Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
LearnQuest
Skills you'll gain: Threat Modeling, IT Security Architecture, Threat Detection, Internet Of Things, Network Security, Information Systems Security, Security Controls, Cybersecurity, Vulnerability Assessments, Risk Management Framework, Authentications, Cyber Risk, Encryption, Cloud Computing
Johns Hopkins University
Skills you'll gain: Clinical Trials, Clinical Research, Qualitative Research, Data Synthesis, Research Methodologies, Data Collection, Research Design, Analysis, Quantitative Research, Risk Analysis, Statistical Methods, Statistical Analysis, Data Analysis
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Data Security, Linux Commands, Data Migration, Database Design, Data Governance, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Cloud Storage
Skills you'll gain: User Experience Design, User Story, Ideation, Usability, Web Content Accessibility Guidelines, User Research, Design Thinking, Human Centered Design, Competitive Analysis, Persona Development
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
Johns Hopkins University
Skills you'll gain: HTML and CSS, Javascript, Responsive Web Design, Ajax, Front-End Web Development, Web Design, Web Applications, Hypertext Markup Language (HTML), Browser Compatibility, Web Development, Cascading Style Sheets (CSS), Usability, Cross Platform Development, Server Side
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
- Status: Free
Princeton University
Skills you'll gain: Data Structures, Algorithms, Java, Theoretical Computer Science, Performance Tuning, Computer Science, Object Oriented Programming (OOP), Scalability
Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Software Configuration Management, Software Development Life Cycle, Software Testing, Threat Modeling, Cyber Security Assessment, Cloud Security, Agile Methodology, Process Driven Development, Verification And Validation, Risk Management Framework
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Project Management Life Cycle, Microsoft Power Automate/Flow, Business Analysis, Project Management
Johns Hopkins University
Skills you'll gain: Exploratory Data Analysis, Data Analysis, Data Presentation, Data Management, Management Reporting, Team Management, Analytical Skills, Team Leadership, Statistical Inference, Statistical Modeling, Research Reports, Statistical Analysis, Communication
Skills you'll gain: PyTorch (Machine Learning Library), Supervised Learning, Feature Engineering, Generative AI, Keras (Neural Network Library), Jupyter, Unsupervised Learning, Natural Language Processing, Reinforcement Learning, Deep Learning, Scikit Learn (Machine Learning Library), Image Analysis, Machine Learning Algorithms, Data Manipulation, Tensorflow, Python Programming, Verification And Validation, Applied Machine Learning, ChatGPT, Artificial Neural Networks
In summary, here are 10 of our most popular security requirements analysis courses
- Foundations of Secure IoT Architecture: LearnQuest
- Introduction to Systematic Review and Meta-Analysis: Johns Hopkins University
- IBM Data Architecture: IBM
- Start the UX Design Process: Empathize, Define, and Ideate: Google
- Convolutional Neural Networks: DeepLearning.AI
- HTML, CSS, and Javascript for Web Developers: Johns Hopkins University
- IBM Generative AI for Cybersecurity Professionals: IBM
- Algorithms, Part I: Princeton University
- Secure Software Development: Packt
- Microsoft Business Analyst: Microsoft