Requirements Gathering for Secure Software Development

  • 4.6
Approx. 9 hours to complete

Course Summary

This course teaches the fundamentals of requirements gathering for secure software development. You will learn how to identify and prioritize requirements, and how to communicate them effectively with stakeholders.

Key Learning Points

  • Understand the importance of requirements gathering in secure software development
  • Learn how to identify and prioritize requirements
  • Develop skills in communicating requirements effectively with stakeholders

Related Topics for further study


Learning Outcomes

  • Identify and prioritize requirements for secure software development
  • Communicate requirements effectively with stakeholders
  • Conduct risk assessments for software projects

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of software development
  • Familiarity with secure coding practices

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced
  • Video lectures
  • Quizzes and assignments

Similar Courses

  • Secure Software Design Specialization
  • Software Security Fundamentals

Related Education Paths


Notable People in This Field

  • Bruce Schneier

Related Books

Description

In Software Requirements Elicitation for Secure Software Development, we're going to discuss the overall software requirements process as it applies in waterfall, spiral, and agile models. You'll learn about each of these processes and your goals as a software requirements analyst. This is not an easy task! Who do you talk to, when, and what kind of knowledge are you trying to obtain, in any software life cycle? How do you handle obstacles as you go?

These are the questions we will focus on answering in this specialization.

Outline

  • The Software Requirement Specification Process and Cost
  • About the Lecturer: Hi!
  • Introduction to the Specialization
  • The Software Requirement Specification Process
  • Cost of Bad Requirements
  • Getting Started- "I want THIS"
  • Software Requirement Specification Process - Slides
  • Cost of Bad Requirements - Slides
  • Getting Started: I want THIS - Slides
  • Software Specification Process
  • Starting to Build Requirements- What does the customer want?
  • Introduction to Requirements Engineering
  • Building Requirements
  • Introduction to Requirements Engineering - Slides
  • Building Requirements - Slides
  • Requirements Elicitation Towards the Unknown Unknowns
  • Requirements Engineering
  • Software Lifecycles
  • The Software Lifecycle
  • Different Lifecycle Models
  • Hybrid Model/Iterative Lifecycle Approaches
  • Software Lifecycle | Lifecycle Models | Hybrid Model - Slides
  • Software Development Lifecycles- Approaches and Benefits
  • Agile Software Development- The Business of Innovation
  • Software Lifecycles
  • Goals and Models for Elicitation
  • Challenges and Your Goals
  • Lines and Cats- What we can learn
  • Who, when, why, and how?
  • Requirement Engineering Statement Types
  • Requirement Challenges
  • The Analyst - Who and What?
  • Steps to Effective Knowledge Acquisition - Identifying Stakeholders
  • Obstacles in Data Handling
  • The Agile Model - Slides
  • Lines and Cats - Slides
  • WWWH | Requirement Engineering Statement | Requirement Challenges - Slides
  • The Analyst | Identifying Stakeholder | Obstacles - Slides
  • Goals and Models

Summary of User Reviews

Key Aspect Users Liked About This Course

The course offers practical techniques and tools for gathering and analyzing requirements in a secure manner.

Pros from User Reviews

  • Clear and concise explanations of concepts and techniques.
  • Real-world examples and case studies that illustrate the importance of secure requirements gathering.
  • Engaging and interactive course materials that keep learners motivated and interested.
  • Expert instructors with extensive experience in requirements gathering and secure software development.
  • Opportunities for learners to practice and apply what they have learned through hands-on exercises and projects.

Cons from User Reviews

  • Some learners may find the course challenging if they have limited prior knowledge of software development or security.
  • The course may not cover all aspects of requirements gathering and security, and learners may need to seek additional resources for more in-depth knowledge.
  • Some learners may find the pace of the course too fast or too slow, depending on their learning style and experience level.
  • The course may not be suitable for learners who prefer traditional classroom-style instruction or who are not comfortable with online learning.
  • Some learners may find the course too technical or focused on specific tools and techniques, rather than providing a more general overview of requirements gathering and security.
English
Available now
Approx. 9 hours to complete
Kristen Walcott-Justice
University of Colorado System
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses