Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Finance, Financial Data, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Spreadsheet Software, Google Sheets, Excel Formulas
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Regression Analysis, Statistical Analysis, Advanced Analytics, Correlation Analysis, Analytics, Data Analysis, Statistical Methods, Predictive Modeling, Statistical Modeling, Supervised Learning, Statistics, Statistical Machine Learning, Variance Analysis, Machine Learning Methods, Python Programming
- Status: [object Object]
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
- Status: [object Object]
Skills you'll gain: Dashboard, Data Visualization Software, Data Wrangling, Data Visualization, SQL, Supervised Learning, Feature Engineering, Plotly, Interactive Data Visualization, Jupyter, Exploratory Data Analysis, Data Mining, Data Cleansing, Matplotlib, Data Analysis, Unsupervised Learning, Generative AI, Pandas (Python Package), Data Manipulation, Professional Networking
Skills you'll gain: Requirements Elicitation, Business Analysis, Backlogs, Requirements Management, Business Systems Analysis, Stakeholder Engagement, Business Process, Business Workflow Analysis, User Requirements Documents, User Story, Business Requirements, Stakeholder Management, Business Modeling, Business Intelligence, Business Risk Management, Business Strategies, Financial Analysis, Performance Measurement, Business Process Modeling, Requirements Analysis
University of Alberta
Skills you'll gain: Requirements Analysis, Requirements Elicitation, Requirements Management, Functional Requirement, Business Requirements, Product Requirements, Backlogs, User Requirements Documents, Scope Management, Change Control, User Story, System Requirements, Project Scoping, Product Roadmaps, Client Services, Agile Methodology, Prioritization
Skills you'll gain: Project Management, Milestones (Project Management), Data Storytelling, Requirements Analysis, Project Scoping, Stakeholder Management, Project Planning, Project Documentation, Quality Management, Interviewing Skills, Communication
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
Johns Hopkins University
Skills you'll gain: Clinical Trials, Clinical Research, Qualitative Research, Data Synthesis, Research Methodologies, Data Collection, Research Design, Analysis, Quantitative Research, Risk Analysis, Statistical Methods, Statistical Analysis, Data Analysis
In summary, here are 10 of our most popular security requirements analysis courses
- Finance & Quantitative Modeling for Analysts: University of Pennsylvania
- Assets, Threats, and Vulnerabilities: Google
- Regression Analysis: Simplify Complex Data Relationships: Google
- Google Cloud Cybersecurity: Google Cloud
- IBM Data Management: IBM
- IBM Data Science: IBM
- Certified Business Analysis Professional™ (CBAP®): Starweaver
- Client Needs and Software Requirements : University of Alberta
- Capstone: Applying Project Management in the Real World: Google
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network