Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
University of California, Davis
Skills you'll gain: Data Governance, Presentations, Feature Engineering, A/B Testing, Data Cleansing, SQL, Apache Spark, Distributed Computing, Descriptive Statistics, Data Lakes, Data Storytelling, Peer Review, Exploratory Data Analysis, Data Quality, Data Pipelines, Databricks, JSON, Statistical Analysis, Query Languages, Data Manipulation
University of Virginia Darden School Foundation
Skills you'll gain: Strategic Thinking, Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Apache Hadoop, Product Lifecycle Management, Business Technologies
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
University of Michigan
Skills you'll gain: Pandas (Python Package), Jupyter, NumPy, Data Manipulation, Data Science, Data Analysis, Statistical Analysis, Pivot Tables And Charts, Data Cleansing, Data Import/Export, Probability & Statistics, Python Programming, Programming Principles
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Data Visualization Software, Correlation Analysis, Web Scraping, NumPy, R Programming, Probability & Statistics, Predictive Modeling, Big Data, Automation, Computer Programming Tools, GitHub, Data Analysis Software, Machine Learning Algorithms, Unsupervised Learning
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Data Visualization Software, Data Visualization, Shiny (R Package), Data Wrangling, Exploratory Data Analysis, Statistical Visualization, Relational Databases, Big Data, Ggplot2, Database Design, Data Analysis, Data Mining, Dashboard, Excel Formulas, Data Manipulation, Web Scraping, Microsoft Excel
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
In summary, here are 10 of our most popular security requirements analysis courses
- Learn SQL Basics for Data Science: University of California, Davis
- IBM & Darden Digital Strategy: University of Virginia Darden School Foundation
- In the Trenches: Security Operations Center : EC-Council
- Data Analysis and Visualization Foundations: IBM
- Design and Analyze Secure Networked Systems: University of Colorado System
- Introduction to Data Science in Python: University of Michigan
- Data Science Foundations: IBM
- Identifying Security Vulnerabilities: University of California, Davis
- Advanced Network Security: LearnQuest
- Systems and Application Security: ISC2