Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Skills you'll gain: Business Process Modeling, Business Analysis, Process Analysis, Process Optimization, Stakeholder Management, Business Requirements, Requirements Management, Data Modeling, Requirements Analysis, Business Process Improvement, Agile Methodology, User Story, Gap Analysis, Prioritization
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Skills you'll gain: Strategic Thinking, Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Apache Hadoop, Product Lifecycle Management, Business Technologies
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
University of Colorado System
Skills you'll gain: Requirements Elicitation, Requirements Analysis, Mockups, Interviewing Skills, Storyboarding, Functional Requirement, Business Requirements, Prototyping, User Research, Stakeholder Engagement, Information Architecture, Scenario Testing, Prioritization
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Role-Based Access Control (RBAC), Data Ethics, Data Integrity, Identity and Access Management
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Transformation, Data Import/Export, Predictive Modeling, Web Scraping, Interactive Data Visualization, Automation, Python Programming
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
In summary, here are 10 of our most popular security requirements analysis courses
- Foundations: Data, Data, Everywhere: Google
- Advanced Cybersecurity Concepts and Capstone Project: Microsoft
- Cybersecurity Tools and Technologies: Microsoft
- Business Analysis: Process Modeling & Requirements Gathering: SkillUp EdTech
- IT Security: Defense against the digital dark arts : Google
- IBM & Darden Digital Strategy: IBM
- Cybersecurity Risk Management Framework: Infosec
- Requirements Elicitation: Artifact and Stakeholder Analysis: University of Colorado System
- Security Concepts and Practices: ISC2
- Applied Data Science: IBM