Course Description
Analysis skills are critical to ensuring cybersecurity requirements are built as part of the product solution and not an afterthought in both today and tomorrow’s technology solutions. In this course you’ll learn key techniques to utilize when working with technology and needing to address cybersecurity requirements. First, you’ll explore techniques to help you identify and elicit requirements from your stakeholders that are key to solution success. Next, you’ll dive into audits, best practices, and technology that will help you define cybersecurity from an organizational perspective. Finally, you’ll learn how to plan and map out how solutions address cybersecurity requirements. When you’re finished with this course, you’ll have the skills and knowledge of knowing how to build out an analysis plan and construct a proposed solution that directly addresses all cybersecurity needs for your organization.
Product Cybersecurity System Analysis Dec 2025Product Cybersecurity System Analysis
Ability to conduct a stakeholder analysis
Understand how to draft a RACI for a Cybersecurity project or program initiative
Understand difference between compliance and best practice
Develop a business case, business process flow diagram, and identify steps along the path that present potential cybersecurity vulnerabilities
Identify Cybersecurity Requirements from list of requirements
Document current state business process including current technology
Map Product Cybersecurity solution components back to security requirements
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details