Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
University of Michigan
Skills you'll gain: Matplotlib, Network Analysis, Feature Engineering, Plot (Graphics), Data Visualization Software, Interactive Data Visualization, Pandas (Python Package), Applied Machine Learning, Supervised Learning, Text Mining, Scikit Learn (Machine Learning Library), Network Model, Jupyter, NumPy, Graph Theory, Data Manipulation, Natural Language Processing, Data Analysis, Data Processing, Unstructured Data
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
Infosec
Skills you'll gain: NIST 800-53, Security Controls, Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Configuration Management, Change Control
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
University of California, Davis
Skills you'll gain: Data Governance, Presentations, Feature Engineering, A/B Testing, Data Cleansing, SQL, Apache Spark, Distributed Computing, Descriptive Statistics, Data Lakes, Data Storytelling, Peer Review, Exploratory Data Analysis, Data Quality, Data Pipelines, Databricks, JSON, Statistical Analysis, Query Languages, Data Manipulation
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Threat Management, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, Network Protocols, SQL
University of Michigan
Skills you'll gain: Data Structures, Python Programming, Data Manipulation, Development Environment, File Management, Data Analysis, Computer Programming, Software Installation
Duke University
Skills you'll gain: Statistical Hypothesis Testing, Sampling (Statistics), Statistical Inference, Exploratory Data Analysis, Regression Analysis, Statistical Reporting, Probability Distribution, Statistical Methods, Statistical Software, R Programming, Bayesian Statistics, Statistical Analysis, Data Analysis, Statistical Modeling, Probability & Statistics, Probability, Statistics, Data Science, Descriptive Statistics, Predictive Modeling
In summary, here are 10 of our most popular security requirements analysis courses
- Advanced Network Security: LearnQuest
- Applied Data Science with Python: University of Michigan
- Secure Software Design: University of Colorado System
- IBM DevOps and Software Engineering: IBM
- NIST 800-171: Infosec
- Risk Identification, Monitoring, and Analysis: ISC2
- IBM Data Management: IBM
- Learn SQL Basics for Data Science: University of California, Davis
- Identifying Security Vulnerabilities: University of California, Davis
- Threat Analysis: Cisco Learning and Certifications