Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Control Systems, Computer Vision, Image Analysis, Automation, Embedded Software, Simulations, Systems Architecture, Virtual Environment, Software Architecture, Scenario Testing, Artificial Neural Networks, Global Positioning Systems, Algorithms, Predictive Modeling, Computer Hardware, Estimation
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis, Encryption
- Status: NewStatus: Free Trial
Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, System Monitoring, Threat Detection, Threat Modeling, Security Software
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, Virtual Machines, SQL
- Status: Free Trial
Skills you'll gain: PyTorch (Machine Learning Library), Artificial Neural Networks, Computer Vision, Deep Learning, Image Analysis, Machine Learning Methods, Supervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Exploratory Data Analysis, Algorithms
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Incident Response, Computer Security Incident Management, Cyber Security Strategy, Cyber Risk, Risk Management, Cyber Threat Intelligence, Cybersecurity, Cyber Security Policies, Cyber Attacks, Governance, Cyber Security Assessment, Threat Management, ISO/IEC 27001, Leadership and Management, Threat Detection, Leadership, Compliance Management, NIST 800-53, Resilience
- Status: Preview
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Threat Detection, Encryption, Information Privacy, Authorization (Computing)
- Status: Free Trial
Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
- Status: Free Trial
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cybersecurity, Intrusion Detection and Prevention, Encryption, Proxy Servers, Information Privacy, Web Servers, System Configuration, Cloud Hosting
- Status: Free Trial
L&T EduTech
Skills you'll gain: Construction Inspection, Building Codes, System Requirements, Facility Management and Maintenance, Hydraulics, Plumbing, Water Resources, Safety and Security, Design Specifications, Engineering Calculations, Technical Standard
- Status: Free
DeepLearning.AI
Skills you'll gain: Unstructured Data, Large Language Modeling, Metadata Management, Data Processing, JSON, Image Analysis, Data Transformation, Data Import/Export, Document Management, Text Mining, Computer Vision
- Status: NewStatus: Preview
Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management
In summary, here are 10 of our most popular anomaly detection courses
- Self-Driving Car Specialization Course:Â Packt
- TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003):Â Packt
- CISSP Domain 6: Security Assessment and Testing:Â Infosec
- Intermediate Ethical Hacking Techniques:Â Packt
- Building and Training Neural Networks with PyTorch:Â Packt
- Cyber Security Management and Leadership:Â Macquarie University
- Security for Artificial Intelligence Software and Services:Â Board Infinity
- Security Foundations, Threats, and Network Protection:Â Packt
- Security and Privacy in TOR Network:Â University of Colorado System
- Fire Protection System:Â L&T EduTech