Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security requirements analysis"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Google Cloud
Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms
- Status: NewStatus: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Network Security, Firewall, Threat Detection, Network Administration, Endpoint Security, Network Monitoring, Security Controls, System Configuration, Network Troubleshooting, Security Management, UI Components, Email Security, Active Directory
- Status: New
Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
- Status: Free Trial
EDHEC Business School
Skills you'll gain: Portfolio Management, Investment Management, Financial Modeling, Return On Investment, Asset Management, Financial Market, Estimation, Statistical Methods, Python Programming, Regression Analysis, Risk Analysis, Risk Management, Time Series Analysis and Forecasting
- Status: NewStatus: Preview
Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, Security Management, Threat Detection, Compliance Management, Artificial Intelligence, Business Process Automation, Automation, Incident Response, Generative AI
- Status: New
Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Cost Estimation, Financial Modeling, Investment Management, Risk Management, Accounting, Spreadsheet Software, Financial Planning, Financial Analysis, Business Mathematics, Cash Flows, Product Management
- Status: Free Trial
Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
- Status: Free Trial
Skills you'll gain: Computer Systems, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Security Awareness, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Cloud Computing
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Unsupervised Learning, Data Analysis, Regression Analysis, Statistical Analysis, Data Mining, Predictive Modeling, Predictive Analytics, Anomaly Detection, Classification And Regression Tree (CART), Fraud detection, Machine Learning, Correlation Analysis, Scatter Plots, Market Analysis, Supervised Learning, Cross Selling
- Status: Free
Coursera Project Network
Skills you'll gain: Prompt Engineering, Data Analysis, Generative AI, OpenAI, Exploratory Data Analysis, Data Manipulation, LLM Application, Artificial Intelligence, Python Programming
In summary, here are 10 of our most popular security requirements analysis courses
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- Introdução ao Security Command Center Enterprise: Google Cloud
- Check Point Jump Start: Quantum Spark Network Security: Check Point Software Technologies Ltd.
- Web Application Security Testing with Google Hacking: Packt
- Advanced Portfolio Construction and Analysis with Python: EDHEC Business School
- Microsoft Copilot: Power Platform & Security Best Practices: Whizlabs
- Cyber Security: Identity Access Management and Authentication: Macquarie University
- Product Cost and Investment Cash Flow Analysis : University of Colorado Boulder
- Implementing Security in IoT and Edge Devices: LearnQuest
- Introduction to Computers and Operating Systems and Security: Microsoft