Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: Free Trial
University of Toronto
Skills you'll gain: Spatial Analysis, Geographic Information Systems, Geospatial Mapping, ArcGIS, Data Visualization, Data Compilation, Data Mapping, Data Storytelling, Metadata Management, Data Integration, Data Management
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Variance Analysis, Performance Measurement, Management Accounting, Return On Investment, Financial Management, Cost Management, Budgeting, Financial Analysis, Cost Accounting, Operational Analysis, Performance Management, Key Performance Indicators (KPIs), Data Analysis, Planning, Decision Making
- Status: Free Trial
Yonsei University
Skills you'll gain: Capital Budgeting, Financial Statements, Financial Statement Analysis, Business Valuation, Financial Analysis, Cash Flow Forecasting, Strategic Decision-Making, Cost Benefit Analysis, Financial Modeling, Income Statement, Return On Investment, Entrepreneurial Finance, Cash Flows, Balance Sheet, Microsoft Excel, Financial Management, Investment Management, Financial Forecasting, Case Studies, Forecasting
- Status: Free Trial
Skills you'll gain: Statistical Hypothesis Testing, Statistical Analysis, Correlation Analysis, SAS (Software), Regression Analysis, Exploratory Data Analysis, Statistical Methods, Probability & Statistics, Statistical Modeling, Plot (Graphics), Data Literacy
- Status: NewStatus: Free Trial
Skills you'll gain: Kubernetes, DevSecOps, Infrastructure Security, Vulnerability Scanning, CI/CD, Containerization, Vulnerability Management, Hardening, Security Controls, Docker (Software), Image Analysis
- Status: Free Trial
Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Cyber Threat Intelligence, Threat Detection, Web Applications, Malware Protection, Network Security, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Data Security, Authentications
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Continuous Integration, Code Coverage, Code Review, Vulnerability, CI/CD, Application Security, DevSecOps, Vulnerability Assessments, Software Quality Assurance, Maintainability, Software Quality (SQA/SQC), GitHub, Software Installation, System Configuration, Security Management, Data Integration, Quality Improvement, Analysis
- Status: Free Trial
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
- Status: Free Trial
Skills you'll gain: Generative AI, Matplotlib, Plotly, Data Ethics, Data Visualization, Data Cleansing, Data Manipulation, Exploratory Data Analysis, Pandas (Python Package), Data Transformation, Interactive Data Visualization, Data Visualization Software, Data Storytelling, Data Analysis, Scikit Learn (Machine Learning Library), Jupyter, Python Programming, Machine Learning
- Status: Preview
Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
- Status: NewStatus: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
In summary, here are 10 of our most popular security requirements analysis courses
- GIS, Mapping, and Spatial Analysis Capstone: University of Toronto
- Financial Analysis of Scenarios and Decisions: University of Illinois Urbana-Champaign
- Valuation and Financial Analysis For Startups: Yonsei University
- Introduction to Statistical Analysis: Hypothesis Testing: SAS
- Certified Kubernetes Security Specialist (CKS): Unit 6: Pearson
- Advanced Incident Handling and Analysis Techniques: Packt
- SonarQube Mastery: Continuous Code Inspection & Security: Coursera Instructor Network
- Security and Privacy in TOR Network: University of Colorado System
- Data Analysis and Visualization with Python: Microsoft
- Enhancing Mac Security: Strategies for Protection: LearnQuest