Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Human Factors (Security), Encryption
- Status: Free Trial
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Infrastructure Security, Threat Detection, Linux Administration, Linux
- Status: Preview
Whizlabs
Skills you'll gain: Data Governance, Extract, Transform, Load, Metadata Management, Role-Based Access Control (RBAC), Data Cleansing, Databricks, Data Management, Data Lakes, Amazon Web Services, Data Pipelines, Data Migration, Amazon Redshift, Data Architecture, Data Security, Personally Identifiable Information, Data Warehousing, Data Quality, General Data Protection Regulation (GDPR), Data Capture
- Status: Preview
Edureka
Skills you'll gain: AWS Identity and Access Management (IAM), Cloud Security, Threat Detection, Network Security, Incident Response, Identity and Access Management, Computer Security Incident Management, Amazon Web Services, Threat Management, IT Security Architecture, Data Security, Security Strategy, Data Loss Prevention, Cloud Standards, Security Controls, Cloud Computing, Security Management, Network Administration, Network Planning And Design, Encryption
- Status: Preview
Johns Hopkins University
Skills you'll gain: Data Ethics, Business Ethics, Accountability, Artificial Intelligence and Machine Learning (AI/ML), Ethical Standards And Conduct, Risk Analysis, Compliance Management, Risk Mitigation, Law, Regulation, and Compliance, Diversity Awareness, Strategic Decision-Making, Social Sciences, Algorithms
- Status: Preview
University of Colorado Boulder
Skills you'll gain: Computer Vision, Image Analysis, Tensorflow, Deep Learning, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Machine Learning, Performance Tuning, Algorithms
- Status: Preview
Microsoft
Skills you'll gain: Generative AI, Large Language Modeling, Data Ethics, Prompt Engineering, Feature Engineering, Operational Efficiency, Advertising, Marketing, Artificial Intelligence, Application Deployment, Anomaly Detection, Data Synthesis, Information Privacy
- Status: Free Trial
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Regulatory Compliance, Governance Risk Management and Compliance, Network Security, Infrastructure Security, Cloud Security, Hardening, Software-Defined Networking
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Artificial Neural Networks, Deep Learning, Software Development, Machine Learning Methods, Image Analysis, Linear Algebra, Numerical Analysis, Machine Learning, Data Processing, Data Structures, Performance Tuning, Data Transformation, Algorithms, Data Science
- Status: Free Trial
Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Cloud Computing Architecture, Network Security, Incident Response, Cloud Security, Threat Modeling, Business Risk Management, Encryption, Identity and Access Management, Secure Coding, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, Information Systems Security, Threat Detection
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
- Status: NewStatus: Free Trial
University of Michigan
Skills you'll gain: Unsupervised Learning, Data Mining, ChatGPT, Applied Machine Learning, Anomaly Detection, Data Science, Supervised Learning, Machine Learning, Data Analysis, Data Manipulation, Data Pipelines, Python Programming, Exploratory Data Analysis, Machine Learning Algorithms, Jupyter
In summary, here are 10 of our most popular anomaly detection courses
- Systems and Application Security:Â ISC2
- Secure Networked System with Firewall and IDS:Â University of Colorado System
- Data Governance with Databricks:Â Whizlabs
- Cloud Security on AWS:Â Edureka
- Trustworthy AI: Managing Bias, Ethics, and Accountability:Â Johns Hopkins University
- Deep Learning Applications for Computer Vision:Â University of Colorado Boulder
- Generative AI for Data Science:Â Microsoft
- CompTIA CASP+ (CAS-004):Â Packt
- CUDA Advanced Libraries:Â Johns Hopkins University
- CompTIA Security+ SY0-701 Full Training Guide:Â Packt