Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Preview
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Risk Analysis, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Network Analysis, Social Network Analysis, Marketing Analytics, Data Science, Unstructured Data, Text Mining, Data Structures, Data Visualization, Natural Language Processing, Scientific Visualization, Python Programming, Data Manipulation
- Status: Free Trial
Skills you'll gain: Embedded Systems, Internet Of Things, Control Systems, Electronic Systems, Electronics, Maintenance, Repair, and Facility Services, Automation, Integrated Development Environments, Environmental Monitoring, System Monitoring, Infrastructure Architecture, Communication Systems, Real Time Data, Peripheral Devices
Skills you'll gain: Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Microsoft Azure, Threat Modeling, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Data Integration, ChatGPT, Jupyter, AI Product Strategy, Automation, Query Languages
- Status: Preview
DeepLearning.AI
Skills you'll gain: Image Analysis, Computer Vision, Deep Learning, Artificial Neural Networks, Machine Learning Methods, Network Model, Network Architecture, Algorithms
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Administration, Vulnerability Assessments, Firewall, Network Analysis, Scripting, System Configuration
- Status: Free Trial
Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Security Engineering, Threat Management, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions, Data Security
- Status: Free Trial
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
- Status: Free Trial
Skills you'll gain: Network Troubleshooting, Computer Security Incident Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Policies, Networking Hardware, Threat Detection, Technical Support, Network Security, General Networking, Computer Networking, Network Architecture, Network Administration, Network Protocols
- Status: Preview
University of Michigan
Skills you'll gain: Social Network Analysis, Network Analysis, Graph Theory, Predictive Analytics, Predictive Modeling, Pandas (Python Package), Matplotlib, Algorithms
In summary, here are 10 of our most popular anomaly detection courses
- Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac
- Incident Response and Risk Management: Packt
- Network Analysis for Marketing Analytics: University of Colorado Boulder
- CPS Design with ARM Core using MicroPython for Industries: L&T EduTech
- Microsoft Sentinel: Complete Azure Introduction: Packt
- الشبكات العصبونية الالتفافية: DeepLearning.AI
- Cybersecurity Foundations: Threats Networks, and IoT Protection: Johns Hopkins University
- Nmap for Penetration Testing: From Beginner to Advanced: Packt
- Assessing and Managing Secure IoT Applications and Devices: LearnQuest
- Advanced Cybersecurity Risk Management: Board Infinity