• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Requirements Analysis


Results for "security+requirements+analysis"


  • Status: Free Trial
    Free Trial
    G

    Google

    Play It Safe: Manage Security Risks

    Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    11K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4K reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Cisco CyberOps Associate (200-201)

    Skills you'll gain: Intrusion Detection and Prevention, Cybersecurity, Cyber Threat Intelligence, Security Controls, Threat Modeling, Incident Response, Digital Forensics, Risk Management Framework, Network Security, Data Security, Network Analysis, Firewall

    5
    Rating, 5 out of 5 stars
    ·
    20 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Requirements Specifications: Goals and Conflict Analysis

    Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Requirements Management, Goal Setting, Meeting Facilitation, Conflict Management, Risk Analysis, Diagram Design, Stakeholder Engagement, Negotiation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    66 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery

    4.5
    Rating, 4.5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    S

    Starweaver

    Advanced Business Analysis: Elicitation & Analysis

    Skills you'll gain: Requirements Elicitation, User Story, Business Requirements, Business Analysis, Requirements Analysis, Financial Analysis, Requirements Management, Business Process Modeling, Stakeholder Engagement, Interviewing Skills, Analysis, Stakeholder Communications, Collaboration, Project Scoping, Verification And Validation, Communication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    78 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Maryland, College Park

    Usable Security

    Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design

    4.6
    Rating, 4.6 out of 5 stars
    ·
    3.3K reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Threat Investigation

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, System Monitoring, Network Analysis, Network Monitoring

    4.8
    Rating, 4.8 out of 5 stars
    ·
    39 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Software Requirements Prioritization: Risk Analysis

    Skills you'll gain: Security Requirements Analysis, Requirements Analysis, Risk Management Framework, Risking, User Requirements Documents, Scalability, Verification And Validation, Software Visualization, Safety and Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    113 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    W

    Whizlabs

    Design solutions with security best practices and priorities

    Skills you'll gain: Microsoft Azure, Cloud Security, IT Security Architecture, DevSecOps, Threat Management, Zero Trust Network Access, Cloud Solutions, Cloud Computing Architecture, Cybersecurity, Cloud Computing, Threat Detection, Security Strategy, Cloud Platforms, Enterprise Architecture, Identity and Access Management

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Designing Information System Security Architectures

    Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Controls, Cybersecurity, Enterprise Architecture

    4.1
    Rating, 4.1 out of 5 stars
    ·
    7 reviews

    Beginner · Specialization · 1 - 3 Months

1…456…9

In summary, here are 10 of our most popular security+requirements+analysis courses

  • Play It Safe: Manage Security Risks: Google
  • Assets, Threats, and Vulnerabilities: Google
  • Cisco CyberOps Associate (200-201): Packt
  • Requirements Specifications: Goals and Conflict Analysis: University of Colorado System
  • Cyber Security: Mobile Security: Macquarie University
  • Advanced Business Analysis: Elicitation & Analysis: Starweaver
  • Software Security for Web Applications: Codio
  • Usable Security: University of Maryland, College Park
  • Threat Investigation: Cisco Learning and Certifications
  • Software Requirements Prioritization: Risk Analysis: University of Colorado System

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok