In Software Requirements Elicitation for Secure Software Development, we're going to discuss the overall software requirements process as it applies in waterfall, spiral, and agile models. You'll learn about each of these processes and your goals as a software requirements analyst. This is not an easy task! Who do you talk to, when, and what kind of knowledge are you trying to obtain, in any software life cycle? How do you handle obstacles as you go?
- 5 stars71.64%
- 4 stars18.57%
- 3 stars6.46%
- 2 stars1.99%
- 1 star1.32%
来自REQUIREMENTS GATHERING FOR SECURE SOFTWARE DEVELOPMENT的热门评论
I love your format: short lectures but rich with visual presentations in the form of slides that are EASILY ACCESSIBLE at the end of the module for subsequent study review.
Professor seems a little underconfident. A little more training on her presentation skills would benefit her Other than that course and questions are easy which makes this a fun course.
This course defines all the basics of elicitation and what problems do we face in the process in a very simple and easy way.
It's easy to start coding, but difficult to organize ideas. Coding is not the start of software development, and this course teaches it.