Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security requirements analysis"
Skills you'll gain: Project Management, Milestones (Project Management), Data Storytelling, Requirements Analysis, Project Scoping, Stakeholder Management, Project Planning, Project Documentation, Quality Management, Interviewing Skills, Communication
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation
Skills you'll gain: Requirements Elicitation, Business Analysis, Backlogs, Requirements Management, Business Systems Analysis, Stakeholder Engagement, Business Process, Business Workflow Analysis, User Requirements Documents, User Story, Business Requirements, Stakeholder Management, Business Modeling, Business Intelligence, Business Risk Management, Business Strategies, Financial Analysis, Performance Measurement, Business Process Modeling, Requirements Analysis
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Security, Data Migration, Database Design, Data Visualization, Data Governance, MySQL, Extract, Transform, Load, Cloud Storage, Data Visualization Software, IBM DB2, Data Management, Relational Databases, Stored Procedure, Data Architecture, Excel Formulas, Microsoft Excel
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Correlation Analysis, Web Scraping, NumPy, Probability & Statistics, Predictive Modeling, Big Data, Automation, Data Visualization Software, Data Collection, Data Science, GitHub, Python Programming, Machine Learning Algorithms, Unsupervised Learning
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
University of Michigan
Skills you'll gain: Pandas (Python Package), Jupyter, NumPy, Data Manipulation, Data Science, Data Analysis, Statistical Analysis, Pivot Tables And Charts, Data Cleansing, Data Import/Export, Probability & Statistics, Python Programming, Programming Principles
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
In summary, here are 10 of our most popular security requirements analysis courses
- Capstone: Applying Project Management in the Real World: Google
- Cybersecurity Case Studies and Capstone Project: IBM
- Key Technologies for Business: IBM
- Certified Business Analysis Professional™ (CBAP®): Starweaver
- Security & Safety Challenges in a Globalized World: Universiteit Leiden
- Cybersecurity Risk Management Framework: Infosec
- Security Concepts and Practices: ISC2
- IBM Data Management: IBM
- Data Science Foundations: IBM
- Security Operations: ISC2