Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: NewStatus: Free Trial
Skills you'll gain: Dimensionality Reduction, Text Mining, Applied Machine Learning, Statistical Machine Learning, Supervised Learning, Unsupervised Learning, Python Programming, Machine Learning, Predictive Modeling, Regression Analysis, Algorithms
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Free Trial
Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Computing, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Vulnerability Management, Security Engineering, Threat Detection
- Status: Free Trial
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Computer Security Incident Management, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Security Controls, Cloud Security, Infrastructure Security, Security Strategy, User Provisioning, Threat Detection, Cyber Governance, Risk Management Framework, Authentications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Social Network Analysis, Machine Learning, Natural Language Processing, Text Mining, Analytics, Unstructured Data, Artificial Intelligence and Machine Learning (AI/ML), Unsupervised Learning, Semantic Web, Data Processing
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Network Analysis, Statistical Modeling, Bayesian Network, R (Software), R Programming, Social Network Analysis, Simulations, Graph Theory, Statistical Analysis, Probability & Statistics, Markov Model, Probability Distribution, Data Visualization, Machine Learning, Statistical Hypothesis Testing
- Status: Free Trial
Google Cloud
Skills you'll gain: Email Security, Mobile Security, Google Workspace, Authentications, Cloud Security, Data Security, Multi-Factor Authentication, Identity and Access Management, Security Management, Continuous Monitoring, Threat Detection
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Security Management, Event Monitoring, Threat Detection, Continuous Monitoring, System Monitoring, Network Security, Google Cloud Platform, Cloud Computing
- Status: NewStatus: Preview
Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, Security Management, Threat Detection, Compliance Management, Artificial Intelligence, Business Process Automation, Automation, Incident Response, Generative AI
Skills you'll gain: LangChain, LLM Application, Real Time Data, Application Frameworks, Document Management, Data Store, Data Quality, Image Analysis
- Status: Free Trial
Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Disaster Recovery, Vulnerability Assessments, Cyber Threat Intelligence, Network Security, Risk Management
- Status: Free Trial
Skills you'll gain: Keras (Neural Network Library), Deep Learning, Tensorflow, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Image Analysis, Computer Vision, Data Processing
In summary, here are 10 of our most popular anomaly detection courses
- NLP – Machine Learning Models in Python: Packt
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Gemini for Security Engineers: Google Cloud
- Managing Information System Security Architecture: LearnQuest
- Artificial Intelligence in Social Media Analytics: Johns Hopkins University
- Computational and Graphical Models in Probability: Johns Hopkins University
- Google Workspace のセキュリティ: Google Cloud
- Chronicle SIEM: Multi Event Rules: Google Cloud
- Microsoft Copilot: Power Platform & Security Best Practices: Whizlabs
- Preprocessing Unstructured Data for LLMs and RAG Systems: Packt