Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Backlogs, Requirements Management, User Requirements Documents, Performance Measurement, Requirements Analysis, Business Analysis, Root Cause Analysis, Project Performance, Performance Analysis, Jira (Software), Solution Architecture, Process Improvement, Data-Driven Decision-Making, Prioritization, Change Management, Stakeholder Management
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Big Data, Data Analysis, Statistical Analysis, Apache Hadoop, Apache Hive, Data Collection, Data Mart, Data Warehousing, Data Storytelling, Apache Spark, Data Cleansing, Data Lakes, Data Visualization Software, SQL
Skills you'll gain: Requirements Elicitation, User Story, Business Requirements, Business Analysis, Business Systems Analysis, Requirements Analysis, Financial Analysis, Product Requirements, Requirements Management, Business Process Modeling, Process Analysis, Stakeholder Engagement, Interviewing Skills, Cost Benefit Analysis, Verification And Validation
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
University of Colorado System
Skills you'll gain: Security Requirements Analysis, Requirements Analysis, Risk Management Framework, User Requirements Documents, Scalability, Verification And Validation
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Cyber Security Policies, Data Security, Encryption, Security Strategy, Incident Management
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Statistical Methods, ChatGPT, Keras (Neural Network Library), Unsupervised Learning, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Deep Learning, Data Manipulation, Regression Analysis, PyTorch (Machine Learning Library), Data Transformation, Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Documentation, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology, Technical Communication
University of Colorado System
Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Functional Requirement, Goal Setting, Unified Modeling Language, Meeting Facilitation, Conflict Management, Risk Analysis, User Story, Stakeholder Engagement, Negotiation
In summary, here are 10 of our most popular security requirements analysis courses
- Google Cybersecurity: Google
- Advanced Requirements Management & Solution Evaluation: Starweaver
- Microsoft Cybersecurity Analyst: Microsoft
- Introduction to Data Analytics: IBM
- Advanced Business Analysis: Elicitation & Analysis: Starweaver
- IT Security: Defense against the digital dark arts : Google
- Ask Questions to Make Data-Driven Decisions: Google
- Software Requirements Prioritization: Risk Analysis: University of Colorado System
- CompTIA Security+ 701: Infosec
- IBM Generative AI Engineering: IBM