Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
University of California, Irvine
Skills you'll gain: Time Management, Business Writing, Goal Setting, Negotiation, Cash Management, Business Planning, Planning, Project Controls, Feasibility Studies, Delegation Skills, Peer Review, Team Leadership, Business Correspondence, Creative Problem-Solving, Problem Solving, Professional Networking, Financial Analysis, Communication Strategies, Communication, Emotional Intelligence
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Jupyter, Automation, Web Scraping, Python Programming, Data Manipulation, Data Import/Export, Scripting, Data Structures, Data Processing, Data Collection, Application Programming Interface (API), Pandas (Python Package), Programming Principles, NumPy, Object Oriented Programming (OOP), Computer Programming
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Sales Strategy, Communication, Contract Management, Interpersonal Communications, Planning, Decision Making, Cultural Sensitivity, Industrial and Organizational Psychology
University of Pennsylvania
Skills you'll gain: Operations Management, Return On Investment, Operational Efficiency, Financial Statements, Financial Statement Analysis, Finance, Human Capital, Go To Market Strategy, Process Analysis, Branding, People Management, Financial Reporting, Capital Budgeting, Financial Accounting, Operational Performance Management, Consumer Behaviour, Leadership and Management, Marketing Planning, Peer Review, Analysis
- Status: Free
Johns Hopkins University
Skills you'll gain: Interviewing Skills, Infection Control, Rapport Building, Interpersonal Communications, Epidemiology, Data Ethics, Community Outreach, Infectious Diseases, Investigation, Patient Assistance, Case Management, Medical Science and Research, Ethical Standards And Conduct, Risk Analysis, Medical Terminology, Emerging Technologies
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Performance Management, Network Monitoring, Cloud Applications, Kubernetes, Cloud Computing Architecture, Identity and Access Management, Network Architecture, Network Security, Cloud Computing, Cloud Management, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Vulnerability Management, Secure Coding, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Public Key Infrastructure, Data Security, Authentications, Data Integrity
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), IBM Cloud, Private Cloud, Data Loss Prevention, Deep Learning, WordPress, Artificial Neural Networks, Cloud Services, Application Deployment, Governance, Machine Learning, Tensorflow, Business Transformation, Software Development Tools, Image Analysis
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Manipulation, Data Transformation, Data Validation, Data Analysis, Pivot Tables And Charts, Automation
Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Systems Architecture, Security Strategy, Security Engineering, Zero Trust Network Access, Security Awareness, Threat Management, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
In summary, here are 10 of our most popular security requirements analysis courses
- Career Success: University of California, Irvine
- Sound the Alarm: Detection and Response: Google
- Python for Data Science, AI & Development: IBM
- Successful Negotiation: Essential Strategies and Skills: University of Michigan
- Business Foundations: University of Pennsylvania
- COVID-19 Contact Tracing: Johns Hopkins University
- Preparing for Google Cloud Certification: Cloud Network Engineer: Google Cloud
- Security Architecture and Engineering: Packt
- AI Foundations for Everyone: IBM
- Excel Fundamentals for Data Analysis: Macquarie University