Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
Coursera Project Network
Skills you'll gain: Microsoft Excel, Excel Formulas, Spreadsheet Software, Pivot Tables And Charts, Data Analysis, Data Manipulation, Data Mining
Skills you'll gain: Project Scoping, Project Documentation, Project Management Life Cycle, Project Management, Goal Setting, Project Management Software, Stakeholder Management, Cost Benefit Analysis, Resource Allocation, Accountability
University of Illinois Urbana-Champaign
Skills you'll gain: Descriptive Statistics, Supply And Demand, Market Dynamics, Sampling (Statistics), Statistical Inference, Business Analytics, Bank Regulations, Financial Systems, Financial Policy, Banking, Probability Distribution, Statistical Analysis, Statistical Hypothesis Testing, Regression Analysis, Microsoft Excel, Data-Driven Decision-Making, Statistical Methods, Economics, Financial Market, Business Economics
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
University of Michigan
Skills you'll gain: Network Analysis, Network Model, Graph Theory, Data Analysis, Predictive Analytics, Exploratory Data Analysis, Applied Machine Learning, Unsupervised Learning
University of Alberta
Skills you'll gain: Sprint Planning, Project Risk Management, User Story, Backlogs, Agile Methodology, User Requirements Documents, Functional Requirement, Agile Project Management, Requirements Analysis
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, Cyber Operations, Information Technology Operations, Automation
- Status: [object Object]
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Jupyter, Generative AI, Professional Networking
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
University of California San Diego
Skills you'll gain: Big Data, Apache Hadoop, Scalability, Data Processing, Data Science, Distributed Computing, Unstructured Data, Data Analysis, Data Storage
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Finance, Financial Data, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Spreadsheet Software, Google Sheets, Excel Formulas
In summary, here are 10 of our most popular security requirements analysis courses
- Introduction to User Experience Design : Georgia Institute of Technology
- Introduction to Data Analysis using Microsoft Excel: Coursera Project Network
- Project Initiation: Starting a Successful Project: Google
- Managerial Economics and Business Analysis: University of Illinois Urbana-Champaign
- Software Security for Web Applications: Codio
- Applied Social Network Analysis in Python: University of Michigan
- Agile Planning for Software Products: University of Alberta
- SOAR for Enterprise Security: Codio
- IBM Data Engineering: IBM
- Cybersecurity and Its Ten Domains: Kennesaw State University