• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Security Requirements Analysis
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn career credentials while taking courses that count towards your Master’s degree.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
    Complete graduate-level learning without committing to a full degree program.
    Earn a university-issued career credential in a flexible, interactive format.
    Graduate level learning within reach.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "security requirements analysis"

    • Status: Free Trial
      Free Trial
      M

      Microsoft

      Data Analysis and Visualization with Power BI

      Skills you'll gain: Dashboard, Power BI, Data Storytelling, Data Visualization Software, Microsoft Power Platform, Data Visualization, Data Presentation, Advanced Analytics, Statistical Reporting, Interactive Data Visualization, Business Intelligence, Data Analysis, Data-Driven Decision-Making, Web Content Accessibility Guidelines, Time Series Analysis and Forecasting

      4.7
      Rating, 4.7 out of 5 stars
      ·
      839 reviews

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      Status: Free Trial
      Free Trial
      L

      LearnKartS

      Information Security Foundations

      Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Detection, Cryptography, Data Security, Continuous Monitoring, Security Management, Compliance Management, Zero Trust Network Access, Information Assurance, Vulnerability Management, Governance Risk Management and Compliance, Data Encryption Standard, Blockchain, Data Integrity

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Preview
      Preview
      M

      Macquarie University

      Cyber Security: Data Security and Information Privacy

      Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      F

      Fortinet, Inc.

      Fortinet Network Security

      Skills you'll gain: Firewall, Virtual Private Networks (VPN), Network Troubleshooting, Network Routing, Network Security, Intrusion Detection and Prevention, Authentications, Network Monitoring, Event Monitoring, Network Administration, Security Information and Event Management (SIEM), Security Engineering, Network Infrastructure, Network Performance Management, Enterprise Security, Network Architecture, Application Security, Cybersecurity, Computer Security, Cyber Security Strategy

      4.6
      Rating, 4.6 out of 5 stars
      ·
      118 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: New
      New
      P

      Packt

      Linux Security Techniques

      Skills you'll gain: Linux Servers, System Configuration, User Accounts

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of California, Irvine

      Security Governance & Compliance

      Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security

      4.6
      Rating, 4.6 out of 5 stars
      ·
      171 reviews

      Mixed · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      E

      EC-Council

      Information Security Fundamentals

      Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)

      4.9
      Rating, 4.9 out of 5 stars
      ·
      18 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Google Workspace Security

      Skills you'll gain: Email Security, Google Workspace, Mobile Security, Security Management, Cloud Security, Application Security, Data Security, Security Controls, Identity and Access Management, Continuous Monitoring, Authentications, Multi-Factor Authentication

      4.7
      Rating, 4.7 out of 5 stars
      ·
      802 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Proactive Computer Security

      Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection

      4.7
      Rating, 4.7 out of 5 stars
      ·
      261 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      I

      ISC2

      Certified in Cybersecurity

      Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)

      4.7
      Rating, 4.7 out of 5 stars
      ·
      1.1K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Managing Data Analysis

      Skills you'll gain: Exploratory Data Analysis, Data Analysis, Data Presentation, Data Management, Management Training And Development, Team Management, Workflow Management, Analytical Skills, Team Leadership, Statistical Inference, Statistical Modeling, Statistical Methods, Communication

      4.6
      Rating, 4.6 out of 5 stars
      ·
      3.4K reviews

      Mixed · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Preview
      Preview
      M

      Macquarie University

      Cyber Security: Essentials

      Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security

      4.7
      Rating, 4.7 out of 5 stars
      ·
      7 reviews

      Beginner · Course · 1 - 4 Weeks

    1…192021…765

    In summary, here are 10 of our most popular security requirements analysis courses

    • Data Analysis and Visualization with Power BI: Microsoft
    • Information Security Foundations: LearnKartS
    • Cyber Security: Data Security and Information Privacy: Macquarie University
    • Fortinet Network Security: Fortinet, Inc.
    • Linux Security Techniques: Packt
    • Security Governance & Compliance: University of California, Irvine
    • Information Security Fundamentals: EC-Council
    • Google Workspace Security: Google Cloud
    • Proactive Computer Security: University of Colorado System
    • Certified in Cybersecurity: ISC2

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Skills

    • Artificial Intelligence (AI)
    • Cybersecurity
    • Data Analytics
    • Digital Marketing
    • English Speaking
    • Generative AI (GenAI)
    • Generative AI
    • Microsoft Excel
    • Microsoft Power BI
    • Project Management
    • Python

    Certificates & Programs

    • Google Cybersecurity Certificate
    • Google Data Analytics Certificate
    • Google IT Support Certificate
    • Google Project Management Certificate
    • Google UX Design Certificate
    • IBM Data Analyst Certificate
    • IBM Data Science Certificate
    • Machine Learning Certificate
    • Microsoft Power BI Data Analyst Certificate
    • UI / UX Design Certificate

    Industries & Careers

    • Business
    • Computer Science
    • Data Science
    • Education & Teaching
    • Engineering
    • Finance
    • Healthcare
    • Human Resources (HR)
    • Information Technology (IT)
    • Marketing

    Career Resources

    • Career Aptitude Test
    • Examples of Strengths and Weaknesses for Job Interviews
    • High-Income Skills to Learn
    • How Does Cryptocurrency Work?
    • How to Highlight Duplicates in Google Sheets
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Preparing for the PMP Certification
    • Signs You Will Get the Job After an Interview
    • What Is Artificial Intelligence?

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok