• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Security Requirements Analysis

Results for "security requirements analysis"


  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Real-Time Embedded Systems Theory and Analysis

    Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Software Design, Linux, System Programming, System Design and Implementation, Performance Tuning, Verification And Validation, Algorithms, Debugging

    4.2
    Rating, 4.2 out of 5 stars
    ·
    18 reviews

    Advanced · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Cloud Security Professional (CCSP): Unit 1

    Skills you'll gain: Security Controls

    Advanced · Course · 1 - 4 Weeks

  • C

    Coursera

    Using Advanced SWOT Analysis to Determine Competitiveness

    Skills you'll gain: Strategic Prioritization, Competitive Analysis, Business Priorities, Strategic Planning, Strategic Thinking, Case Studies, Business Strategy, Spreadsheet Software, Strategic Decision-Making, Market Analysis, Internal Auditing, External Auditing, Market Opportunities, Entrepreneurship, Leadership and Management

    4.3
    Rating, 4.3 out of 5 stars
    ·
    11 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Mastering NLP: Tokenization, Sentiment Analysis & Neural MT

    Skills you'll gain: Natural Language Processing, Large Language Modeling, Data Ethics, Responsible AI, Text Mining, PyTorch (Machine Learning Library), Artificial Neural Networks, Tensorflow, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Processing, Artificial Intelligence, Scikit Learn (Machine Learning Library), Time Series Analysis and Forecasting, Machine Learning, Data Analysis, Unstructured Data, Data Cleansing, Applied Machine Learning, Unified Modeling Language

    Intermediate · Specialization · 3 - 6 Months

  • C

    Coursera

    Conduct a 5 Whys Analysis in Miro

    Skills you'll gain: Brainstorming, Root Cause Analysis, Collaborative Software, Business Analysis, Problem Management, Process Analysis, Design Thinking, Business Process Management

    4.4
    Rating, 4.4 out of 5 stars
    ·
    28 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • G

    Google Cloud

    Introdução ao Security Command Center Enterprise

    Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Foundations of Information Security and Incident Handling

    Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Systems Security, Information Assurance, Cyber Security Policies, Security Controls

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Illinois at Urbana-Champaign

    Managerial Economics & Business Analysis Graduate Certificate

    Skills you'll gain: Data Storytelling, Management Accounting, Fund Accounting, Operations Management, Mergers & Acquisitions, Financial Statement Analysis, Credit Risk, Marketing, Risk Management, Machine Learning Algorithms, Business Strategy, Revenue Recognition, Financial Auditing, Variance Analysis, Entrepreneurship, Data Governance, Generative AI, Financial Market, Supply And Demand, Statistical Inference

    Credit offered

    Graduate Certificate · 6 - 12 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    CCNA Advanced – WAN, Security, and Network Services

    Skills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), Wide Area Networks, Network Security, Threat Detection, Threat Management, Network Administration, Multiprotocol Label Switching, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting, Dynamic Host Configuration Protocol (DHCP), Network Switches, Network Protocols

    4.7
    Rating, 4.7 out of 5 stars
    ·
    18 reviews

    Advanced · Course · 3 - 6 Months

  • Status: Free
    Free
    C

    Check Point Software Technologies Ltd.

    Check Point Jump Start: Harmony Endpoint Security

    Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Object-Oriented Analysis and Design: Foundations & Concepts

    Skills you'll gain: Object Oriented Design, Unified Modeling Language, Object Oriented Programming (OOP), Test Driven Development (TDD), JUnit, Java, Unit Testing, Software Testing, Software Engineering, Software Design Patterns, Java Programming, Software Design, Systems Analysis, Conceptual Design

    Build toward a degree

    4
    Rating, 4 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Identity Access Management and Authentication

    Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems

    Beginner · Course · 1 - 3 Months

1…596061…826

In summary, here are 10 of our most popular security requirements analysis courses

  • Real-Time Embedded Systems Theory and Analysis: University of Colorado Boulder
  • Certified Cloud Security Professional (CCSP): Unit 1: Pearson
  • Using Advanced SWOT Analysis to Determine Competitiveness: Coursera
  • Mastering NLP: Tokenization, Sentiment Analysis & Neural MT: Edureka
  • Conduct a 5 Whys Analysis in Miro: Coursera
  • Introdução ao Security Command Center Enterprise: Google Cloud
  • Foundations of Information Security and Incident Handling: Packt
  • Managerial Economics & Business Analysis Graduate Certificate: University of Illinois at Urbana-Champaign
  • CCNA Advanced – WAN, Security, and Network Services: Packt
  • Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok