Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
- Status: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Detection, Application Security, Technical Communication, Infrastructure Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Payment Card Industry (PCI) Data Security Standards, Scripting, Technical Writing, NIST 800-53, Automation, Technical Consulting
- Status: NewStatus: Free Trial
Board Infinity
Skills you'll gain: Decision Tree Learning, Fraud detection, Regression Analysis, Debugging
- Status: Free Trial
Skills you'll gain: Cyber Security Assessment, Compliance Management, Internal Controls, Threat Detection, Governance, Continuous Monitoring, Data Management, Disaster Recovery, Key Performance Indicators (KPIs), Regulatory Requirements, Business Analysis, Organizational Structure, Accountability, Stakeholder Communications
- Status: NewStatus: Free Trial
Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management
- Status: Free Trial
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Threat Detection
- Status: Preview
Johns Hopkins University
Skills you'll gain: Responsible AI, Data Ethics, Risking, Artificial Intelligence, Machine Learning, AI Product Strategy, Ethical Standards And Conduct, Case Studies, Legal Risk, Law, Regulation, and Compliance, Data-Driven Decision-Making, Analysis
- Status: Preview
Edureka
Skills you'll gain:
- Status: Free Trial
Skills you'll gain: Splunk, Dashboard, Data Transformation, Data Manipulation, Data Analysis, Statistical Analysis, Query Languages, Data Visualization Software, Ad Hoc Reporting, Real Time Data, Continuous Monitoring
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Crisis Management, Strategic Communication, Emergency Response, Corporate Communications, Public Affairs, Risk Management, Business Continuity Planning, Case Studies, Stakeholder Communications, Internal Communications, Communication, Media Relations
- Status: Free Trial
Radio y Televisión Española
Skills you'll gain: Social Media Content, Social Media Strategy, Live Streaming, Photo/Video Production and Technology, Social Media Management, Content Strategy, Web Content, Media and Communications, Content Creation, Journalism, Mobile Development Tools, Research, Digital Communications, Investigation, Social Network Analysis, Trend Analysis, Verification And Validation, Facebook, Data Validation, Open Source Technology
In summary, here are 10 of our most popular anomaly detection courses
- Advanced Cybersecurity Topics:Â Johns Hopkins University
- CompTIA PenTest+ (PT0-002):Â Packt
- Machine Learning Fundamentals for Java Developers:Â Board Infinity
- CRISC: Certified in Risk and Information Systems Control:Â Packt
- CompTIA Security+ (SY0-701):Â Packt
- Networking in Google Cloud: Network Security:Â Google Cloud
- Trustworthy AI: Managing Bias, Ethics, and Accountability:Â Johns Hopkins University
- Cloud Security on AWS:Â Edureka
- Splunk Query Language and Data Analysis:Â EDUCBA
- Introduction to Ethical Hacking and Recon Techniques:Â Packt