Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Cyber Governance
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Cyber Threat Intelligence, Threat Management, Cybersecurity, Network Protocols, Vulnerability Assessments, Network Architecture, Event Monitoring, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Applications, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Application Security, Virtual Private Networks (VPN)
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: New AI skills
Google
Skills you'll gain: Data Storytelling, Data Visualization, Data Presentation, Data Ethics, Rmarkdown, Interactive Data Visualization, Interviewing Skills, Data Cleansing, Data Validation, Ggplot2, Tableau Software, Presentations, Spreadsheet Software, Data Analysis, Data Visualization Software, Stakeholder Communications, Dashboard, Sampling (Statistics), Stakeholder Management, R Programming
- Status: AI skills
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Skills you'll gain: Data Wrangling, Data Cleansing, Data Analysis, Data Manipulation, Data Import/Export, Exploratory Data Analysis, Predictive Analytics, Data Science, Statistical Analysis, Regression Analysis, Predictive Modeling, Pandas (Python Package), Analytics, Scikit Learn (Machine Learning Library), Data-Driven Decision-Making, Machine Learning Methods, Feature Engineering, Statistical Methods, Python Programming, NumPy
- Status: New
Skills you'll gain: Data Storytelling, Requirements Elicitation, Risk Mitigation, Business Analysis, Business Process Modeling, Data Presentation, Risk Analysis, Project Scoping, Process Mapping, Process Optimization, Data Visualization, Requirements Management, Risk Management, Interactive Data Visualization, Business Requirements, Stakeholder Management, Stakeholder Engagement, Excel Formulas, Microsoft Excel, Analysis
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
- Status: AI skills
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
In summary, here are 10 of our most popular security requirements analysis courses
- IT Fundamentals for Cybersecurity: IBM
- Microsoft Cybersecurity Analyst: Microsoft
- Google Cybersecurity: Google
- Security in Google Cloud: Google Cloud
- IBM Cybersecurity Analyst: IBM
- Google Data Analytics: Google
- Microsoft Power BI Data Analyst: Microsoft
- Security Analyst Fundamentals: IBM
- Data Analysis with Python: IBM
- IBM Business Analyst: IBM