Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. How do you manage and document conflict, along with alternatives? In analyzing alternatives, you must consider risks. In this course, we'll look into how to analyze risk, evaluate risk, document risks, and use this information for prioritization of requirements. Qualitative and Quantitative approaches will be covered.
Software Requirements Prioritization: Risk Analysis
This course is part of Requirements Engineering: Secure Software Specifications Specialization
Instructor: Kristen Walcott-Justice
Sponsored by Coursera Learning Team
5,123 already enrolled
(111 reviews)
Skills you'll gain
Details to know
Add to your LinkedIn profile
10 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
Once requirements have been somewhat/mostly determined, we next need to go carefully through our work. This involves analyzing risk, assessing alternative plans, and prioritizing. In this module, we examine how to begin documenting conflicts and generating conflict resolution.
What's included
3 videos3 readings3 assignments1 discussion prompt
Risk goes far beyond security. Most non-functional requirements are part of risk analysis. In this lesson, we discuss different types of risks, how they can be identified, and how to visualize a causal linking of failures, causes, and consequences using risk trees and cut-set trees.
What's included
2 videos3 readings2 assignments1 discussion prompt
In writing use cases and scenarios, we'll discover risk in the interactions. Interactions may happen out of order, to quickly or slowly, or not occur at all. In risk assessment, we assess the likelihood of risks and their severity, the likelihood of consequences, and thus, attempt to control high-priority risks.
What's included
2 videos2 readings2 assignments1 discussion prompt
Many approaches can be used to incorporate risk management into your software requirements engineering process. One is Defect Detection Prevention (DDP). We can also analyze alternatives qualitatively and quantitatively. We discuss Defect Detection Prevention, Value Cost Prioritization, and the Analytic Hierarchal Process in this module and how these techniques can be scaled for every day use.
What's included
4 videos4 readings3 assignments1 discussion prompt
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
111 reviews
- 5 stars
74.10%
- 4 stars
17.85%
- 3 stars
5.35%
- 2 stars
1.78%
- 1 star
0.89%
Showing 3 of 111
Reviewed on Dec 12, 2022
A lot of reference links in reading are broken/gone.
Reviewed on Jun 28, 2020
Thank you, the material provided is quite simple and easy to understand. Hopefully it will be useful in the future, amen.
Reviewed on Feb 15, 2020
Excellent course. The information was presented clearly. The quizzes captured the essential points documented and stated by the instructor.
Recommended if you're interested in Computer Science
University of Minnesota
Banco Interamericano de Desarrollo
Politecnico di Milano
Johns Hopkins University
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy