Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Email Security
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Kubernetes, Unit Testing, Application Deployment, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Cloud-Native Computing, Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, Jupyter, Grafana
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Strategy, Security Controls, Information Systems Security
Skills you'll gain: Prompt Engineering, Generative AI, Data Wrangling, Large Language Modeling, Unit Testing, Supervised Learning, Feature Engineering, Keras (Neural Network Library), Deep Learning, ChatGPT, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Unsupervised Learning, Data Manipulation, PyTorch (Machine Learning Library), Artificial Intelligence, Data Import/Export, Data Ethics
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
Skills you'll gain: Design Thinking, User Research, User Experience Design, User Centered Design, Usability, Web Content Accessibility Guidelines, Cross Platform Development, Prototyping, Wireframing, Sprint Planning
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Microsoft 365, Artificial Intelligence
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Threat Modeling, Cybersecurity, Cryptography, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
Skills you'll gain: Analytics, Business Analytics, Data Analysis, Microsoft PowerPoint, Data Presentation, Presentations, Excel Formulas, Data-Driven Decision-Making, Dashboard, Data Storytelling, Business Intelligence, Microsoft Excel, Customer Analysis, Data Visualization, Data Visualization Software, Data Literacy, Big Data, Verbal Communication Skills, Data Cleansing, Spreadsheet Software
University of Toronto
Skills you'll gain: ArcGIS, Spatial Data Analysis, Spatial Analysis, Geographic Information Systems, Geospatial Mapping, GIS Software, Data Mapping, Data Visualization, Metadata Management, Query Languages, Global Positioning Systems, Quantitative Research, Data Compilation, Data Modeling, Typography, Data Manipulation, Data Processing, Data Storytelling, Design Elements And Principles, Image Analysis
In summary, here are 10 of our most popular security requirements analysis courses
- Introduction to Cybersecurity Fundamentals: Coursera Instructor Network
- IBM Back-End Development: IBM
- Advanced Network Security: LearnQuest
- IBM Generative AI Engineering: IBM
- Security Analyst Fundamentals: IBM
- Foundations of User Experience (UX) Design: Google
- Introduction to Computers and Operating Systems and Security: Microsoft
- Automated Cyber Security Incident Response: EDUCBA
- Assets, Threats, and Vulnerabilities: Google
- Blockchain Security: Infosec