Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Skills you'll gain: Data Wrangling, Data Cleansing, Data Analysis, Data Manipulation, Data Transformation, Data Import/Export, Exploratory Data Analysis, Predictive Analytics, Statistical Analysis, Regression Analysis, Predictive Modeling, Pandas (Python Package), Scikit Learn (Machine Learning Library), Statistical Modeling, Machine Learning Methods, Feature Engineering, Python Programming, Data Pipelines, NumPy
Skills you'll gain: Big Data, Data Analysis, Statistical Analysis, Apache Hadoop, Apache Hive, Data Collection, Data Mart, Data Warehousing, Data Storytelling, Apache Spark, Data Cleansing, Data Lakes, Data Visualization Software, SQL
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Data Storytelling, Requirements Elicitation, Business Process Modeling, Business Analysis, Data Presentation, Process Analysis, Resource Allocation, Data Visualization, Interactive Data Visualization, Stakeholder Management, Process Optimization, Business Requirements, Requirements Management, Data Modeling, Risk Analysis, Requirements Analysis, Excel Formulas, Microsoft Excel, Data Cleansing, Analysis
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: Free
Yale University
Skills you'll gain: Investment Banking, Risk Management, Financial Market, Financial Regulation, Financial Services, Finance, Business Risk Management, Securities (Finance), Financial Policy, Capital Markets, Behavioral Economics, Banking, Corporate Finance, Governance, Insurance, Underwriting, Equities, Derivatives, Mortgage Loans, Decision Making
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
In summary, here are 10 of our most popular security requirements analysis courses
- Google Cybersecurity: Google
- IT Fundamentals for Cybersecurity: IBM
- Cybersecurity for Everyone: University of Maryland, College Park
- Data Analysis with Python: IBM
- Introduction to Data Analytics: IBM
- IBM Cybersecurity Analyst: IBM
- IBM Business Analyst: IBM
- Microsoft Cybersecurity Analyst: Microsoft
- Foundations of Cybersecurity: Google
- Application Security for Developers and DevOps Professionals: IBM