Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Linux, Incident Response, Vulnerability Scanning, Threat Detection, Vulnerability Management, Vulnerability Assessments, Network Security, Intrusion Detection and Prevention, Security Strategy, Bash (Scripting Language), Network Monitoring, Cyber Threat Hunting, Scripting, Cybersecurity, Threat Management, Cyber Threat Intelligence, Incident Management, Data Ethics, Information Systems Security
- Status: Free Trial
Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Unsupervised Learning, Supervised Learning, Regression Analysis, Dimensionality Reduction, Statistical Inference, Predictive Modeling, Data Processing, Data Access, Anomaly Detection, Machine Learning, Machine Learning Algorithms, Classification And Regression Tree (CART), Scikit Learn (Machine Learning Library), Statistical Analysis, Data Analysis, Statistical Modeling, Applied Machine Learning, Data Cleansing
- Status: New
Coursera Instructor Network
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cybersecurity, Penetration Testing, Threat Detection, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Tensorflow, Risk Management Framework, Data Integrity
- Status: New
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cybersecurity, Network Security, Cloud Computing, Threat Detection, Vulnerability Scanning, Intrusion Detection and Prevention, Cyber Security Assessment, Amazon Web Services, Microsoft Azure, Incident Management, ChatGPT, Virtual Machines
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Hardening, Network Administration, Network Monitoring, Intrusion Detection and Prevention, Threat Modeling, Network Protocols, Cybersecurity, Information Systems Security, Firewall, Network Infrastructure, General Networking, Authentications, Identity and Access Management, Local Area Networks, Networking Hardware, Encryption, Virtual Local Area Network (VLAN)
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
- Status: Free Trial
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
- Status: New
Skills you'll gain: Software Design, Maintainability, Software Design Patterns, Object Oriented Design, Software Architecture, Code Review, Programming Principles, Debugging, Scalability
- Status: Free Trial
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Secure Coding, Data Encryption Standard, Technical Support and Services, Information Technology, Cyber Security Strategy
- Status: NewStatus: Free Trial
Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Authentications, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Vulnerability Assessments, Cryptography, Authorization (Computing), Identity and Access Management
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Cloud Security, Network Security, Cloud Computing, Cybersecurity, Network Architecture, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN)
- Status: New
Coursera Instructor Network
Skills you'll gain: Loan Origination, Lending and Underwriting, Workflow Management, Generative AI, Customer Communications Management, Compliance Management, Loans, Customer experience improvement, Credit Risk, Document Management, Regulation and Legal Compliance, Financial Services, Business Process Automation, Artificial Intelligence, Business Ethics, Automation, Risk Analysis, Risk Management
In summary, here are 10 of our most popular anomaly detection courses
- IBM Ethical Hacking with Open Source Tools:Â IBM
- IBM Introduction to Machine Learning:Â IBM
- Cybersecurity Strategies for AI-Driven Organizations:Â Coursera Instructor Network
- Cyber Security Projects for Your Dream Job:Â Packt
- Network Security, Troubleshooting, & Certification Prep:Â Packt
- Assets, Threats, and Vulnerabilities:Â Google
- Connect and Protect: Networks and Network Security:Â Google
- Writing Clean Code: 20 Code Smells & How to Avoid Them:Â Packt
- Cybersecurity Fundamentals:Â IBM
- Cybersecurity Foundations & Threat Mitigation:Â Packt