Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
University of Illinois Urbana-Champaign
Skills you'll gain: Data Visualization, Data Visualization Software, Text Mining, Data Presentation, Data Mining, Interactive Data Visualization, Data Storytelling, Dashboard, Visualization (Computer Graphics), Tableau Software, Plot (Graphics), Natural Language Processing, Unsupervised Learning, Unstructured Data, Statistical Analysis, Graphing, Big Data, Anomaly Detection, Analytics, Data Validation
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
Ludwig-Maximilians-Universität München (LMU)
Skills you'll gain: Business Strategy, Game Theory, Strategic Thinking, Competitive Analysis, Strategic Partnership, Product Strategy, Strategic Decision-Making, Market Dynamics, New Product Development, Market Analysis, Innovation
Multiple educators
Skills you'll gain: Data Engineering, Apache Airflow, Data Modeling, Data Pipelines, Data Storage, Data Architecture, Data Transformation, Requirements Analysis, Data Processing, Data Warehousing, Query Languages, Apache Hadoop, Extract, Transform, Load, Data Lakes, Amazon Web Services, File Systems, Database Systems, Data Integration, AWS Kinesis, Infrastructure as Code (IaC)
Johns Hopkins University
Skills you'll gain: Life Sciences, Treatment Planning, Clinical Research, General Medical Tests and Procedures, Medical Science and Research, Image Analysis, Epidemiology, Risk Analysis, Anatomy, General Science and Research
Microsoft
Skills you'll gain: Microsoft Excel, Excel Formulas, Data Visualization, Spreadsheet Software, Microsoft 365, Productivity Software, Data Analysis Software, Data Import/Export, Data Management, File Management
IIMA - IIM Ahmedabad
Skills you'll gain: Sampling (Statistics), Probability, Statistical Hypothesis Testing, Statistics, Probability Distribution, Statistical Methods, Statistical Inference, Estimation, Statistical Analysis, Descriptive Statistics, Sample Size Determination, Data Analysis, Data-Driven Decision-Making
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Controls, Document Management, Digital Communications, Record Keeping, Data Integrity, Technical Communication
University of Washington
Skills you'll gain: Applied Machine Learning, Feature Engineering, Regression Analysis, Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Supervised Learning, Deep Learning, Classification And Regression Tree (CART), Computer Vision, Predictive Modeling, Natural Language Processing, Text Mining, Python Programming
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Analysis, Finance, Accounting, Financial Accounting, Business Valuation, Financial Statements, Financial Management, Balance Sheet, Corporate Finance, Income Statement, Entrepreneurial Finance, Risk Analysis, Cash Flows, Investment Management
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Cloud Computing, Data Storage, Cloud Storage, Cloud Security, System Monitoring, Encryption, SQL
Skills you'll gain: Data Ethics, Google Cloud Platform, Applied Machine Learning, Image Analysis, Machine Learning, Computer Vision, Data Strategy, Business Ethics, Data Governance, Analytical Skills, Feasibility Studies, Business Analysis, Project Management Life Cycle, Business Intelligence
In summary, here are 10 of our most popular security requirements analysis courses
- Data Mining: University of Illinois Urbana-Champaign
- Managing Cybersecurity: Kennesaw State University
- Competitive Strategy: Ludwig-Maximilians-Universität München (LMU)
- DeepLearning.AI Data Engineering: DeepLearning.AI
- Introduction to the Biology of Cancer: Johns Hopkins University
- Work Smarter with Microsoft Excel: Microsoft
- Pre-MBA Statistics: IIMA - IIM Ahmedabad
- Incident Response and Digital Forensics: IBM
- Machine Learning Foundations: A Case Study Approach: University of Washington
- Introduction to Financial Analysis - The "Why?": University of Illinois Urbana-Champaign