Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Microsoft
Skills you'll gain: Stakeholder Management, Business Analysis, Project Management, Analysis, Business Requirements, Risk Management, Microsoft Power Platform, Requirements Analysis, Problem Management
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Controls, Security Awareness
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
- Status: [object Object]
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
- Status: [object Object]
Google
Skills you'll gain: Storyboarding, Wireframing, UI/UX Research, Responsive Web Design, User Experience Design, Design Thinking, User Research, Information Architecture, Figma (Design Software), Usability Testing, User Story, Design Reviews, Usability, Presentations, Design Research, Persona (User Experience), Ideation, User Centered Design, Mockups, Web Content Accessibility Guidelines
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Quality, Pivot Tables And Charts, Google Sheets, Data Entry, Data Manipulation, Information Privacy
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Data Cleansing, Data Access, Data Analysis, Statistical Inference, Statistical Hypothesis Testing, Data Quality, Probability & Statistics, Jupyter, Big Data, Machine Learning, Data Manipulation, Pandas (Python Package), Statistical Analysis, Data Transformation, Data Presentation, Artificial Intelligence
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Business Analytics, Spreadsheet Software, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, Ethical Standards And Conduct, SQL
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle, Technical Documentation
In summary, here are 10 of our most popular security requirements analysis courses
- Business Analysis Fundamentals: Microsoft
- Security & Safety Challenges in a Globalized World: Universiteit Leiden
- Security Analyst Fundamentals: IBM
- Data Analysis and Visualization Foundations: IBM
- Microsoft Power BI Data Analyst: Microsoft
- Google UX Design: Google
- Excel Basics for Data Analysis: IBM
- Network Security: ISC2
- Exploratory Data Analysis for Machine Learning: IBM
- Foundations: Data, Data, Everywhere: Google