Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: [object Object]
Google
Skills you'll gain: Data Storytelling, Data Visualization, Data Presentation, Data Ethics, Rmarkdown, Interactive Data Visualization, Interviewing Skills, Data Cleansing, Data Validation, Ggplot2, Tableau Software, Presentations, Spreadsheet Software, Data Analysis, Data Visualization Software, Stakeholder Communications, Dashboard, Sampling (Statistics), Analytics, Stakeholder Management
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
Skills you'll gain: Backlogs, Requirements Management, User Requirements Documents, Performance Measurement, Requirements Analysis, Business Analysis, Root Cause Analysis, Project Performance, Performance Analysis, Jira (Software), Solution Architecture, Process Improvement, Data-Driven Decision-Making, Prioritization, Change Management, Stakeholder Management
Skills you'll gain: Requirements Elicitation, User Story, Business Requirements, Business Analysis, Business Systems Analysis, Requirements Analysis, Financial Analysis, Product Requirements, Requirements Management, Business Process Modeling, Process Analysis, Stakeholder Engagement, Interviewing Skills, Cost Benefit Analysis, Verification And Validation
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Project Coordination, Organizational Skills, Agile Methodology, Project Planning, Waterfall Methodology, Cross-Functional Collaboration, Communication, Decision Making
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Skills you'll gain: Excel Formulas, Microsoft Excel, Spreadsheet Software, Power BI, Data Analysis, Data Cleansing, Business Metrics, Data Manipulation
- Status: [object Object]
Google
Skills you'll gain: Storyboarding, Wireframing, UI/UX Research, Responsive Web Design, User Experience Design, Design Thinking, User Research, Information Architecture, Figma (Design Software), Usability Testing, User Story, Design Reviews, Usability, Presentations, Design Research, Persona (User Experience), Ideation, User Centered Design, Mockups, Web Content Accessibility Guidelines
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
In summary, here are 10 of our most popular security requirements analysis courses
- Google Data Analytics: Google
- Play It Safe: Manage Security Risks: Google
- Ask Questions to Make Data-Driven Decisions: Google
- Advanced Requirements Management & Solution Evaluation: Starweaver
- Advanced Business Analysis: Elicitation & Analysis: Starweaver
- Foundations of Project Management: Google
- Application Security for Developers and DevOps Professionals: IBM
- Assets, Threats, and Vulnerabilities: Google
- Connect and Protect: Networks and Network Security: Google
- Preparing Data for Analysis with Microsoft Excel: Microsoft