Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: NewStatus: Free Trial
University of Michigan
Skills you'll gain: Social Network Analysis, Data Analysis, Python Programming, Jupyter, Probability Distribution
- Status: Free Trial
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Business Continuity, Risk Analysis, Vulnerability Management, Cyber Security Assessment, Risk Management, Business Risk Management, Risk Mitigation, Threat Detection, Disaster Recovery, Business Analysis
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Risk Analysis, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing
- Status: Free Trial
Skills you'll gain: Natural Language Processing, Text Mining, Data Processing, Data Manipulation, Unstructured Data, Markov Model, Python Programming, Machine Learning Methods, Algorithms, Probability & Statistics
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), DevSecOps, Infrastructure Security, Application Security, Hardening, Cloud Security, Network Security, Containerization, Security Testing, Security Controls, Docker (Software), Cyber Security Policies, Secure Coding, Identity and Access Management, Threat Detection, Encryption, Authentications, Verification And Validation
- Status: Preview
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
- Status: NewStatus: Free Trial
Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention
- Status: Preview
DeepLearning.AI
Skills you'll gain: Computer Vision, Keras (Neural Network Library), Image Analysis, Deep Learning, Artificial Neural Networks, Tensorflow, Dimensionality Reduction, Visualization (Computer Graphics), Applied Machine Learning, Network Architecture, Algorithms
Skills you'll gain: Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Microsoft Azure, Threat Modeling, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Data Integration, ChatGPT, Jupyter, AI Product Strategy, Automation, Query Languages
- Status: Free
Coursera Project Network
Skills you'll gain: Network Protocols, Network Performance Management, Network Monitoring, Network Troubleshooting, Threat Detection, Network Analysis, TCP/IP, Web Servers, Network Security
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity
- Status: Preview
National Taiwan University
Skills you'll gain: Journalism, Large Language Modeling, Media and Communications, Electronic Media, Storytelling, Responsible AI, International Relations, Research, Writing, Natural Language Processing, Emerging Technologies
In summary, here are 10 of our most popular anomaly detection courses
- Network Modeling and Analysis in Python: University of Michigan
- IT Risk Assessment Practices: Packt
- Incident Response and Risk Management: Packt
- Introduction to NLP and Syntactic Processing: Packt
- Certified Kubernetes Security Specialist (CKS) Course: Packt
- Security for Artificial Intelligence Software and Services: Board Infinity
- The Complete Ethical Hacking Course: Packt
- Réseaux neuronaux convolutifs: DeepLearning.AI
- Microsoft Sentinel: Complete Azure Introduction: Packt
- Wireshark for Packet Capture: Analyze web traffic: Coursera Project Network