PluralSight – Best Practices For Effective Requirements Gathering

PluralSight – Best Practices For Effective Requirements Gathering Bookware-KNiSO
English | Size: 346.50 MB
Category: Tutorial


This course will teach you tools and techniques to improve your requirements gathering skills [Read more…]

PluralSight – Threat Intelligence-requirements Planning Direction And Review

PluralSight – Threat Intelligence-requirements Planning Direction And Review Bookware-KNiSO
English | Size: 242.81 MB
Category: Tutorial


Planning and designing a threat intelligence program is one of the most important skills of threat intelligence specialist This course will teach you how to gather requirements, plan design, direct and review a threat intelligence program [Read more…]

PluralSight – Modeling Requirements

PluralSight – Modeling Requirements-BOOKWARE-KNiSO
English | Size: 148.00 MB
Category: Tutorial


The power of visually modeling requirements to get consensus buy-in, and to help validate and verify requirements is a key skill any analyst should know to deliver quality requirements for successful solutions. In this course, Modeling Requirements, you will learn how to model and visually represent your requirements to help you with any change effort. First, you will learn techniques and see examples on creating current and future state models. Next, you will explore how to create context diagrams. Then, you will see how to model requirements with use cases and use case diagrams. Finally, you will discover how to capture operational support models for complete requirements work When you re finished with this course, you will have the skills and knowledge to model requirements to ensure complete and successful solutions for any change-based work [Read more…]

Infosec – Architectural Concepts & Design Requirements

Infosec – Architectural Concepts & Design Requirements
English | Size: 495.43 MB
Category: Security


Brush up on your knowledge of architectural concepts and design requirements with this in-depth course. Review cloud service models, characteristics, deployment models, security and more. [Read more…]

Pluralsight – Business Analysis Techniques Managing The Requirements Life Cycle

Pluralsight – Business Analysis Techniques Managing The Requirements Life Cycle-NOLEDGE
English | Size: 236.07 MB
Category: Tutorial


In this course, you’ll learn how to apply an array of business analysis techniques to the creation, management, fulfillment, and validation of requirements and designs essential to successfully undertaking change initiatives.Conducting effective business analysis involves crafting requirements that elegantly and comprehensively describe how a change initiative can empower an organization to achieve a desired vision for the future. In this course, Business Analysis Techniques: Managing the Requirements Life Cycle, you’ll learn how to apply an array of business analysis techniques to the creation, management, fulfillment, and validation of requirements. [Read more…]

Linkedin Learning – CSSLP Cert Prep 2 Secure Software Requirements

Linkedin Learning – CSSLP Cert Prep 2 Secure Software Requirements-XQZT
English | Size: 154.01 MB
Category: Tutorial


Specific, achievable security requirements are critical ingredients in the creation of any application. In this course, the second installment in the CSSLP Cert Prep series instructor Jerod Brennen dives into the subject of security requirements to prepare you for the second domain of the Certified Secure Software Lifecycle Professional (CSSLP) exam: Secure Software Requirements. Jerod discusses how to properly define what an app must be and do in order to remain secure. He covers how to approach security, privacy, and data classification requirements for applications. Plus, he goes over how to validate your requirements, including how to use a security requirement traceability matrix (SRTM) to determine how well an app adheres to your security requirements [Read more…]