Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
- Status: [object Object]
Google
Skills you'll gain: Data Storytelling, Data Visualization, Data Presentation, Data Ethics, Rmarkdown, Interactive Data Visualization, Interviewing Skills, Data Cleansing, Data Validation, Ggplot2, Tableau Software, Presentations, Spreadsheet Software, Data Analysis, Data Visualization Software, Stakeholder Communications, Dashboard, Sampling (Statistics), Analytics, Stakeholder Management
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Tableau Learning Partner
Skills you'll gain: Data Storytelling, Exploratory Data Analysis, Requirements Elicitation, Ad Hoc Reporting, Data Governance, Data Ethics, Tableau Software, Business Analysis, Data Visualization Software, Data Warehousing, Business Metrics, Dashboard, Statistical Visualization, Extract, Transform, Load, Data Analysis, Spatial Data Analysis, Data Quality, Data Management, Descriptive Statistics, Interactive Data Visualization
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, ChatGPT, Keras (Neural Network Library), Unsupervised Learning, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Deep Learning, Data Manipulation, PyTorch (Machine Learning Library), Data Transformation, Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Quality, Pivot Tables And Charts, Google Sheets, Data Entry, Data Manipulation, Information Privacy
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Transformation, Data Import/Export, Predictive Modeling, Web Scraping, Interactive Data Visualization, Automation, Python Programming
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
In summary, here are 10 of our most popular security requirements analysis courses
- Security & Safety Challenges in a Globalized World: Universiteit Leiden
- Google Data Analytics: Google
- Connect and Protect: Networks and Network Security: Google
- Tableau Business Intelligence Analyst: Tableau Learning Partner
- Data Analysis and Visualization Foundations: IBM
- IBM Generative AI Engineering: IBM
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Deep Learning: DeepLearning.AI
- Excel Basics for Data Analysis: IBM
- Applied Data Science: IBM