Engineering: Secure Software Specifications Specialization

This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional degree in computer science, these courses will additionally give you a broad understanding of how requirements engineering is performed and help you get a first foot forward into your upcoming careers. The Software Requirements specialization focuses on traditional software requirements elicitation and writing techniques, while also looking at requirements from a security standpoint. In traditional methods, non-functional requirements, such as security, are often ignored overall. In this specialization, students will be introduced to ways of eliciting requirements from stakeholders, how to analyze these requirements, conduct risk mitigation and analysis, prioritize requirements, document, and bring security concerns into the software lifecycle early on....
Requirements Engineering: Secure Software  Specifications

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.