In Software Requirements Elicitation for Secure Software Development, we're going to discuss the overall software requirements process as it applies in waterfall, spiral, and agile models. You'll learn about each of these processes and your goals as a software requirements analyst. This is not an easy task! Who do you talk to, when, and what kind of knowledge are you trying to obtain, in any software life cycle? How do you handle obstacles as you go?
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
來自REQUIREMENTS GATHERING FOR SECURE SOFTWARE DEVELOPMENT的熱門評論
Clear and well presented, with some interesting readings. Could benefit from an interactive game/quiz/tool or two, perhaps. Anyway, very good overall.
More examples may be added to illustrate on how security of a software is impacted if proper care is not taken during requirements gathering phase.
Fix the platform for your quizzes so the system doesn't deselect the answers I choose when I scroll down the screen.
I have learned a great deal from this course. It brings real life situations into a better perspective.
None of the PDF links are opening. They loop back to the same page.
i have learned many things which i dont known by doing this course
The course was very useful for me to help in my academics.
The instructor is too good. And her wit is wonderful.
The best and advanced way of learning with COURSERA
關於 Requirements Engineering: Secure Software Specifications 專項課程