Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, ChatGPT, Keras (Neural Network Library), Unsupervised Learning, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Deep Learning, Data Manipulation, PyTorch (Machine Learning Library), Data Transformation, Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis
Tableau Learning Partner
Skills you'll gain: Requirements Elicitation, Business Analysis, Business Metrics, Key Performance Indicators (KPIs), Requirements Analysis, Business Requirements, Process Analysis, Stakeholder Management, Business Process, Business Process Modeling, Tableau Software, Data Visualization
Skills you'll gain: Business Process Modeling, Business Analysis, Process Analysis, Process Optimization, Stakeholder Management, Business Requirements, Requirements Management, Data Modeling, Requirements Analysis, Business Process Improvement, Agile Methodology, User Story, Gap Analysis, Prioritization
Microsoft
Skills you'll gain: Stakeholder Management, Business Analysis, Project Management, Analysis, Business Requirements, Risk Management, Microsoft Power Platform, Requirements Analysis, Problem Management
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
Skills you'll gain: Requirements Elicitation, Business Analysis, Backlogs, Requirements Management, Business Systems Analysis, Stakeholder Engagement, Business Process, Business Workflow Analysis, User Requirements Documents, User Story, Business Requirements, Stakeholder Management, Business Modeling, Business Intelligence, Business Risk Management, Business Strategies, Financial Analysis, Performance Measurement, Business Process Modeling, Requirements Analysis
Skills you'll gain: Excel Formulas, Microsoft Excel, Spreadsheet Software, Power BI, Data Analysis, Data Cleansing, Business Metrics, Data Manipulation
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Data Storytelling, Requirements Elicitation, Business Process Modeling, Business Analysis, Data Presentation, Process Analysis, Resource Allocation, Data Visualization, Interactive Data Visualization, Stakeholder Management, Process Optimization, Business Requirements, Requirements Management, Data Modeling, Risk Analysis, Requirements Analysis, Excel Formulas, Microsoft Excel, Data Cleansing, Analysis
University of Michigan
Skills you'll gain: Matplotlib, Network Analysis, Feature Engineering, Plot (Graphics), Data Visualization Software, Interactive Data Visualization, Pandas (Python Package), Applied Machine Learning, Supervised Learning, Text Mining, Scikit Learn (Machine Learning Library), Network Model, Jupyter, NumPy, Graph Theory, Data Manipulation, Natural Language Processing, Data Analysis, Data Processing, Unstructured Data
University of Colorado System
Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Functional Requirement, Goal Setting, Unified Modeling Language, Meeting Facilitation, Conflict Management, Risk Analysis, User Story, Stakeholder Engagement, Negotiation
In summary, here are 10 of our most popular security requirements analysis courses
- IBM Generative AI Engineering: IBM
- Business Analysis Process: Tableau Learning Partner
- Business Analysis: Process Modeling & Requirements Gathering: SkillUp EdTech
- Business Analysis Fundamentals: Microsoft
- IBM Back-End Development: IBM
- Certified Business Analysis Professional™ (CBAP®): Starweaver
- Preparing Data for Analysis with Microsoft Excel: Microsoft
- Connect and Protect: Networks and Network Security: Google
- Advanced Cybersecurity Concepts and Capstone Project: Microsoft
- IBM Business Analyst: IBM