Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
Duke University
Skills you'll gain: Deductive Reasoning, Logical Reasoning, Computational Logic, Probability, Sampling (Statistics), Persuasive Communication, Research, Writing, Statistical Inference, Correlation Analysis, Scientific Methods, Interpersonal Communications, Interactive Learning, Learning Strategies
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: Anatomy, Radiology, Image Analysis, Data Analysis, Analysis, Data Manipulation, Analytical Skills, Experimentation, Research Design, R Programming, Statistical Analysis, Psychology, Network Analysis, Data Processing, Regression Analysis, Scientific Visualization, Science and Research, Scientific Methods, Medical Science and Research, Data Transformation
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Application Programming Interface (API), Data Integrity, Virtualization
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
University of Pennsylvania
Skills you'll gain: Matplotlib, Data Analysis, Pandas (Python Package), Data Science, Data Cleansing, Pivot Tables And Charts, Data Visualization Software, Data Manipulation, Scatter Plots, NumPy, Data Quality, Jupyter, Data Import/Export, Histogram, Python Programming, Programming Principles
- Status: Free
Knowledge Accelerators
Skills you'll gain: Power BI, Dashboard, Data Presentation, Data Visualization Software, Interactive Data Visualization, Data Import/Export, Business Intelligence, Microsoft Excel, Data Analysis, Data-Driven Decision-Making, Data Modeling
Duke University
Skills you'll gain: Database Design, MySQL, Relational Databases, SQL, Data Modeling, Databases, Business Analytics, Big Data, Business Analysis, Data Analysis, Data Manipulation, Data Management
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Spreadsheet Software, Excel Formulas, Data Analysis Expressions (DAX), Consolidation, Business Reporting, Data Management, Automation
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: Free
Case Western Reserve University
Skills you'll gain: Criminal Investigation and Forensics, International Relations, Adjudication, Diplomacy, Law, Regulation, and Compliance, Public Safety and National Security, Political Sciences, Ethical Standards And Conduct, Social Justice, Advocacy, Research, Interactive Learning, Policy Analysis
In summary, here are 10 of our most popular security requirements analysis courses
- Introduction to Logic and Critical Thinking: Duke University
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Neuroscience and Neuroimaging: Johns Hopkins University
- Computer Communications: University of Colorado System
- Introduction to Security Principles in Cloud Computing: Google Cloud
- Enterprise System Management and Security : University of Colorado System
- Data Analysis Using Python: University of Pennsylvania
- From Excel to Power BI: Knowledge Accelerators
- Managing Big Data with MySQL: Duke University
- Excel Skills for Business: Intermediate I: Macquarie University