Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
University of Alberta
Skills you'll gain: Requirements Analysis, Agile Software Development, Agile Methodology, Kanban Principles, Requirements Elicitation, Sprint Retrospectives, Requirements Management, Functional Requirement, Business Requirements, Sprint Planning, Software Development Methodologies, Project Risk Management, Software Development Life Cycle, Scrum (Software Development), Software Technical Review, Software Development, Product Management, Agile Project Management, User Story, Backlogs
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Skills you'll gain: UI/UX Research, Design Thinking, User Research, User Experience Design, User Centered Design, Usability, Persona (User Experience), Web Content Accessibility Guidelines, Prototyping, Wireframing, Sprint Planning
- Status: AI skills
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Jupyter, Generative AI, Professional Networking
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Event Monitoring, Vulnerability Management, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Management, Network Security, Network Monitoring
Coursera Project Network
Skills you'll gain: Process Analysis, Business Process, Business Analysis, Process Mapping, Workflow Management, Process Flow Diagrams, Business Modeling, Business Process Management, Stakeholder Management
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
- Status: Free
Johns Hopkins University
Skills you'll gain: Interviewing Skills, Infection Control, Rapport Building, Interpersonal Communications, Epidemiology, Data Ethics, Community Outreach, Infectious Diseases, Investigation, Patient Assistance, Case Management, Medical Science and Research, Ethical Standards And Conduct, Risk Analysis, Medical Terminology, Emerging Technologies
Skills you'll gain: Analytics, Business Analytics, Data Analysis, Microsoft PowerPoint, Data Presentation, Presentations, Excel Formulas, Data-Driven Decision-Making, Dashboard, Data Storytelling, Business Intelligence, Microsoft Excel, Customer Analysis, Data Visualization, Data Visualization Software, Big Data, Target Market, Data Cleansing, Public Speaking, Spreadsheet Software
Skills you'll gain: Data Validation, Spreadsheet Software, Data Analysis, Data Manipulation, Excel Formulas, Query Languages, Pivot Tables And Charts, SQL, Data Transformation, Database Management, Data Import/Export, Constructive Feedback
Skills you'll gain: Jupyter, Automation, Web Scraping, Python Programming, Data Manipulation, Data Import/Export, Scripting, Data Structures, Data Processing, Data Collection, Application Programming Interface (API), Pandas (Python Package), Programming Principles, NumPy, Object Oriented Programming (OOP), Computer Programming
In summary, here are 10 of our most popular security requirements analysis courses
- Software Product Management: University of Alberta
- Introduction to Cyber Security: New York University
- Foundations of User Experience (UX) Design: Google
- IBM Data Engineering: IBM
- Software Security for Web Applications: Codio
- Threat Investigation: Cisco Learning and Certifications
- Business Analysis & Process Management: Coursera Project Network
- The Bits and Bytes of Computer Networking: Google
- COVID-19 Contact Tracing: Johns Hopkins University
- Data Analysis and Presentation Skills: the PwC Approach: PwC