Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
Skills you'll gain: Data Mining, Big Data, Cloud Computing, Data Analysis, Data Science, Digital Transformation, Data-Driven Decision-Making, Business Logic, Deep Learning, Machine Learning, Artificial Intelligence
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Containerization, Cloud Applications, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Management, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Network Planning And Design
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
Skills you'll gain: Business Intelligence, Data Integration, Stakeholder Engagement, Dashboard, Data Modeling, Business Analytics, Real Time Data, Requirements Elicitation, Data Storytelling, Data Analysis, Business Metrics, Key Performance Indicators (KPIs), Data Pipelines, Project Implementation
Skills you'll gain: Data Validation, Spreadsheet Software, Data Analysis, Data Manipulation, Excel Formulas, Query Languages, Pivot Tables And Charts, SQL, Data Transformation, Database Management, Data Import/Export, Constructive Feedback
- Status: Free
Yale University
Skills you'll gain: Growth Mindedness, Optimism, Positive Behavior Support, Goal Setting, Resilience, Self-Motivation, Self-Awareness, Emotional Intelligence, Mental Health, Psychology, Social Skills, Decision Making, Time Management
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Manipulation, Data Transformation, Data Validation, Data Analysis, Pivot Tables And Charts, Automation
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: Exploratory Data Analysis, Data Visualization, Ggplot2, Dimensionality Reduction, Data Visualization Software, R Programming, Graphing, Data Storytelling, Data Analysis, Statistical Analysis, Unsupervised Learning, Statistical Methods
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
In summary, here are 10 of our most popular security requirements analysis courses
- What is Data Science? : IBM
- Preparing for Google Cloud Certification: Cloud Architect: Google Cloud
- The Bits and Bytes of Computer Networking: Google
- Foundations of Business Intelligence: Google
- Analyze Data to Answer Questions: Google
- The Science of Well-Being: Yale University
- Advanced Network Security and Analysis: Johns Hopkins University
- Excel Fundamentals for Data Analysis: Macquarie University
- Introduction to Computers and Operating Systems and Security: Microsoft
- Exploratory Data Analysis: Johns Hopkins University