Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, MITRE ATT&CK Framework, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Precision Medicine, Game Theory, Reinforcement Learning, Data-Driven Decision-Making, Clinical Trials, Bioinformatics, Data Analysis, Image Analysis, Analytics, Markov Model, Bayesian Statistics, Time Series Analysis and Forecasting, Data Science, Predictive Analytics, Strategic Decision-Making, Anomaly Detection, Probability Distribution, Cybersecurity, Statistical Analysis, Machine Learning Methods
- Status: Preview
Universitat Autònoma de Barcelona
Skills you'll gain: Computer Vision, Image Analysis, Applied Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, Application Development, Deep Learning, Computer Programming, Machine Learning, Algorithms, Histogram, Feature Engineering
- Status: Preview
University of Colorado Boulder
Skills you'll gain: Tensorflow, Computer Vision, Image Analysis, Artificial Neural Networks, Applied Machine Learning, Deep Learning, Machine Learning Methods, Machine Learning, Computer Graphics, Artificial Intelligence, Feature Engineering, Algorithms
- Status: Free Trial
Akamai Technologies, Inc.
Skills you'll gain: Routing Protocols, OSI Models, Remote Access Systems, Network Architecture, TCP/IP, General Networking, Network Protocols, Network Troubleshooting, Computer Networking, Networking Hardware, Network Administration, Network Security, Network Infrastructure, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Network Routing, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention
- Status: Free Trial
Emory University
Skills you'll gain: Social Media Marketing, Social Media, Marketing Analytics, Text Mining, Consumer Behaviour, Data Mining, Social Network Analysis, Customer Insights, Market Analysis, Unstructured Data, Trend Analysis, Research
- Status: NewStatus: Preview
Knowledge Accelerators
Skills you'll gain: Identity and Access Management, Mobile Security, Threat Management, Authentications, Fraud detection, Cyber Security Policies, Multi-Factor Authentication, Cloud Security, Data Security, Safety and Security, Network Security, Artificial Intelligence
- Status: Preview
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Management, Data Validation, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Free Trial
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management
- Status: Free Trial
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management
In summary, here are 10 of our most popular anomaly detection courses
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Data Science Decisions in Time:Â Johns Hopkins University
- Detección de objetos: Universitat Autònoma de Barcelona
- Deep Learning Applications for Computer Vision:Â University of Colorado Boulder
- Networking Fundamentals:Â Akamai Technologies, Inc.
- Introduction to Social Media Analytics:Â Emory University
- Cybersecurity Awareness Essentials for Employees:Â Knowledge Accelerators
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Cybersecurity Tools and Technologies:Â Microsoft