Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, PostgreSQL, Jupyter, Generative AI
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, Business Analysis, Requirements Elicitation, Process Flow Diagrams, User Requirements Documents, Requirements Management, Business Process, Waterfall Methodology, Decision Making
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Quality, Pivot Tables And Charts, Google Sheets, Data Entry, Data Manipulation, Information Privacy
University of Colorado System
Skills you'll gain: Requirements Elicitation, Requirements Analysis, Mockups, Interviewing Skills, Storyboarding, Prototyping, User Research, Stakeholder Engagement, Scenario Testing, Prioritization, Business Research
- Status: [object Object]
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Data Manipulation, Excel Formulas, Professional Networking
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Security Controls, Data Security, Customer Relationship Building, Network Security, Team Oriented
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
Skills you'll gain: Malware Protection, Computer Security Awareness Training, Security Awareness, Mobile Security, Network Security, Data Security, Cyber Attacks, Cybersecurity, Human Factors (Security), Email Security, Identity and Access Management, Multi-Factor Authentication, Authentications
Skills you'll gain: Dashboard, SQL, Descriptive Statistics, Jupyter, Statistical Analysis, Data Analysis, Probability Distribution, Pandas (Python Package), Data Visualization Software, Statistics, Data Visualization, Statistical Hypothesis Testing, Databases, Stored Procedure, Web Scraping, Relational Databases, Automation, Data Science, GitHub, Python Programming
In summary, here are 10 of our most popular security requirements analysis courses
- IBM Relational Database Administrator: IBM
- IBM Back-End Development: IBM
- Python Data Structures: University of Michigan
- Advanced System Security Design: University of Colorado System
- Analysis for Business Systems: University of Minnesota
- Excel Basics for Data Analysis: IBM
- Requirements Elicitation: Artifact and Stakeholder Analysis: University of Colorado System
- IBM Data Analyst: IBM
- Security Operations Center (SOC): Cisco Learning and Certifications
- Data Security: Cisco Learning and Certifications