Lecture Series | Description | Lecture By |
---|---|---|
Lecture 1 | Software Characteristics & Applications | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 2 | Software Process | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 3 | Software Process Models; Linear Sequential Model, Prototyping Model, RAD Model | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 4 | Evolutionary Software Process Models | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 5 | Software Development Process | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 6 | Software Requirement, Software Requirements Specification | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 7 | Requirements Validation | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 8 | Software Design Principles | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 9 | Software Project Estimation: Size Oriented, Function Oriented, Software Metrics, Software Cost Estimation | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 10 | COCOMO Model | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 11 | Project Scheduling | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 12 | Software Staff & Personnel Planning | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 13 | Rayleigh Curve | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 14 | Software Team Organization & Control Structure | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 15 | Project Monitoring & Control Techniques | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 16 | Software Quality, Software Quality Assurances | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 17 | Software Testing, Formal Technical Reviews | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 18 | ISO Software Quality Standards | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 19 | Software Configuration Management | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 20 | SCM Process | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 21 | Configuration Audit. | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 22 | Software Risks, Reactive and Pro-active Risk Strategies | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 23 | Risk Identification, Risk Projection | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 24 | Risk Mitigation, Risk Monitoring and Management | Lecture by A, Lecture by B, Lecture by C, Lecture by D |