Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
- Status: Free
Coursera Project Network
Skills you'll gain: Network Protocols, Network Performance Management, Network Monitoring, Network Troubleshooting, Threat Detection, Network Analysis, TCP/IP, Web Servers, Network Security
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Crisis Management, Corporate Communications, Risk Management, Business Risk Management, Contingency Planning, Risk Analysis, Forecasting, Communication Strategies, Leadership Studies, Case Studies
- Status: Free Trial
Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy
- Status: Free Trial
Skills you'll gain: Network Troubleshooting, Computer Security Incident Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Policies, Networking Hardware, Threat Detection, Technical Support, Network Security, General Networking, Computer Networking, Network Architecture, Network Administration, Network Protocols
- Status: Preview
Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
- Status: NewStatus: Free Trial
Skills you'll gain: Cybersecurity, Malware Protection, Data Security, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Threat Detection, Cyber Threat Intelligence, Operating System Administration, Computer Security Awareness Training, Network Monitoring, Network Analysis, Operating Systems, Data Integrity, Microsoft Windows, Mac OS, File Systems, Linux, Linux Commands, Email Security
- Status: NewStatus: Free Trial
Skills you'll gain: Data Security, Personally Identifiable Information, Information Assurance, Security Management, Data Governance, Data Loss Prevention, Data Management, Threat Management, Threat Detection, Encryption, Identity and Access Management
- Status: NewStatus: Free Trial
University of Michigan
Skills you'll gain: Social Network Analysis, Data Analysis, Python Programming, Jupyter, Probability Distribution
- Status: NewStatus: Free Trial
LearnKartS
Skills you'll gain: Data Sharing, Authentications
- Status: Free Trial
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Business Continuity, Risk Analysis, Vulnerability Management, Cyber Security Assessment, Risk Management, Business Risk Management, Risk Mitigation, Threat Detection, Disaster Recovery, Business Analysis
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Risk Analysis, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing
In summary, here are 10 of our most popular anomaly detection courses
- Cloud Security, Resiliency, and Vulnerability Management: Packt
- Wireshark for Packet Capture: Analyze web traffic: Coursera Project Network
- Helping Your Organization Manage Risk and Crisis : University of Colorado Boulder
- Vulnerability Types and Concepts: Packt
- Dell Technologies Networking & Security Technical Support: Dell
- Deception As a Defense: Starweaver
- Digital Forensics Essentials: Hands-On Edition: EC-Council
- CISSP Domain 2: Asset Security: Infosec
- Network Modeling and Analysis in Python: University of Michigan
- Information Security Awareness: LearnKartS