COURSE CATALOG
|
|
- Gerald Terry
- 8 years ago
- Views:
Transcription
1 THE COMMUNITY FOR TECHNOLOGY LEADERS COURSE CATALOG 2016
2 CONTENTS SWEBOK KNOWLEDGE AREA REVIEW COURSES Software Requirements Course...4 Software Design Course...6 Software Construction Course...7 Software Testing Course...8 Software Maintenance Course...9 Software Configuration Management Course...10 Software Engineering Management Course Software Engineering Process Course...12 Software Engineering Models & Methods Course...13 Software Quality Course...14 Software Engineering Economics Course...15 Software Project Management Course...16 CONTINUING EDUCATION CERTIFICATES OF ACHIEVEMENT COURSES Cloud Computing In the Business Environment...20 Cloud Governance and Security...21 Cloud Economics, Metrics and Migration...22 Foundations of Secure Software...23 Managing Secure Software Development...24 Secure Software Coding...25 Secure Software Design...26 Embedded System...27 Multi-Core Video Series...28 Quarto...29 Kino...30
3 SWEBOK KNOWLEDGE AREA REVIEW COURSES 3
4 SOFTWARE REQUIREMENTS COURSE Software requirements engineering is the process of determining what is to be produced in a software system. It has the widely recognized goal of determining the needs for, and the intended external behavior, of a system design. The four specific steps in software requirements engineering are: requirements elicitation, requirements analysis, requirements specification, and requirements validation. The importance of high quality software requirements, long recognized as the foundation from which all software work follows, cannot be overstated. Arriving at a shared vision of the product to be developed is one of the greatest challenges facing the software project team, and customer involvement is among the most critical factors in software quality. This course will give participants a number of best practices, based upon the Software Engineering Body of Knowledge (SWEBOK), so that they can improve the quality of the requirements elicitation and development process in their organization. Characteristics of high quality requirements specifications are completeness, conciseness, accuracy, modularization, prioritization, analysis, and verification. Ultimately, the techniques presented reduce project risk, improve product quality, and allow for effective control of requirements volatility all measures for increasing the likelihood of a successful software project. Learning Objectives Upon completion of this course, the student will be able to: 1. Develop effective functional and non-functional requirements that are complete, concise, correct, consistent, testable and unambiguous. 2. Select the appropriate requirements elicitation techniques to identify requirements. 3. Design a set of software models to be used to flesh out hidden requirements and drive clarity into the system functional requirements 4. Effectively analyze requirements and prioritize accordingly. 5. Perform requirements engineering in the context of the most common software development life cycles and processes. 6. Create a requirements specification to communicate requirements to a broad set of stakeholders. 7. Utilize various requirements validation techniques to critically evaluate their requirements to identify defects 8. Manage change to requirements 4
5 1. Software Requirements Fundamentals 1.1. Definition of a Software Requirement 1.2. Product and Process Requirements 1.3. Functional and Nonfunctional Requirements 1.4. Emergent Properties 1.5. Quantifiable Requirements 1.6. System Requirements and Software Requirements 2. Requirements Process 2.1. Process Models 2.2. Process Actors 2.3. Process Support and Management 2.4. Process Quality and Improvement 3. Requirements Elicitation 3.1. Requirements Sources 3.2. Elicitation Techniques 4. Requirements Analysis 4.1. Requirements Classification 4.2. Conceptual Modeling 4.3. Architectural Design and Requirements Allocation 4.4. Requirements Negotiation 4.5. Formal Analysis 5. Requirements Specification 5.1. System Definition Document 5.2. System Requirements Specification 5.3. Software Requirements Specification 6. Requirements Validation 6.1. Requirements Reviews 6.2. Prototyping 6.3. Model Validation 6.4. Acceptance Tests 7. Practical Considerations 7.1. Iterative Nature of the Requirements Process 7.2. Change Management 7.3. Requirements Attributes 7.4. Requirements Tracing 7.5. Measuring Requirements 8. Software Requirements Tools Self-Paced Learning Approximate Time: 4 hours PDH 4 CEU 0.4 Member: $65 Non-Member $85 5
6 SOFTWARE DESIGN COURSE Software design is both the process of defining the architecture, components, interfaces and other characteristics of a system, and the result of that process. Essentially, software design is the software life cycle activity in which parameters outlined and defined in the Requirements process are translated into a description of a software system s internal structure that can be used as a basis for construction. This course begins with design fundamentals, including concepts, context and processes. It then progresses through key design issues; structure and architecture; user interface design; design quality analysis and evaluation; notations; strategies and design tools, all within the context of real-world challenges. Learning Objectives: 1. Outline the software design process, and demonstrate how the essential design principles are applied within it. 2. Apply the concepts of concurrency, data persistence, error handling and security to a typical software design project. 3. Illustrate the essential elements of software structure and architecture in terms of styles, patterns and families of programs and frameworks. 4. Explain the application of user interface design to a software development project, including essential principles, interaction modalities, information presentation and the UI design process. 5. Demonstrate the application of quality analysis and evaluation principles, including quality attributes, analysis and evaluation techniques, and quality measures. 6. Explain through example the concept of design notations in terms of structure and behavioral descriptions. 7. Employ function, object, data-structure and component-based design methodologies in a typical software design project. 1. Software Design Fundamentals 1.1. General design concepts 1.2. Context of software design 1.3. Software design process 1.4. Software design principles 2. Key Issues in Software Design 2.1. Concurrency 2.2. Control and handling of events 2.3. Data persistence 2.4. Distribution of components 2.5. Error exception handling and fault tolerance 2.6. Interaction and presentation 2.7. Security 3. Software Structure and Architecture 3.1. Architectural structures and viewpoints 3.2. Architectural styles 3.3. Design patterns 3.4. Architecture design decisions 3.5. Families of programs and frameworks 4. User Interface Design 4.1. General user interface design principles 4.2. User interface design issues 4.3. Design of user interaction modalities 4.4. Design of information presentation 4.5. User interface design process 4.6. Localization and internationalization 4.7. Metaphors and conceptual models 5. Software Design Quality Analysis and Evaluation 5.1. Quality attributes 5.2. Quality analysis and evaluation techniques 5.3. Measures 6. Software Design Notations 6.1. Structural descriptions (static view) 6.2. Behavioral descriptions (dynamic view) 7. Software Design Strategies and Methods 7.1. General strategies 7.2. Function-oriented (structured) design 7.3. Object-oriented design 7.4. Data structure-oriented design 7.5. Component-based design 7.6. Other methods 8. Software Design Tools Self-Paced Learning Approximate Time: 8 hours PDH 8 CEU 0.8 Member: $125 Coures Cost: Non-Member $155 6
