Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Skills you'll gain: Dashboard, SQL, Descriptive Statistics, Jupyter, Statistical Analysis, Data Analysis, Probability Distribution, Pandas (Python Package), Data Visualization Software, Statistics, Data Visualization, Databases, Stored Procedure, Web Scraping, Relational Databases, R Programming, Automation, Computer Programming Tools, GitHub, Python Programming
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
Skills you'll gain: Project Management Life Cycle, Change Management, Organizational Structure, Project Management, Project Coordination, Organizational Skills, Agile Methodology, Project Planning, Waterfall Methodology, Cross-Functional Collaboration, Communication, Decision Making
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Business Analytics, Spreadsheet Software, Data Sharing, Data Cleansing, Data Processing, Data Visualization Software, Ethical Standards And Conduct, SQL
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Documentation, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology, Technical Communication
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Transformation, Data Import/Export, Predictive Modeling, Web Scraping, Interactive Data Visualization, Automation, Python Programming
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
University of Colorado System
Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Functional Requirement, Goal Setting, Unified Modeling Language, Meeting Facilitation, Conflict Management, Risk Analysis, User Story, Stakeholder Engagement, Negotiation
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Skills you'll gain: Business Process Modeling, Business Analysis, Process Analysis, Process Optimization, Stakeholder Management, Business Requirements, Requirements Management, Data Modeling, Requirements Analysis, Business Process Improvement, Agile Methodology, User Story, Gap Analysis, Prioritization
Skills you'll gain: Excel Formulas, Microsoft Excel, Spreadsheet Software, Power BI, Data Analysis, Data Cleansing, Business Metrics, Data Manipulation
Skills you'll gain: Azure Active Directory, Authentications, Identity and Access Management, Authorization (Computing), Active Directory, Role-Based Access Control (RBAC), Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, User Accounts
In summary, here are 10 of our most popular security requirements analysis courses
- Data Science Fundamentals with Python and SQL: IBM
- Security & Safety Challenges in a Globalized World: Universiteit Leiden
- Foundations of Project Management: Google
- Foundations: Data, Data, Everywhere: Google
- Requirements Gathering for Secure Software Development: University of Colorado System
- Applied Data Science: IBM
- Foundations of Cybersecurity: Google
- Requirements Specifications: Goals and Conflict Analysis: University of Colorado System
- Hardware Security: University of Maryland, College Park
- Business Analysis: Process Modeling & Requirements Gathering: SkillUp EdTech