Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: NewStatus: Free Trial
Skills you'll gain: IT Management, Information Assurance, Test Planning
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Wrangling, Plot (Graphics), Statistical Programming, Statistical Visualization, Ggplot2, R (Software), Dimensionality Reduction, Data Visualization Software, Knitr, Data Sharing, GitHub, Machine Learning
- Status: Free Trial
Skills you'll gain: Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Responsible AI, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Hosting, Cloud Engineering, Cloud Solutions, Cloud Computing, Cloud Development, Generative AI, Data Science
- Status: Free Trial
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Responsible AI, Cloud Security, Data Literacy, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Hosting, Cloud Engineering, Cloud Solutions, Cloud Computing, Generative AI, Big Data, Data Analysis, Data Science, Natural Language Processing, Business Intelligence, Content Creation, Business
- Status: NewStatus: Free Trial
Skills you'll gain: DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Cloud Computing, Application Security, Internet Of Things, Infrastructure Security, Vulnerability Assessments, Cloud Services, Continuous Monitoring
- Status: New
Pearson
Skills you'll gain: Responsible AI, LangChain, Threat Modeling, Generative AI, Application Security, Secure Coding, Large Language Modeling, Open Web Application Security Project (OWASP), Security Testing, Security Controls, Prompt Engineering, Data Security, Vulnerability Assessments, Computer Security
- Status: New
Pearson
Skills you'll gain: Zero Trust Network Access, Cybersecurity, Vulnerability Assessments, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Network Security, Threat Modeling, Security Strategy, Security Controls, Cloud Security, Authentications, Identity and Access Management
- Status: Free Trial
The Hong Kong University of Science and Technology
Skills you'll gain: Requirements Analysis, Unified Modeling Language, Object Oriented Design, Functional Requirement, Data Modeling, Object Oriented Programming (OOP), Systems Development Life Cycle, System Requirements, Software Development, Software Engineering, Software Systems, Project Planning, Project Management
- Status: New
Skills you'll gain: Enterprise Security, Security Management, Remote Access Systems
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Encryption
- Status: Free Trial
Skills you'll gain: Data Validation, Spreadsheet Software, Data Analysis, Analytics, Data Manipulation, Excel Formulas, Data Compilation, Pivot Tables And Charts, SQL, Data Integration, Data Transformation, User Feedback
- Status: NewStatus: Free Trial
Vanderbilt University
Skills you'll gain: Data Storytelling, Prompt Engineering, ChatGPT, Prompt Patterns, Data Presentation, Microsoft Excel, LLM Application, Productivity, OpenAI, Document Management, Data Visualization, Data Analysis, SQL, Generative AI, Artificial Intelligence, Data Cleansing, Large Language Modeling, Interactive Data Visualization, Data Integration, Databases
In summary, here are 10 of our most popular security requirements analysis courses
- The Pearson Complete Course for CISM Certification: Unit 5: Pearson
- Data Science: Foundations using R: Johns Hopkins University
- IBM & Darden Digital Strategy: IBM
- Key Technologies for Business: IBM
- Practical Cybersecurity Fundamentals: Unit 4: Pearson
- Securing Generative AI: Pearson
- The Zero Trust Framework: Pearson
- Software Engineering: Modeling Software Systems using UML: The Hong Kong University of Science and Technology
- Mastering Microsoft Endpoint Manager and Intune: Packt
- Introduction to Cyber Attacks: New York University