Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: Free
Yale University
Skills you'll gain: Investment Banking, Risk Management, Financial Market, Financial Regulation, Financial Services, Finance, Business Risk Management, Securities (Finance), Financial Policy, Capital Markets, Behavioral Economics, Banking, Corporate Finance, Governance, Insurance, Underwriting, Equities, Derivatives, Mortgage Loans, Decision Making
Skills you'll gain: Requirements Elicitation, User Story, Business Requirements, Business Analysis, Business Systems Analysis, Requirements Analysis, Financial Analysis, Product Requirements, Requirements Management, Business Process Modeling, Process Analysis, Stakeholder Engagement, Interviewing Skills, Cost Benefit Analysis, Verification And Validation
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle, Technical Documentation
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Cybersecurity, Risk Management, Security Management, Cyber Governance, Cyber Security Strategy, Operational Risk, Governance Risk Management and Compliance, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Enterprise Risk Management (ERM), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
Skills you'll gain: Backlogs, Requirements Management, User Requirements Documents, Performance Measurement, Requirements Analysis, Business Analysis, Root Cause Analysis, Project Performance, Performance Analysis, Jira (Software), Solution Architecture, Process Improvement, Data-Driven Decision-Making, Prioritization, Change Management, Stakeholder Management
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Documentation, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology, Technical Communication
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
University of Colorado System
Skills you'll gain: Requirements Elicitation, Requirements Analysis, Mockups, Interviewing Skills, Storyboarding, Functional Requirement, Business Requirements, Prototyping, User Research, Stakeholder Engagement, Scenario Testing, Information Architecture, Prioritization
University of Colorado System
Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Functional Requirement, Goal Setting, Unified Modeling Language, Meeting Facilitation, Conflict Management, Risk Analysis, User Story, Stakeholder Engagement, Negotiation
In summary, here are 10 of our most popular security requirements analysis courses
- Financial Markets: Yale University
- Advanced Business Analysis: Elicitation & Analysis: Starweaver
- Requirements Engineering: Secure Software Specifications: University of Colorado System
- Security and Risk Management: Packt
- IT Fundamentals for Cybersecurity: IBM
- Cybersecurity Risk Management Framework: Infosec
- Cybersecurity Solutions and Microsoft Defender: Microsoft
- Advanced Requirements Management & Solution Evaluation: Starweaver
- Requirements Gathering for Secure Software Development: University of Colorado System
- In the Trenches: Security Operations Center : EC-Council