Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Microsoft Azure, Threat Management, Disaster Recovery, Security Strategy, Cybersecurity, Data Governance, Information Assurance, Personally Identifiable Information, Security Controls, Information Privacy, General Data Protection Regulation (GDPR), Identity and Access Management
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Linux, Encryption, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
University of Michigan
Skills you'll gain: Matplotlib, Network Analysis, Feature Engineering, Plot (Graphics), Data Visualization Software, Interactive Data Visualization, Pandas (Python Package), Applied Machine Learning, Supervised Learning, Text Mining, Scikit Learn (Machine Learning Library), Network Model, Jupyter, NumPy, Graph Theory, Data Manipulation, Natural Language Processing, Data Analysis, Data Processing, Unstructured Data
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, PostgreSQL, Jupyter, Generative AI
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
In summary, here are 10 of our most popular security requirements analysis courses
- Usable Security: University of Maryland, College Park
- Operating Systems: Overview, Administration, and Security: IBM
- Connect and Protect: Networks and Network Security: Google
- Cybersecurity Management and Compliance: Microsoft
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Cybersecurity Tools and Technologies: Microsoft
- Google IT Support: Google
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Security in Google Cloud: Google Cloud
- Applied Data Science with Python: University of Michigan