Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: NewStatus: Free Trial
Macquarie University
Skills you'll gain: Microsoft Excel, Excel Formulas, Statistics, Statistical Hypothesis Testing, Descriptive Statistics, Data Analysis, Statistical Inference, Data Visualization, Box Plots, Histogram, Statistical Methods, Data Visualization Software, Variance Analysis, Probability Distribution
- Status: New
Skills you'll gain: Security Testing, Penetration Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
- Status: NewStatus: Free Trial
Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
- Status: Free Trial
Goodwill Industries International
Skills you'll gain: Accountability, Recruitment, Client Services, Needs Assessment, Gap Analysis, Goal Setting, Coaching, Professional Development, Rapport Building, Case Management, Critical Thinking, Overcoming Obstacles
Coursera Project Network
Skills you'll gain: Brainstorming, Root Cause Analysis, Collaborative Software, Business Analysis, Problem Management, Process Analysis, Design Thinking, Business Process Management
Coursera Project Network
Skills you'll gain: Change Management, Visionary, Organizational Change, Business Transformation, Strategic Leadership, Innovation, Process Analysis, Leadership and Management, Business Systems Analysis, Business Process Reengineering, Operational Analysis, Adaptability
- Status: Preview
University of Illinois Urbana-Champaign
Skills you'll gain: Financial Reporting, Financial Forecasting, Business Valuation, Financial Statement Analysis, Financial Analysis, Financial Accounting, Financial Modeling, Cash Flow Forecasting, Generally Accepted Accounting Principles (GAAP), Business Strategy
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Remote Access Systems, Zero Trust Network Access, Application Deployment, Software Installation, Infrastructure Architecture, Linux Administration, Systems Architecture, Linux, Software Versioning
- Status: Free Trial
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Data Architecture, Network Architecture, Database Management Systems, Firewall, SQL Server Integration Services (SSIS), Relational Databases, Network Security, Cloud Engineering, NoSQL, Virtual Private Networks (VPN), Database Management, Continuous Monitoring, Software Architecture, Multi-Factor Authentication, Virtualization, Security Controls, Scalability
- Status: NewStatus: Preview
Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, Security Management, Productivity Software, Threat Detection, Compliance Management, Artificial Intelligence, Automation, Operational Efficiency, Incident Response, Generative AI
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Unix, Computer Security, Application Security, Vulnerability Assessments, Unix Commands, Microsoft Windows, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, OS Process Management
Skills you'll gain: Firewall, Network Security, System Configuration, Network Administration, Amazon Web Services, Virtual Private Networks (VPN), Infrastructure Security, Network Monitoring, Network Troubleshooting, Security Information and Event Management (SIEM), Threat Management, Network Performance Management, Endpoint Security, Intrusion Detection and Prevention, System Monitoring, Cyber Security Policies, Configuration Management, Application Deployment
In summary, here are 10 of our most popular security requirements analysis courses
- Statistics and Data Analysis with Excel: Essentials:Â Macquarie University
- Web Application Security Testing with Google Hacking:Â Packt
- CISSP Domain 4: Communication and Network Security:Â Infosec
- Client Intake, Assessments, Skill Analysis and Planning:Â Goodwill Industries International
- Conduct a 5 Whys Analysis in Miro:Â Coursera Project Network
- Change Leadership: Strategic Route Analysis with Miro:Â Coursera Project Network
- Beyond the Financials: Insights, Analysis and Valuations:Â University of Illinois Urbana-Champaign
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Mastering Cloud: Security, Optimization & Migration on AWS:Â Edureka
- Microsoft Copilot: Power Platform & Security Best Practices:Â Whizlabs