Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, System Monitoring, Network Security
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Project Management Life Cycle, Microsoft Power Automate/Flow, Business Analysis, Project Management
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, ChatGPT, Keras (Neural Network Library), Unsupervised Learning, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Deep Learning, Data Manipulation, PyTorch (Machine Learning Library), Data Transformation, Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Public Key Infrastructure, Continuous Monitoring, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: [object Object]
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
Skills you'll gain: Requirements Elicitation, Business Analysis, Backlogs, Requirements Management, Business Systems Analysis, Stakeholder Engagement, Business Process, Business Workflow Analysis, User Requirements Documents, User Story, Business Requirements, Stakeholder Management, Business Modeling, Business Intelligence, Business Risk Management, Business Strategies, Financial Analysis, Performance Measurement, Business Process Modeling, Requirements Analysis
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Threat Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Security Awareness, Risk Management, Threat Detection, Governance, Law, Regulation, and Compliance, Innovation, Policy Development
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Finance, Financial Data, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Spreadsheet Software, Google Sheets, Excel Formulas
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Security Controls, Data Security, Customer Relationship Building, Network Security, Team Oriented
In summary, here are 10 of our most popular security requirements analysis courses
- Microsoft Azure Security Engineer Associate (AZ-500): Microsoft
- Introduction to Cyber Security: New York University
- Microsoft Business Analyst: Microsoft
- IBM Generative AI Engineering: IBM
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Google Cloud Cybersecurity: Google Cloud
- Deep Learning: DeepLearning.AI
- Certified Business Analysis Professional™ (CBAP®): Starweaver
- Network Security: ISC2
- International Security Management: Erasmus University Rotterdam