All Results

University of Colorado System
Skills you'll gain: Requirements Analysis, Risk Management Framework, Risking, Scalability, Software Visualization

University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Mockups, Security Requirements Analysis, Interviewing Skills, User Requirements Documents, Systems Development Life Cycle, Data Flow Diagrams (DFDs), Storyboarding, Functional Requirement, Goal Setting, Software Development Methodologies, Software Documentation, Diagram Design, Agile Methodology, Product Requirements, Unified Modeling Language, Risk Management Framework, Risking

University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Systems Development Life Cycle, Software Development Methodologies, Requirements Elicitation, Agile Methodology, Software Documentation, Software Design Documents, Security Requirements Analysis, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology

LearnKartS
Skills you'll gain: Risk Analysis, Project Risk Management, Risk Management, Risk Modeling, Risk Mitigation, Business Risk Management, Risk Control, Analysis, Agile Methodology, Hazard Analysis, Project Controls, Stakeholder Engagement, Stakeholder Management, Earned Value Management, Risk Appetite, Project Performance, Dependency Analysis, Stakeholder Communications, Project Management Institute (PMI) Methodology, Business Metrics

CertNexus
Skills you'll gain: Threat Modeling, Cybersecurity, Cyber Threat Intelligence, Threat Management, Information Systems Security, Threat Detection, Security Management, Cyber Risk, Cyber Security Strategy, Cyber Security Assessment, Risk Analysis, Computer Security, Risk Mitigation, Risk Management, Network Security, Risk Management Framework, Enterprise Risk Management (ERM), Risk Appetite, Trend Analysis, Technical Documentation

Skills you'll gain: Backlogs, Requirements Management, Business Requirements, Performance Measurement, Requirements Analysis, Business Analysis, Root Cause Analysis, Change Requests, Data Mining, Performance Analysis, Jira (Software), Data-Driven Decision-Making, Analysis, Prioritization
What brings you to Coursera today?

University of Colorado System
Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Goal Setting, User Requirements Documents, Unified Modeling Language, Meeting Facilitation, Conflict Management, Discussion Facilitation, Risk Management Framework, Negotiation, Security Awareness

Coursera
Skills you'll gain: Project Risk Management, Risk Management, Risk Management Framework, Risk Analysis, Risk Mitigation, Business Risk Management, Project Management, Governance Risk Management and Compliance, Stakeholder Communications

Skills you'll gain: Mitigation, Analysis, Accountability

John Wiley & Sons
Skills you'll gain: Application Security, DevSecOps, Secure Coding, Security Testing, Software Development Life Cycle, Threat Modeling, Continuous Monitoring, Security Requirements Analysis, Continuous Deployment, Security Controls, CI/CD, Program Development, Computer Security, System Monitoring, Security Awareness, Vulnerability Assessments, Product Lifecycle Management, Computer Programming

CertNexus
Skills you'll gain: Application Security, Human Factors (Security), Secure Coding, Open Web Application Security Project (OWASP), Vulnerability, Computer Security, Vulnerability Management, Vulnerability Assessments, Data Security, Security Strategy, Security Controls, Cyber Security Strategy, Application Design, Computer Programming, Design, Python Programming, Javascript, Design Strategies, JavaScript Frameworks, Node.JS

Board Infinity
Skills you'll gain: Risk Management Framework, Business Continuity Planning, Risk Mitigation, Cyber Risk, Business Continuity, Risk Management, Risk Analysis, Threat Management, Vulnerability Management, Business Risk Management, Enterprise Risk Management (ERM), Crisis Management, Governance Risk Management and Compliance, Cybersecurity, Information Technology, Emerging Technologies