An advanced level course to specify and model systems requirements using use cases for experienced Business Analysts.
Advanced concepts in Use Case Modelling course uses an integrated case-study based approach.
This is an advanced level course and hence suitable for business analysts who are experienced (or at least trained) in writing simple use case descriptions. This course is ideal for those who want to learn to use relationship between use cases or about misuse and security use cases but do not want to spend extensive time in self study.
With this business analysis training, you will be able to acquire skills to write detailed use case descriptions using the include, extend and generalization relationships. You will also be able to talk confidently about relationship between use cases, misuse and security use cases in your business analyst interviews.
In this course, you will get a recap on fundamental concepts in use case modelling before you learn advanced concepts in use case modelling. In overview of relationship between use cases, you will understand the need for using relationship between use cases, and get an overview on purpose of each relationship and about modelling them in use case diagrams.
You will learn to write detailed use case descriptions by using the include, extend and generalization relationships.
You will also learn to identify and mitigate security threats to the system by identifying misuse cases and security use cases.
The whole course will take less than 2 hours to complete.
This course includes lectures with examples and case study to help you learn advanced concepts in the use case modelling. You will be able to attempt quiz at the end of each session to check your understanding. You will also be able to download an enhanced version of self-explanatory use case template for personal or commercial use.
Understand the need for using Relationships between Use Cases
Create Use Case Diagrams using Relationships between Use Cases
Write detailed Use Case Descriptions using Include, Extend and Generalization Relationships.
Identify and mitigate security threats using Misuse Cases and Security Use Cases.
Who is the target audience?
Suitable for Business Analysts experienced (or trained) in writing simple use case descriptions
Suitable for Business Analysts who aspire to lead business analysis projects using use case modelling