Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Analysis
- Status: Free Trial
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Cyber Attacks, Threat Detection, Network Security, Data Integrity, Data Storage, Network Analysis, Microsoft Windows, Mac OS, Linux, Web Applications, File Systems
- Status: Preview
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Command-Line Interface, Linux Commands, Cybersecurity, Linux, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
- Status: Free
Google Quantum AI
Skills you'll gain: Debugging, Hardware Architecture, Failure Analysis, Computer Programming Tools, Theoretical Computer Science, Mathematical Modeling, Computer Hardware, Simulations, Linear Algebra, Computer Science
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, MITRE ATT&CK Framework, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Coursera Project Network
Skills you'll gain: Tensorflow, Keras (Neural Network Library), Image Analysis, Computer Vision, Artificial Neural Networks, Applied Machine Learning, Deep Learning, Machine Learning, Python Programming
- Status: New
Clemson University
Skills you'll gain: Dimensionality Reduction, Data Cleansing, Matplotlib, Regression Analysis, Unsupervised Learning, Data Science, Statistical Analysis, Anomaly Detection, Descriptive Statistics, Data Analysis, Data Visualization Software, Pandas (Python Package), Exploratory Data Analysis, Predictive Modeling, Machine Learning, Supervised Learning
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems
- Status: Free Trial
MathWorks
Skills you'll gain: Image Analysis, Computer Vision, Matlab, Geospatial Information and Technology, Data Integration, Medical Imaging, Estimation, Machine Learning Methods, Algorithms
In summary, here are 10 of our most popular anomaly detection courses
- Cyber Incident Response:Â Infosec
- Digital Forensics Essentials (DFE):Â EC-Council
- Kali Linux:Â Board Infinity
- Cyber Security in Manufacturing :Â University at Buffalo
- Hands-on quantum error correction with Google Quantum AI:Â Google Quantum AI
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Systems and Application Security:Â ISC2
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Object Localization with TensorFlow:Â Coursera Project Network
- Applied Data Science:Â Clemson University