Software Testing Fundamentals

Dr. Michael Scott Brown , Dr. Renata Rand McFadden, USMx

Learn how to locate software bugs and defects using the latest testing techniques.

Want to gain software testing skills to start a career or are you a software developer looking to improve your unit testing skills? This course, part of the Software Testing and Verification MicroMasters program, will provide the essential skills you need for success. 

Software needs to be tested for bugs and to insure the product meets the requirements and produces the desired results. Software testing is essential to providing a quality product. 

Learn the techniques Software Testers and Quality Assurance Engineers use every day, which can be applied to any programming language and testing software.

No previous programming knowledge needed. This course will use Java and JUnit, however, for examples and assignments.

This course is part of the Software Testing and Verification MicroMaster’s program from UMUC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMUC Master’s Program in Information Technology with a specialization in Software Engineering without any application process or testing. See the MicroMasters program page for more.

What will you learn

  • Develop, document and execute software test cases
  • Create a software test to meet an objective
  • Identify types of software defects

Сессии:
  • 22 октября 2018, 8 недель
Характеристики онлайн курса:
  • Бесплатный:
  • Платный:
  • Сертификат:
  • MOOC:
  • Видеолекции:
  • Аудиолекции:
  • Email-курс:
  • Язык: Английский Gb

Отзывы

Пока никто не написал отзыв по этому курсу. Хотите быть первым?

Зарегистрируйтесь, чтобы оставить отзыв

Ещё курсы на эту тему:
54c2620f-ace4-4d32-809d-69ff203aa38b-43c8279a4c62.small Hello (Real) World with ROS – Robot Operating System
Learn the fundamentals of ROS, Robot Operating System, to create advanced robotic...
Slide1 Programming Mobile Applications for Android Handheld Systems
Introduction to the design and implementation of applications for handheld systems...
Small-icon.hover Design: Creation of Artifacts in Society
Combine fundamental concepts with hands-on design challenges to become a better...
Large-icon Fundamentals of Electrical Engineering Laboratory
This hands-on laboratory course complements Coursera's Fundamentals of Electrical...
Meta1 Metadata: Organizing and Discovering Information
Metadata is an unsung hero of the modern world, the plumbing that makes the...
Ещё из рубрики «Компьютерные науки»:
Bb90d02a-a562-4632-a0af-e72987f27fea-081bda0d942b.small Cybersecurity Fundamentals
Learn cybersecurity fundamentals, including how to detect threats, protect systems...
D2fb4b76-e398-42d8-9835-970a49678fa3-27d6ebda8cb9.small Computer Forensics
Learn the process, techniques and tools for performing a digital forensics investigation...
05fa3fc6-a169-41aa-a67c-3985abf7db0b-3bd5f54592bc.small Cybersecurity Capstone
Demonstrate the knowledge and skills acquired in the Cybersecurity MicroMasters...
8e901136-3c8a-49c0-a3c2-48e9f5c31fd7-dc0437e2d659.small Introduction to Open Source Networking Technologies
Learn technical fundamentals needed to adopt SDN, NFV, disaggregation, orchestration...
Regular_7b541420-e149-42fe-86cd-93e4588aaed5 Why We Post: the Anthropology of Social Media
Discover the varying uses of social media around the world and its consequences...
Ещё от edX:
85efb1e5-3a5f-4208-9557-d49de63f8bf3-99199f8f9c00.small Thinking & Acting like an Entrepreneur
Discover the entrepreneur inside of you – learn what it takes to turn...
19e9fb79-a26b-403d-ace9-90b55f9d1573-91ecb59bf6c2.small Sikhism Through Its Scriptures
This course examines the Sikh scripture from a doctrinal and historical perspective...
B6c4593e-d876-4326-a445-c8777c25cf83-09a793ff9944.small Marketing Management
Learn key marketing strategies and tactics to help your company develop products...
Bb90d02a-a562-4632-a0af-e72987f27fea-081bda0d942b.small Cybersecurity Fundamentals
Learn cybersecurity fundamentals, including how to detect threats, protect systems...
D2fb4b76-e398-42d8-9835-970a49678fa3-27d6ebda8cb9.small Computer Forensics
Learn the process, techniques and tools for performing a digital forensics investigation...

© 2013-2017