7 SOFTWARE CONSTRUCTION COURSE Software Construction is the detailed creation of working software through a combination of coding, verification, unit testing, integration testing and debugging. Construction uses the output from the design process to build software therein described, and provides an output to testing. Thus, design, construction and testing are closely intertwined, and very often overlap. Some design functions may carry over into the construction phase, and unit/integration testing are frequently performed during the construction phase. In this course, we will examine key construction fundamentals such as minimizing complexity, dealing with change, building for verification and basic construction standards. From fundamentals, the course moves through managing the construction process; key practical considerations; construction technologies and construction tools. Since construction is a handson intensive endeavor, students are challenged with hands-on exercises that mimic real-world software construction challenges. Learning Objectives 1. Apply the fundamentals of software construction as outlines in this course to an actual software development project. 2. Demonstrate by example the key construction life cycle models. 3. Interpret key practical construction considerations such as design, languages, coding, testing, quality and reuse. 4. Evaluate and provide examples of the key construction technologies in a typical software construction project. 5. Explain the application of software construction tools such as GUI builders, unit testing tools, profiling, performance analysis and slicing tools 1. Software Construction Fundamentals 1.1. Minimizing Complexity 1.2. Anticipating Change 1.3. Constructing for Verification 1.4. Reuse 1.5. Standards in Construction 2. Managing Construction 2.1. Construction in Life Cycle Models 2.2. Construction Planning 2.3. Construction Measurement 3. Practical Considerations 3.1. Construction Design 3.2. Construction Languages 3.3. Coding 3.4. Construction Testing 3.5. Construction for Reuse 3.6. Construction with Reuse 3.7. Construction Quality 3.8. Integration 4. Construction Technologies 4.1. API Design and Use 4.2. Object-Oriented Runtime Issues 4.3. Parameterization and Generics 4.4. Assertions, Design by Contract, and Defensive Programming 4.5. Error Handling, Exception Handling, and Fault Tolerance 4.6. Executable Models 4.7. State-Based and Table-Driven Construction Techniques 4.8. Runtime Configuration and Internationalization 4.9. Grammar-Based Input Processing Concurrency Primitives Middleware Construction Methods for Distributed Software Constructing Heterogeneous Systems Performance Analysis and Tuning Platform Standards Test-First Programming 5. Construction Tools 5.1. Development Environments 5.2. GUI Builders 5.3. Unit Testing Tools 5.4. Profiling, Performance Analysis, and Slicing Tools Self-Paced Learning Approximate Time: 6 hours PDH 6 CEU 0.6 Member: $85 Non-Member $110 7
8 SOFTWARE TESTING COURSE Software testing consists of the dynamic verification that a program provides the expected behaviors on a finite set of test cases, suitably selected from an infinite domain of execution possibilities. Software testing is no longer limited to activities that start only after coding (construction) is complete. Rather, as has been observed in the Software Construction course, testing begins during the construction phase with unit and integration testing, and proceeds through the full testing regime. This course begins with testing fundamentals, including terminology and the relationship of testing with other life cycle activities. From there, Software Testing proceeds through test levels; testing techniques; testrelated measures; test processes and concludes with an examination of testing tools as they are applied to actual software testing operations. Learning Objectives: 1. Employ correct testing terminology throughout the testing process. 2. Execute specific software tests with well-defined objectives and targets. 3. Apply various testing techniques, including domain, code, fault, usage and model-based. 4. Execute program and test evaluations. 5. Perform a complete testing process, taking into account practical considerations 1. Software Testing Fundamentals 1.1. Testing-Related Terminology 1.2. Key Issues 1.3. Relationship of testing to other activities 2. Test Levels 2.1. The Target of the Test 2.2. Objectives of Testing 3. Test Techniques 3.1. Based on the Software Engineer s Intuition and Experience 3.2. Input Domain-Based Techniques 3.3. Code-Based Techniques 3.4. Fault-Based Techniques 3.5. Usage-Based Techniques 3.6. Model-Based Testing Techniques 3.7. Techniques Based on the Nature of the Application 3.8. Selecting and Combining Techniques 4. Test-Related Measures 4.1. Evaluation of the Program 4.2. Under Test 4.3. Evaluation of the Tests Performed 5. Test Process 5.1. Practical Considerations 5.2. Test Activities 6. Software Testing Tools 6.1. Testing Tool Support 6.2. Categories of Tools Self-Paced Learning Approximate Time: 8 hours PDH 8 CEU 0.8 Member: $125 Non-Member $155 8
9 SOFTWARE MAINTENANCE COURSE Once a software product is delivered, it must evolve or change over time. When in actual operations, defects are discovered, operating environments change, and new user requirements emerge. While the Maintenance phase of the life cycle generally begins following a postimplementation period, actual maintenance activates may occur earlier. As such, we can define maintenance as the totality of activities required to provide costeffective support to software. Given this, maintenance can be performed during the pre-delivery phase as well as later. This course begins with an examination of the fundamentals, including terminology; the nature and need for maintenance; maintenance costs and software evolution. From there, Maintenance proceeds through key issues; the maintenance process; techniques for maintenance and software maintenance tools all within the context of real-world maintenance challenges. Learning Objectives: 1. Apply software maintenance fundamentals, including terminology; the nature of and need for maintenance; maintenance costs; evolution and categories of maintenance 2. Incorporate key issues in software maintenance, to include technical issues; management issues; cost estimation; and software maintenance measurement 3. Utilize the best practices maintenance process 4. Exercise best practices techniques for maintenance 1. Software Maintenance Fundamentals 1.1. Definitions and Terminology 1.2. Nature of Maintenance 1.3. Need for Maintenance 1.4. Majority of Maintenance Costs 1.5. Evolution of Software 1.6. Categories of Maintenance 2. Key Issues in Software Maintenance 2.1. Technical Issues 2.2. Management Issues 2.3. Maintenance Cost Estimation 2.4. Software Maintenance Measurement 3. Maintenance Process 3.1. Maintenance Processes 3.2. Maintenance Activities 4. Techniques for Maintenance 4.1. Program Comprehension 4.2. Reengineering 4.3. Reverse Engineering 4.4. Migration 4.5. Retirement 5. Software Maintenance Tools Self-Paced Learning Approximate Time: 8 hours PDH 8 CEU 0.8 Member: $85 Non-Member $110 9
10 SOFTWARE CONFIGURATION MANAGEMENT COURSE Software development is not a straightforward process and often requires multiple iterations between the development phases. To cope with this dynamic nature of software development, software engineers need to control the changes in the development process. Software Configuration Management (SCM) is the activity that helps us control the evolution of a software project. This course is a comprehensive review of SCM as a software-engineering discipline supporting all life-cycle phases by relying on tools and techniques to manage changes in software, including documentation, code, interfaces, and databases. Learning Objectives: 1. Effectively Plan and Run an SCM Process considering specific organizational aspects in terms of people, product, project, cross-organizational, process, and tools. 2. Effectively identify and organize configuration items to be controlled with SCM, including labeling and version control. 3. Perform effective surveillance of SCM activities including software configuration auditing to evaluate the conformance of software products and processes to applicable regulations, standards, guidelines, plans, and procedures. 4. Manage software baselines. 5. Effectively manage changes during the software life cycle including deviations and waivers in software configuration control. 6. Record and report information needed for effective management of the software configuration. Effectively manage software releases and deliveries including versioning control. 7. Select and apply SCM Tools. 1. Management of the SCM Process 1.1. Organizational Context for SCM 1.2. Constraints and Guidance for the SCM Process 1.3. Planning for SCM 1.4. SCM Plan 1.5. Surveillance of Software Configuration Management 2. Software Configuration Identification 2.1. Identifying Items to Be Controlled 2.2. Software Library 3. Software Configuration Control 3.1. Requesting, Evaluating, and Approving Software Changes 3.2. Implementing Software Changes 3.3. Deviations and Waivers 4. Software Configuration Status Accounting 4.1. Software Configuration Status Information 4.2. Software Configuration Status Reporting 5. Software Configuration Auditing 5.1. Software Functional Configuration Audit 5.2. Software Physical Configuration Audit 5.3. In-process Audits of a Software Baseline 6. Software Release Management and Delivery 6.1. Software Building 6.2. Software Release Management 7. Software Configuration Management Tools Self-Paced Learning PDH 6 CEU 0.6 Approximate Time: 6 hours Member: $125 Non-Member $150 10
11 SOFTWARE ENGINEERING MANAGEMENT COURSE Software engineering management is defined as the application of management activities planning; coordinating, measuring, monitoring, controlling and reporting to the processes of software development. While nominal management concepts are applicable to software engineering, there are many aspects of managing software projects that are unique. This course is centered on those unique aspects of software engineering management at three levels: Organizational and infrastructure management; project management and the management of a measurement program, and how these are applied to actual software projects. Learning Objectives: 1. Execute a complete requirements negotiation process. 2. Perform a comprehensive feasibility analysis. 3. Lead a software project planning process, to include determining deliverables; effort, schedule and cost estimation; resource allocation; risk management; quality and plan management. 4. Apply the principles and processes of software engineering project enactment. 5. Perform software project reviews and evaluations according to best practices. 6. Illustrate by example software project closure activities. 7. Employ software engineering measurement processes. 8. Utilize software engineering management tools. 1. Initiation and Scope Definition 1.1. Determination and Negotiation of Requirements 1.2. Feasibility Analysis 1.3. Process for the Review and Revision of Requirements 2. Software Project Planning 2.1. Process Planning 2.2. Determine Deliverables 2.3. Effort, Schedule, and Cost Estimation 2.4. Resource Allocation 2.5. Risk Management 2.6. Quality Management 2.7. Plan management 3. Software Project Enactment 3.1. Implementation of Plans 3.2. Software Acquisition and Supplier Contract Management 3.3. Implementation of Measurement Process 3.4. Monitor Process 3.5. Control Process 3.6. Reporting 4. Review and Evaluation 4.1. Determining Satisfaction of Requirements 4.2. Reviewing and Evaluating Performance 5. Closure 5.1. Determining Closure 5.2. Closure Activities 6. Software Engineering Measurement 6.1. Establish and Sustain Measurement Commitment 6.2. Plan the Measurement Process 6.3. Perform the Measurement Process 6.4. Evaluate Measurement 7. Software Engineering Management Tools Self-Paced Learning Approximate Time: 6 hours PDH 6 CEU 0.6 Member: $125 Non-Member $150 11
12 SOFTWARE ENGINEERING PROCESS COURSE An engineering process can be defined as a set of interrelated activities that transform one or more inputs into outputs, while consuming resources to accommodate that transformation. In software engineering, processes refer specifically to activities by software engineers to develop, maintain and operate software. In overview, software engineering process can be examined on two levels. The first level encompasses the technical and managerial activities within the software life cycle that are performed during software acquisition, development, maintenance and retirement. The second is the meta-level, which is concerned with the definition, implementation, assessment, measurement, management, change and improvement of the software life cycle processes themselves. This course concentrates on the second level by examining the planning, assurance and control processes employed as they relate to real-world software development projects. Learning Objectives: 1. Employ key term definitions, including process management and process infrastructure terminology. 2. Illustrate through example software life cycles, including software process categories, life cycle models and process adaption. 3. Demonstrate the key elements of process assessment models, methods and improvement techniques. 4. Apply software measurement in a real-world project, to include process and product measurement, measurement results interpretation, information models and measurement techniques. 5. Apply cutting-edge process tools 1. Software Process Definition 1.1. Software Process Management 1.2. Software Process Infrastructure 2. Software Life Cycles 2.1. Categories of Software Processes 2.2. Software Life Cycle Models 2.3. Software Process Adaptation 2.4. Practical Considerations 3. Software Process Assessment and Improvement 3.1. Software Process Assessment Models 3.2. Software Process Assessment Methods 3.3. Software Process Improvement Models 3.4. Continuous and Staged Ratings 4. Software Measurement 4.1. Software Process and Product Measurement 4.2. Quality of Measurement Results 4.3. Software Information Models 4.4. Software Process Measurement Techniques 5. Software Engineering Process Tools Self-Paced Learning Approximate Time: 5 hours PDH 5 CEU 0.5 Member: $85 Non-Member $110 12
13 SOFTWARE ENGINEERING MODELS & METHODS COURSE Models and Methods impose a structure on software engineering with the goal of making that activity systematic, repeatable and quality-oriented. Models provide an approach to problem solving, notations and procedures for model construction and analysis. This course will emphasize software engineering models and methods that encompass multiple life cycle phases by examining modeling principles, types of models, model analysis and software engineering methods as they are applied to real-world software engineering projects. Learning Objectives: 1. Understand and apply basic modeling principles, properties and expression of models, syntax, semantics and pragmatics. 2. Illustrate and employ information, behavioral and structure modeling. 3. Apply model analysis, including analyzing for completeness, consistency and correctness. 4. Demonstrate the concepts of traceability and interaction analysis. 5. Provide examples of heuristic, formal, prototyping and agile methods and how they are applied 1. Modeling 1.1. Modeling Principles 1.2. Properties and Expression of Models 1.3. Syntax, Semantics, and Pragmatics 1.4. Preconditions, Post-conditions, and Invariants 2. Types of Models 2.1. Information Modeling 2.2. Behavioral Modeling 2.3. Structure Modeling 3. Analysis of Models 3.1. Analyzing for Completeness 3.2. Analyzing for Consistency 3.3. Analyzing for Correctness 3.4. Traceability 3.5. Interaction Analysis 4. Software Engineering Methods 4.1. Heuristic Methods 4.2. Formal Methods 4.3. Prototyping Methods 4.4. Agile Methods Self-Paced Learning Approximate Time: 7 hours PDH 7 CEU 0.7 Member: $65 Non-Member $85 13
14 SOFTWARE QUALITY COURSE Software Quality can be defined as the capability of a software product to satisfy stated and implied needs under specified conditions. Additionally, Quality refers to the degree to which software products meet their stated requirements. Quality is a basic parameter of software engineering efforts whose primary goal is the delivery of maximum stakeholder value while balancing cost and schedule. This course addresses Quality s key term definitions, provides examples of and exercises for the practical application of its nominal practices, tools and techniques for applying software quality methodologies to real-world projects. Learning Objectives: 1. Understand and be able to apply software quality fundamentals to real-world software projects, including an ethical approach to Quality, value and cost considerations, quality models and safety considerations. 2. Demonstrate by means of example software quality management processes such as quality assurance, verification and validation, and reviews/audits. 3. Illustrate the essential software practical considerations such as quality requirements, defect characterization, SQM techniques and software quality measurement. 4. Employ the latest software quality tools. 1. Software Quality Fundamentals 1.1. Software Engineering Culture and Ethics 1.2. Value and Cost of Quality 1.3. Models and Quality Characteristics 1.4. Software Quality Improvement 1.5. Software Safety 2. Software Quality Management Processes 2.1. Software Quality Assurance 2.2. Verification and Validation 2.3. Reviews and Audits 3. Software Quality Practical Considerations 3.1. Software Quality Requirements 3.2. Defect Characterization 3.3. SQM Techniques 3.4. Software Quality Measurement 4. Software Quality Tools Self-Paced Learning Approximate Time: 5 hours PDH 5 CEU 0.5 Member: $65 Non-Member $85 14
15 SOFTWARE ENGINEERING ECONOMICS COURSE Software Engineering Economics are about making decisions related to software engineering in a business context. Success of any software engineering project is partly dependent on effective business management. Software engineering economics provides a way to examine the attributes of software and software processes in a systematic way that relates them to economic measures. These can be weighted and analyzed when making decisions within the scope of a software engineering project and its organization. The essence of software engineering economics is aligning software technical decisions with the business goals of the organization. This course examines the key aspects of software engineering economics, including life cycle economics; risk and uncertainty; economic analysis methods and practical considerations, which tie concept and theory to contemporary software economic realities. Learning Objectives: 1. Understand and be able to apply the key software engineering economic fundamentals to real-world software economic issues. 2. Illustrate through example the key software life cycle economics, including product and process life cycles; portfolios; proposals; investment decisions; pricing and costing, and earned value management (EVM). 3. Apply the concepts of risk and uncertainty to realworld software development projects, including goals; estimates; prioritization and decision making. 4. Perform best-practice economic analysis methods. 5. Relate and interpret the good-enough principle; friction-free economy; ecosystems and outsourcing 1. Software Engineering Economics Fundamentals 1.1. Finance 1.2. Accounting 1.3. Controlling 1.4. Cash Flow 1.5. Decision-Making Process 1.6. Valuation 1.7. Inflation 1.8. Depreciation 1.9. Taxation Time-Value of Money Efficiency Effectiveness Productivity 2. Life Cycle Economics 2.1. Product 2.2. Project 2.3. Program 2.4. Portfolio 2.5. Product Life Cycle 2.6. Project Life Cycle 2.7. Proposals 2.8. Investment Decisions 2.9. Planning Horizon Price and Pricing Cost and Costing Performance Measurement Earned Value Management Termination Decisions Replacement and Self-Paced Learning Approximate Time: 5 hours PDH 5 CEU 0.5 Member: $65 Non-Member $85 Retirement Decisions 3. Risk and Uncertainty 3.1. Goals, Estimates, and Plans 3.2. Estimation Techniques 3.3. Addressing Uncertainty 3.4. Prioritization 3.5. Decisions under Risk 3.6. Decisions under Uncertainty 4. Economic Analysis Methods 4.1. For-Profit Decision Analysis 4.2. Minimum Acceptable Rate of Return 4.3. Return on Investment 4.4. Return on Capital Employed 4.5. Cost-Benefit Analysis 4.6. Cost-Effectiveness Analysis 4.7. Break-Even Analysis 4.8. Business Case 4.9. Multiple Attribute Evaluation Optimization Analysis 5. Practical Considerations 5.1. The Good Enough Principle 5.2. Friction-Free Economy 5.3. Ecosystems 5.4. Offshoring and Outsourcing 15
16 SOFTWARE PROJECT MANAGEMENT COURSE This dynamic and hands-on project management online course takes participants through the phases of a project, using the Process Groups and integrative framework. It is suitable for anyone who requires an introduction to project management. This course is aimed at those individuals operating as a member of a project team e.g. subject matter expert, task owner, coordinator etc. The qualification demonstrates that the candidate has a working knowledge of the processes and terminology as laid out in the Guide to the Project Management Body of Knowledge Learning Objectives: 1. Establish how all project activities are interrelated. 2. Know when and how to use the defined Tools and Techniques on projects. 3. Understand Project Management definitions, acornyms and terminology. 4. Feel comfortable with the examination format and typical question styles. 5. Gain essential skills necessary to work as a project team. 6. Develop interpersonal and general project management skills 1. Project Management Framework 1.1. PMBOK Trailer 1.2. PMBOK Introduction 1.3. Framework Introduction 1.4. Organization Structure 2. Project Integration Management 2.1. Project Integration Management Introduction 2.2. Develop Project Charter 2.3. Develop Project Management Plan 2.4. Direct and Manage project Work 2.5. Monitor and Control Project Work 2.6. Perform Integrated Change Control 2.7. Close Project or Phase 3. Project Scope Management 3.1. Project Scope Management Introduction 3.2. Plan Scope Management 3.3. Collect Requirements 3.4. Define Scope 3.5. Create WBS 3.6. Scrum Team 3.7. Validate Scope 3.8. Control Scope 4. Project Time Management 4.1. Project Time Management Introduction 4.2. Define Activities 4.3. Sequence Activities 4.4. Estimate Activity Resources 4.5. Estimate Activity Durations 4.6. Develop Schedule 4.7. Control Schedule 5. Project Cost Management 5.1. Project Cost Management Introduction 5.2. Plan Cost Management 5.3. Estimate Costs 5.4. Determine Budget 5.5. Control Costs 6. Project Quality Management 6.1. Product Quality Management Introduction 6.2. Plan Quality Management 6.3. Perform Quality Assurance Self-Paced Learning Approximate Time: 4 hours PDH 4 CEU 0.4 Member: $225 Non-Member $295 16
17 6.4. Control Quality 6.5. Project Quality Management 7. Project Human Resource Management 7.1. Project Human Resource Management Introduction 7.2. Plan Human Resource Management 7.3. Acquire Team Project 7.4. Develop Project Team 7.5. Manage Project Team 8. Project Communications Management 8.1. Project Communication Management Introduction 8.2. Manage Communications 8.3. Control Communications 9. Project Risk Management 9.1. Project Risk Management Introduction 9.2. Plan Risk Management 9.3. Identify Risks 9.4. Perform Qualitative Risk Analysis 9.5. Perform Quantitative Risk Analysis 9.6. Plan Risk Responses 9.7. Monitor and Control Risks 10. Project Procurement Management Project Procurement Management Introduction Project Communication Management Overview Plan Procurement Management Conduct Procurement Control Procurement Close Procurement 11. Project Stakeholder Management Project Stakeholder Management Introduction Identify Stakeholders Plan Stakeholder Management Manage Stakeholder Management 17
18 18
