Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
- Status: Free
Wesleyan University
Skills you'll gain: Integral Calculus, Mathematical Theory & Analysis, Algebra, Advanced Mathematics, Geometry, Calculus, Visualization (Computer Graphics), Graphing, Derivatives
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
University of Michigan
Skills you'll gain: Hypertext Markup Language (HTML), Web Design, Web Content Accessibility Guidelines, Usability, Web Development, Semantic Web, Cloud Hosting, Web Servers, Data Validation
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, System Monitoring, Network Security
Skills you'll gain: Power BI, Data-Driven Decision-Making, Data Analysis, Microsoft Power Platform, Extract, Transform, Load, Data Collection, Business Intelligence, Business Analytics, Data Transformation, Business Analysis, Data Visualization Software, Microsoft 365, Data Management
Macquarie University
Skills you'll gain: Pivot Tables And Charts, Data Storytelling, Data Presentation, Power BI, Excel Formulas, Data Analysis Expressions (DAX), Data Visualization Software, Data Visualization, Interactive Data Visualization, Microsoft Excel, Spreadsheet Software, Dashboard, Data Modeling, Data Cleansing, Data Manipulation, Excel Macros, Infographics, Data Transformation, Data Validation, Data Warehousing
Duke University
Skills you'll gain: Hypertext Markup Language (HTML), Web Design and Development, Cascading Style Sheets (CSS), Web Development, Programming Principles, Javascript, Web Applications, Front-End Web Development, Computer Programming, Image Analysis, Debugging
Johns Hopkins University
Skills you'll gain: Bioinformatics, Unix Commands, Biostatistics, Exploratory Data Analysis, Statistical Analysis, Unix, Data Science, Data Management, Statistical Methods, Command-Line Interface, Statistical Hypothesis Testing, Linux Commands, Science and Research, Statistical Modeling, Data Structures, Data Analysis, R Programming, Computational Thinking, Statistical Programming, Jupyter
Skills you'll gain: Exploratory Data Analysis, Unsupervised Learning, Supervised Learning, Feature Engineering, Dimensionality Reduction, Data Cleansing, Applied Machine Learning, Data Access, Regression Analysis, Data Analysis, Machine Learning, Statistical Inference, Statistical Hypothesis Testing, Data Quality, Machine Learning Algorithms, Classification And Regression Tree (CART), Scikit Learn (Machine Learning Library), Probability & Statistics, Data Validation, Predictive Modeling
Skills you'll gain: Continuous Monitoring, NIST 800-53, Security Controls, Risk Management Framework, Authorization (Computing), Security Strategy, Security Management, Configuration Management, Cyber Risk, Change Control, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Cyber Security Assessment, Vulnerability Assessments
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
In summary, here are 10 of our most popular security requirements analysis courses
- Tools of the Trade: Linux and SQL: Google
- Introduction to Complex Analysis: Wesleyan University
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Introduction to HTML5: University of Michigan
- Microsoft Azure Security Engineer Associate (AZ-500): Microsoft
- Harnessing the Power of Data with Power BI: Microsoft
- Excel Skills for Data Analytics and Visualization: Macquarie University
- Programming Foundations with JavaScript, HTML and CSS: Duke University
- Genomic Data Science: Johns Hopkins University
- IBM Introduction to Machine Learning: IBM