Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Wrangling, Data Quality, Pivot Tables And Charts, Google Sheets, Data Manipulation, Data Visualization Software, Information Privacy
Skills you'll gain: User Story, Business Requirements, Requirements Analysis, Requirements Elicitation, Business Analysis, User Requirements Documents, Gap Analysis, Business Systems Analysis, Functional Specification, Business Process Modeling, Stakeholder Management
- Status: New AI skills
Google
Skills you'll gain: Storyboarding, Wireframing, Responsive Web Design, User Experience Design, Design Thinking, User Research, UI/UX Research, Information Architecture, Figma (Design Software), Usability Testing, User Story, Web Design, Design Reviews, Usability, Presentations, User Experience, Design Research, Ideation, User Centered Design, Mockups
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Attacks, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
- Status: AI skills
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Kubernetes, Unit Testing, Object-Relational Mapping, Cloud Computing Architecture, Server Side, Application Deployment, React Redux, Cloud Services, Cloud-Native Computing, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Large Language Modeling, Interviewing Skills
- Status: New AI skills
Skills you'll gain: Media Planning, Search Engine Marketing, Email Marketing, Data Storytelling, Social Media Strategy, Search Engine Optimization, Social Media Marketing, Content Creation, Order Fulfillment, Google Ads, Online Advertising, A/B Testing, Social Media Campaigns, Target Audience, Digital Marketing, E-Commerce, Loyalty Programs, Customer Retention, Customer experience strategy (CX), Campaign Management
- Status: New AI skills
Google
Skills you'll gain: Computer Networking, Package and Software Management, Network Security, Network Troubleshooting, Systems Administration, Cloud Infrastructure, Network Administration, IT Infrastructure, TCP/IP, Information Systems Security, File Systems, Microsoft Windows, Desktop Support, Network Protocols, Lightweight Directory Access Protocols, Cybersecurity, Encryption, Computer Hardware, Technical Support, Software Installation
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Configuration Management, Cybersecurity, Security Management, Cyber Attacks, Computer Security Awareness Training, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Threat Detection, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies
Skills you'll gain: Data Storytelling, Requirements Elicitation, Risk Mitigation, Business Analysis, Business Process Modeling, Risk Analysis, Process Mapping, Process Optimization, Requirements Management, Risk Management, Business Requirements, Stakeholder Management, Work Breakdown Structure, Scope Management, Process Analysis, Stakeholder Engagement, Data Visualization Software, Excel Formulas, Microsoft Excel, Analysis
- Status: AI skills
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Data Manipulation, Excel Formulas, Professional Networking
In summary, here are 10 of our most popular security requirements analysis courses
- Application Security for Developers and DevOps Professionals: IBM
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Excel Basics for Data Analysis: IBM
- Requirements Gathering in Business Analysis: Microsoft
- Google UX Design: Google
- Google Cloud Cybersecurity: Google Cloud
- IBM Full Stack Software Developer: IBM
- Google Digital Marketing & E-commerce: Google
- Google IT Support: Google
- Certified in Cybersecurity: ISC2