19 CONTINUING EDUCATION CERTIFICATES OF ACHIEVEMNET COURSES 19
20 CLOUD COMPUTING IN THE BUSINESS ENVIRONMENT Managers are often faced with having to decide if, and how to upgrade their IT infrastructure, and how to pay for it. In an environment of tight budgets and soaring hardware and software costs, they are also looking for alternatives to making huge investments that will have to be upgraded again and again. The Cloud can be that solution. Managers need information to make intelligent decisions however. Questions pertaining to Cloud economics, security, regulation and governance, metrics and migration are introduced and discussed. In the final analysis, managers must be able to answer key questions is the Cloud the right place for my IT infrastructure and data? Is it a good business decision? How do I migrate to the Cloud? This course introduces and discusses these and other key concepts. Module 1 Introduction to the Cloud Language of Cloud Computing Provenance of Cloud Computing Today s Players in Cloud Computing 2 Quiz Questions Module 2 Economics of the Cloud The Economics of the Cloud Measuring Net Present Value, Benefit Ratios, Payback Periods Where s the Payback? 2 Quiz Questions Module 3 Migrating to the Cloud How do you characterize your organization? What are your mission critical systems? Evolution or Big Bang? 2 Quiz Questions Self-Paced Learning Approximate Time: 90 Minutes PDH 1.5 CEU 0.15 Member: $45 Non-Member $65 20 Module 4 Business of Cloud Security Overview of principle security issues What kind of data can be entrusted to the Cloud? What kinds of data should not be entrusted to the Cloud? 2 Quiz Questions Module 5 Cloud Governance Managing Regulation within the Cloud 2 Quiz Questions
21 CLOUD GOVERNANCE AND SECURITY Migrating IT infrastructures to the Cloud is becoming a cost effective solution to the ever increasing burden of maintaining complex software and hardware systems. As with any new concept that plays a central role in business, the Cloud must be understood. Specifically, the differences between managing an in-house IT infrastructure versus a Cloud-based infrastructure are critical. Seeing the Cloud as a process rather than a product, implementing a governance plan and developing Cloud metrics are all part of Cloud governance. Additionally, securing data and processes within the Cloud are central to any migration considerations. Issues such as risk profiles, what information should and should not be committed to the Cloud, roles and rules, and access control must be taken into account. This course will examine these and other key concepts central to Cloud governance and data security. Module 1 Governance in the Cloud Introduction Key governance concepts Governance as a process vs. a product The essential elements Module 2 Implementing Governance in the Cloud Introduction Governance in SaaS, PaaS, IaaS Key governance metrics Managing the governance process Module 3 Cloud Security Introduction The risk profile Understanding the risks of the Cloud Deciding what information belongs in the cloud Self-Paced Learning Approximate Time: 130 Minutes PDH 2.16 CEU Member: $45 Non-Member $65 Module 4 Maintaining Security Introduction Protecting your cloud based systems Who has access? Roles, rules and access 21
22 CLOUD ECONOMICS, METRICS AND MIGRATION Deciding to migrate a business IT infrastructure to the Cloud involves a great deal more than the realization that one may not have to purchase all of the software, hardware and IT infrastructure nominally required to run the business. First, is it a sound economic decision? How can we measure net present value? Benefit ratios? Payback periods? Are there metrics we can use to determine if the Cloud is a viable solution? Measuring the Cloud requires that we examine issues of security, usage and response time in terms of metrics can these be quantified? Once a decision has been made to migrate, how can we devise a plan? Questions like how can I characterize my business; what are my mission critical systems, and do I follow the evolution or the Big Bang concept must be addressed. And, once there, how can a business establish sustainable operations within the Cloud? These and other key issues with migrating to the Cloud are addressed for the business management team contemplating a move into the Cloud. Module 1 Economics of the Cloud Introduction Net Present Value; Benefit Ratios; Payback Periods Common Infrastructure and Utility Pricing Economics of being Disconnected Module 2 Measuring the Cloud Introduction Security Metrics Usage Metrics Response Time Metrics Module 3 Cloud Migration Plan Introduction How do you characterize your organization? What are your mission critical systems? Evolution or Big Bang? Module 4 Sustainable Operations in the Cloud Introduction Now that you re there, what do you do? Maintenance in the Cloud? System Administration? Self-Paced Learning Approximate Time: 108 Minutes PDH 1.8 CEU 0.18 Member: $45 Non-Member $65 22 Module 5 Migrating to the Cloud How do you characterize your organization? What are your mission critical systems? Evolution or Big Bang? 2 Quiz Questions
23 FOUNDATIONS OF SECURE SOFTWARE Software security is becoming increasingly important due to the numerous emerging threats exploiting software vulnerabilities. This course provides a broad overview of various software security threats and some of the most effective countermeasures used to thwart both well-known and newly emerging software security threats. By taking this course, software practitioners will learn how to build security into their software products throughout its lifecycle. Although it is impossible to accomplish perfect security in software, the participants will be exposed to the best practices and tools available today to minimize their chance of falling victim to a common software security attack. Module 1-Introduction to Software Security Significance/importance of software security Software security terminology Software security resources (both online and offline) Module 2-Sources of software security threats Hardware level threats Code level threats Detailed design level threats Architecture level threats Requirements level threats Module 3-Software security best practices Security requirements elicitation Secure architecture best practices Detailed secure design best practices Secure coding best practices Secure deployment and operations best practices Module 4: Software security lifecycle General software lifecycle vs. secure software lifecycle Architectural risk analysis Measurement Project management Self-Paced Learning Approximate Time: 80 Minutes PDH 1.3 CEU 0.13 Member: $45 Non-Member $65 Module 5: Software security testing Code analysis White box testing Penetration testing Security testing tools Module 6: Careers in SW Security outlook and preparation 23
24 MANAGING SECURE SOFTWARE DEVELOPMENT Whenever a software system is developed and deployed, there is always an entity that will attempt to corrupt or misuse that software. Software security is thus a critical thread that must run through the entire software development life-cycle. The development of secure software is the ultimate goal. Software security involves a layered approach designed to deal with myriad threats and attack vectors based on an overall security policy that takes into account a variety of threat scenarios, the ROI of software security, the security supply chain, software assurance risk management and system evolution in an environment of neverending threats. This course examines software security from the perspective of managing secure software development. Module 1 Introduction to Secure Software Development Nature of software Software development life-cycle Software as a system Basics of security Module 2 Security in Detail Layered approach to security Threats and attack vectors Security policy and its importance Security from an ROI perspective Security supply chain Self-Paced Learning Approximate Time: 200 Minutes PDH 3.4 CEU 0.34 Member: $100 Non-Member $ Module 3 Software Security Risk Management Risk management overview Incident response In-house versus COTS Testing for security System evolution Module 4 Assurance Management Ownership issues Assurance management
25 SECURE SOFTWARE CODING Secure coding is becoming increasingly important due to various emerging threats. Although many of the existing secure coding best practices are programming language and domain specific, there are also language and domain neutral knowledge to be obtained by software developers. This course focuses on this attainment of comprehensive but practical secure coding knowledge. By exposing the audience to all the major secure coding concepts and tools available today, the primary goal of this course is to quickly improve the attendees overall security quality of coding practices and to prepare for learning more language and application-specific secure coding techniques. Module 1: Introduction to Secure Coding Significance/importance of secure coding [8, 11] Secure coding terminology [7, 12, 13] Secure coding principles [10, 15, 18, 20, 21] Threat modeling Secure coding resources (both online and offline) [14] Module 2: Vulnerabilities and Exploits Buffer overflows SQL injection [2, 19] Cross Site Scripting (XSS) [4, 9] Broken authentication and session management Insecure direct object references Security misconfiguration Sensitive data exposure Module 3: Countermeasures Secure coding standards [3] Secure coding best practices/patterns [1, 16] Intercepting validators Sanitization Session management Authentication Encryption Password management Access control Error handling and logging File management Memory management Self-Paced Learning Approximate Time: 167 Minutes PDH 2.8 CEU 0.28 Member: $100 Non-Member: $135 Module 4: Tools, Frameworks, and Services Microsoft Secure Development Process (SDP) Static analysis tools [17] Dynamic analysis tools Web application security frameworks [5, 6] Java-based enterprise application security frameworks Outsourcing Vulnerability tracking Module 5: Summary and Conclusion 25
26 SECURE SOFTWARE DESIGN This course offers a comprehensive coverage of practical knowledge in how to design secure software as well as insights on the significance of the role secure design plays during a software development life cycle. Some of the critical topics covered in this course include secure design principles and processes in addition to fundamental security concepts such as access control, encryption, etc. This course also devotes a significant amount of time to discussing well known secure design solutions including architectural patterns and design patterns focusing on security countermeasures and concludes with the discussion of software security analysis and evaluation as mechanisms to assess the effectiveness of the secure design solutions implemented in the form of source code. Self-Paced Learning Approximate Time: 107 Minutes PDH 1.8 CEU 0.18 Member: $45 Non-Member $ Secure Software Design Fundamentals 1.1. Significance of Secure Software Design 1.2. Secure Software Design Terminology 1.3. Secure Software Design Process 1.4. Secure Software Design Principles 2. Key Issues in Secure Software Design 2.1. Security Control Types 2.2. Access Control 2.3. Encryption Methods 2.4. Intrusion Detection and Prevention 2.5. Recovery 2.6. Accounting and Trust Management 3. Secure Software Structure and behavior 3.1. Security Patterns 3.2. Security Tactics 3.3. Practical Examples 4. Software Security Analysis and Evaluation 4.1. Analysis and Evaluation Techniques 4.2. Measures and Metrics 5. Software Security and Formal Methods 5.1. What are formal methods? 5.2. Formal Methods in Secure Software Design 5.3. Formal Methods and Common Criteria 5.4. Formal Method Tools
27 EMBEDDED SYSTEM Embedded software is found in most electronic devices designed today. Embedded software controls our cell phones, microwaves, network routers, automobiles, and industrial controls. Each of these embedded systems is unique and highly customized to the specific application. As a result, embedded systems development is a widely varying field that can take years to master. This course will cover some of the basic principles of writing software for embedded systems. The course will survey the issues and discusses the various techniques for dealing with them. In particular, the course discusses approaches to the appropriate use of the real-time operating systems upon which much embedded software is based. In addition to explaining what these systems do, this course provides guidance on how you can use them most effectively. The information in this course is not specific to any microprocessor or real-time operating system nor is it oriented towards any particular software design methodology. The principles are the same, regardless of which microprocessor and which real-time operating system and which software design methodology you use. We will concentrate on the principles that you can apply to almost any embedded system project. The material in this course will provide the necessary information to understand the embedded systems development cycle and the specialized aspects of developing and testing software in this environment. This course will also discuss the design considerations unique to embedded systems. The course will cover the key methods and technologies for each phase of the development process: specification, partition, design, integration, validation, and maintenance and upgrade. Self-Paced Learning Approximate Time: 6 Hours PDH 6.0 CEU 0.6 Member: $65 Non-Member $85 Part I Module 1-6 (total of 6 modules) 1. Megatrends and driving forces in IT and their linkages to embedded systems 2. Overview of embedded systems including characteristics, attributes, programming languages, processor technologies, and design challenges 3. Overview of real-time systems including common characteristics, interaction with hardware devices, and embedded systems design process 4. Current examples of embedded systems, structure of an embedded program, best practices, and typical code examples 5. Block design of embedded systems, optimal mix of software and hardware required to build a system, guide to selection of processors and peripherals, signal processing, and buffer design 6. DSP fundamentals and architecture and additional material to deepen understanding of embedded system software development Part II - Modules 7-11 (total of 5 modules) 7. Overview of Round Robin scheduling, Function Queues, brief introduction to Real-time Systems, and coding examples to strengthen understanding 8. Overview of Super Loop Architecture, additional characteristics of Real Time Operating systems (RTOS), and basic elements of Hardware Abstraction Layer (HAL) 9. Overview of task management, reentrancy, and use of semaphores 10. Additional details on scheduling and periodic tasks, 11. Rate monotonic analysis, and provide a Motor Control example Part III Modules (total of 3 modules) 12. Priority Inversion, fundamentals of optimization in embedded systems including: C code, importance of physical architecture, power, memory and cache 13. Impact of compilers in optimization, techniques to use compiler effectively including optimization levels, intrinsics, cross correlation, pragmas, data alignment 14. Using parallel ALU effectively including Partial Summation, Loop Unrolling, Software Pipelining, Multisampling, effective use of pointers, best practices Case study to deepen understanding of embedded systems development 27
28 MULTI-CORE VIDEO SERIES Multi-Core Lecture Series consists of 11 one-hour lectures by some of the world's leading researchers in the field. This series is not a course and it consists of the presentation for those who are in the research field. This is more intended for research information sharing than educational training. Topics that are covered during these lectures are listed below. This series also includes an hour discussion of the lecturers. Video Presentations: Automatic Parallelization by David Padu Autoparallelization for GPUs by Wen-Mei Hwu Dependences and Dependence Analysis by Utpal Banerjee Dynamic Parallelization by Rudolf Eigenmann Instruction Level Parallelization by Alexandru Nicolau Multigrain Parallelization and Power Reduction by Hironori Kasahara The Polyhedral Model by Paul Feautrier Vector Computation by David Kuck Vectorization by P. Sadayappan Vectorization/Parallelization in the IBM Compiler by Yaoqing Gao Vectorization/Parallelization in the Intel Compiler by Peng Tu Roundtable Discussion by all presenters Self-Paced Learning Approximate Time: 12 Hours PDH 12 CEU 1.2 Member: $495 Series Cost: Non-Member $695 Member: $95 Cost for Each Video: Non-Member $125 28
29 QUARTO Quartos are unique new short, tightly-focused topical courses, usually around thirty minutes, based on current articles in the Computer Society's twelve peer-reviewed magazines. Ranging across the entire field of computer science and engineering, Quartos are written by the leading researchers and thought leaders, and give learners an opportunity to pick up professional education credit for learning about what's happening in computer science and engineering today. In addition to an interactive learning experience, the course includes a digital copy of the original article on which it's based, so learners can build their own reference library. Courses: A Cloud Security Risk-Management Strategy Application-Screen Masking A Hybrid Approach Big Data Privacy in the Internet of Things Cyberhuman Security Denial and Deception in Cyber Defense Digital Data Grows into Big Data Inferring Mobile User Status with Usage Cues Internet of Things Making the Hype a Reality Internet of Things Perspectives Protecting Websites from Attack with Secure Delivery Networks Self-Paced Learning Approximate Time: 1 Hour PDH 1.0 CEU 0.1 Member: $19 Cost for Each Video: Non-Member $29 29
CREDENTIALS & CERTIFICATIONS 2015
THE COMMUNITY FOR TECHNOLOGY LEADERS www.computer.org CREDENTIALS & CERTIFICATIONS 2015 KEYS TO PROFESSIONAL SUCCESS CONTENTS SWEBOK KNOWLEDGE AREA CERTIFICATES Software Requirements 3 Software Design
More informationCREDENTIALS & CERTIFICATIONS 2016
THE COMMUNITY FOR TECHNOLOGY LEADERS www.computer.org CREDENTIALS & CERTIFICATIONS 2016 KEYS TO PROFESSIONAL SUCCESS CONTENTS SWEBOK KNOWLEDGE AREA CERTIFICATES Software Requirements 5 Software Design
More informationSoftware Engineering/Courses Description Introduction to Software Engineering Credit Hours: 3 Prerequisite: 0306211(Computer Programming 2).
0305203 0305280 0305301 0305302 Software Engineering/Courses Description Introduction to Software Engineering Prerequisite: 0306211(Computer Programming 2). This course introduces students to the problems
More informationCS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.
CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping
More informationITIL Service Lifecycles and the Project Manager
1 ITIL Service Lifecycles and the Project Manager The intersection of IT Service and Project Delivery Presented to: Kansas City Mid-America PMI Chapter Mark Thomas January 17, 2011 1 Agenda 2 Introduction
More informationInformation Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationMaster of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
More informationPHASE 5: DESIGN PHASE
PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed
More informationProtect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
More informationYour Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
More informationDeveloping and Implementing a Strategy for Technology Deployment
TechTrends Developing and Implementing a Strategy for Technology Deployment Successfully deploying information technology requires executive-level support, a structured decision-making process, and a strategy
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationBest-Practice Software Engineering: Software Processes to Support Project Success. Dietmar Winkler
Best-Practice Software Engineering: Software Processes to Support Project Success Dietmar Winkler Vienna University of Technology Institute of Software Technology and Interactive Systems Dietmar.Winkler@qse.ifs.tuwien.ac.at
More informationCDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationMeasurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
More informationFundamentals of Measurements
Objective Software Project Measurements Slide 1 Fundamentals of Measurements Educational Objective: To review the fundamentals of software measurement, to illustrate that measurement plays a central role
More information11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3
11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.
More informationUSING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES
Christina Kormos National Agency Phone: (410)854-6094 Fax: (410)854-4661 ckormos@radium.ncsc.mil Lisa A. Gallagher (POC) Arca Systems, Inc. Phone: (410)309-1780 Fax: (410)309-1781 gallagher@arca.com USING
More informationDeveloping the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
More informationBenefits of Test Automation for Agile Testing
Benefits of Test Automation for Agile Testing Manu GV 1, Namratha M 2, Pradeep 3 1 Technical Lead-Testing Calsoft Labs, Bangalore, India 2 Assistant Professor, BMSCE, Bangalore, India 3 Software Engineer,
More informationBasic Trends of Modern Software Development
DITF LDI Lietišķo datorsistēmu programmatūras profesora grupa e-business Solutions Basic Trends of Modern Software Development 2 3 Software Engineering FAQ What is software engineering? An engineering
More informationGlobal Delivery Excellence Best Practices for Improving Software Process and Tools Adoption. Sunil Shah Technical Lead IBM Rational
Global Delivery Excellence Best Practices for Improving Software Process and Tools Adoption Sunil Shah Technical Lead IBM Rational Agenda Organization s Challenges from a Delivery Perspective Introduction
More informationCHAPTER 7 Software Configuration Management
CHAPTER 7 Software Configuration Management ACRONYMS CCB CM FCA MTBF PCA SCCB SCI SCM SCMP SCR SCSA SEI/CMMI SQA SRS USNRC INTRODUCTION Configuration Control Board Configuration Management Functional Configuration
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
More informationSoftware Engineering. Software Processes. Based on Software Engineering, 7 th Edition by Ian Sommerville
Software Engineering Software Processes Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To introduce software process models To describe three generic process models and when
More informationEffective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1
More informationProject Knowledge Areas
From Houston S: The Project Manager s Guide to Health Information Technology Implementation. Chicago: HIMSS; 2011; pp 27 39. This book is available on the HIMSS online bookstore at www. himss.org/store.
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationMaster of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
More informationHKITPC Competency Definition
HKITPC Competency Definition for the Certification copyright 2011 HKITPC HKITPC Competency Definition Document Number: HKCS-CD-L1L2 Version: 1.0 Date: June 2011 Prepared by Hong Kong IT Professional Certification
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5. No. 8, November-December 2006 Requirements Engineering Tasks Donald Firesmith,
More informationITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0
ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key
More informationWhat is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
More informationSystem Development Life Cycle Guide
TEXAS DEPARTMENT OF INFORMATION RESOURCES System Development Life Cycle Guide Version 1.1 30 MAY 2008 Version History This and other Framework Extension tools are available on Framework Web site. Release
More informationIntroduction to SOA governance and service lifecycle management.
-oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA
More informationCertified Software Quality Engineer (CSQE) Body of Knowledge
Certified Software Quality Engineer (CSQE) Body of Knowledge The topics in this Body of Knowledge include additional detail in the form of subtext explanations and the cognitive level at which the questions
More informationIoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au
More informationVulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
More informationPartnering for Project Success: Project Manager and Business Analyst Collaboration
Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,
More informationSOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT
SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original
More informationSAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
More informationFive best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
More informationSoftware Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
More informationYour world runs on applications. Secure them with Veracode.
Application Risk Management Solutions Your world runs on applications. Secure them with Veracode. Software Security Simplified Application security risk is inherent in every organization that relies on
More informationTECHNOLOGY STRATEGY AUDIT
TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series
More informationTo introduce software process models To describe three generic process models and when they may be used
Software Processes Objectives To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software
More informationHead in the Cloud? What you Need to Know to Avoid getting caught in the Storm
Head in the Cloud? What you Need to Know to Avoid getting caught in the Storm David Cannon Author: ITIL Service Strategy 2011 Edition 1 Agenda Let s agree what definition we ll use How do we manage IT?
More informationModule 1 Study Guide Introduction to PPO. ITIL Capability Courses - Planning, Protection and Optimization
Module 1 Study Guide Introduction to PPO ITIL Capability Courses - Planning, Protection and Optimization Introducing PPO Welcome to your Study Guide. This document is supplementary to the information available
More informationComplete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
More informationDigital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
More informationPORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
More informationTERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
More informationSoftware Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC) Supriyo Bhattacharjee MOF Capability Maturity Model (CMM) A bench-mark for measuring the maturity of an organization s software process CMM defines 5 levels of process
More informationCISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
More informationMaster of Science in Software Engineering Student Guide
King Fahd University of Petroleum & Minerals College of Computer Sciences and Engineering Information and Computer Science Department Master of Science in Software Engineering Student Guide http://www.ccse.kfupm.edu.sa/swe/
More informationApplication of software product quality international standards through software development life cycle
Central Page 284 of 296 Application of software product quality international standards through software development life cycle Mladen Hosni, Valentina Kirinić Faculty of Organization and Informatics University
More informationExtreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
More informationSytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
More informationPMP Examination Tasks Puzzle game
PMP Examination Tasks Puzzle game Here is a great game to play to test your knowledge of the tasks you will be tested on in the actual examination. What we have done is take each of the domain tasks in
More informationBuild (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
More information<name of project> Software Project Management Plan
The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor
More informationNSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science
More informationWhite Paper. Business Analysis meets Business Information Management
White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute
More informationMIS 5203. Systems & Infrastructure Lifecycle Management 1. Week 13 April 14, 2016
MIS 5203 Lifecycle Management 1 Week 13 April 14, 2016 Study Objectives Systems Implementation contd Configuration Management Monitoring and Incident Management Post implementation Reviews Project Success
More informationTDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books are provided as an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews can not be printed. TDWI strives
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationThis volume is related to the topics of IT Governance and IT Portfolio Management.
ITIL Key Principles and Models This unit is aiming to help the candidate to comprehend and account for the key principles and models of Service Management and to balance some of the opposing forces within
More informationProject Management Certificate (IT Professionals)
Project Management Certificate (IT Professionals) Whether your field is architecture or information technology, successful planning involves a carefully crafted set of steps to planned and measurable goals.
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationDepartment of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
More informationSoftware Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas jmolini@microsoft.com http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
More informationIT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
More informationThe Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC
More informationIT Financial Management and Cost Recovery
WHITE PAPER November 2010 IT Financial Management and Cost Recovery Patricia Genetin Sr. Principal Consultant/CA Technical Sales David Messineo Sr. Services Architect/CA Services Table of Contents Executive
More informationLeveraging CMMI framework for Engineering Services
Leveraging CMMI framework for Engineering Services Regu Ayyaswamy, Mala Murugappan Tata Consultancy Services Ltd. Introduction In response to Global market demand, several OEMs adopt Global Engineering
More informationProject Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development
Project Planning and Management (PPM) V2.0 Project Type Guide Custom Development Version 1.1 January 2014 Last Revision: 1/22/2014 Page 1 Project Type Guide Summary: Custom Development Custom software
More informationRealizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
More informationSoftware Engineering. What is a system?
What is a system? Software Engineering Software Processes A purposeful collection of inter-related components working together to achieve some common objective. A system may include software, mechanical,
More informationContinuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
More informationPASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationManaging Small Software Projects - An Integrated Guide Based on PMBOK, RUP, and CMMI
Managing Small Software Projects - An Integrated Guide Based on PMBOK, RUP, and CMMI César Cid Contreras M.Sc. Prof. Dr. Henrik Janzen Published at the South Westphalia University of Applied Sciences,
More informationCloud Security Specialist Certification Self-Study Kit Bundle
Cloud Security Specialist Certification Bundle CloudSchool.com CLOUD CERTIFIED Technology Professional This certification bundle provides you with the self-study materials you need to prepare for the exams
More informationApplication Outsourcing: The management challenge
White Paper Application Outsourcing: The management challenge Embedding software quality management for mutual benefit Many large organizations that rely on mainframe applications outsource the management
More informationLinux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
More informationSWEBOK Certification Program. Software Engineering Management
SWEBOK Certification Program Software Engineering Management Copyright Statement Copyright 2011. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted
More informationAn ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
More informationVALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
More informationQlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
More informationFACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software
More informationVirtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
More informationENERGISTICS E&P BUSINESS PROCESS REFERENCE MODEL
ENERGISTICS E&P BUSINESS PROCESS REFERENCE MODEL Access, receipt, or use of the E&P Business Process Reference Model is subject to the Energistics Product License Agreement found on the Energistics website.
More informationDescription of the program
Study program Faculty Cycle Software Engineering Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program The Masters programme in Software Engineering
More informationThe Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
More informationSoftware Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University
Software Engineering Introduction & Background Department of Computer Science Kent State University Complaints Software production is often done by amateurs Software development is done by tinkering or
More informationMaster Data Management
Master Data Management Managing Data as an Asset By Bandish Gupta Consultant CIBER Global Enterprise Integration Practice Abstract: Organizations used to depend on business practices to differentiate them
More informationA Guide To The Project Management Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition
A Guide To The Project Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition Major Changes The adoption of the verb-noun format for process names Amplification as to Enterprise
More informationAdvancing Your Business Analysis Career Intermediate and Senior Role Descriptions
Advancing Your Business Analysis Career Intermediate and Senior Role Descriptions The role names listed in the Career Road Map from International Institute of Business Analysis (IIBA) are not job titles
More information