Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Data Cleansing, Data Access, Data Analysis, Statistical Inference, Statistical Hypothesis Testing, Data Quality, Probability & Statistics, Jupyter, Big Data, Machine Learning, Data Manipulation, Pandas (Python Package), Statistical Analysis, Data Transformation, Data Presentation, Artificial Intelligence
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cybersecurity, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Data Security, DevSecOps, Cloud Computing, Personally Identifiable Information, Role-Based Access Control (RBAC)
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Skills you'll gain: Business Analysis, Backlogs, Requirements Management, Business Systems Analysis, Stakeholder Engagement, Business Process, Business Workflow Analysis, User Requirements Documents, Stakeholder Management, Business Modeling, Business Risk Management, Business Intelligence, Business Requirements, Business Strategies, Performance Measurement, Business Process Modeling, Requirements Analysis, Root Cause Analysis, Business Planning, Analysis
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Organizational Skills, Agile Methodology, Waterfall Methodology, Communication, Interpersonal Communications, Decision Making
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
Starweaver
Skills you'll gain: Business Analysis, Scope Management, Business Requirements, Stakeholder Management, Requirements Management, Project Scoping, Change Management, Systems Analysis, Business Process, Stakeholder Communications, Quality Management, Project Management, Solution Delivery
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Peripheral Devices, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
In summary, here are 10 of our most popular security requirements analysis courses
- Exploratory Data Analysis for Machine Learning: IBM
- Google Cloud Cybersecurity: Google Cloud
- IBM Data Management: IBM
- Certified Business Analysis Professional™ (CBAP®): Starweaver
- Foundations of Project Management: Google
- Ask Questions to Make Data-Driven Decisions: Google
- Advanced Network Security: LearnQuest
- Network Security: ISC2
- IBM Back-End Development: IBM
- Fundamentals of Business Analysis : Starweaver