Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Artificial Neural Networks, Deep Learning, Software Development, Machine Learning Methods, Image Analysis, Linear Algebra, Numerical Analysis, Data Processing, Data Structures, Performance Tuning, Data Transformation, Algorithms
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Cyber Threat Intelligence, Application Security, IT Security Architecture, Generative AI, Incident Response, Artificial Intelligence, Machine Learning
- Status: Free Trial
L&T EduTech
Skills you'll gain: Big Data, Data Processing, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Process Engineering, Geostatistics, Anomaly Detection, Image Analysis, Energy and Utilities, Machine Learning, Automation, Physical Science, Natural Resource Management, Simulation and Simulation Software
- Status: Free Trial
L&T EduTech
Skills you'll gain: Design Reviews, Autodesk Revit, Building Information Modeling, Visualization (Computer Graphics), Augmented and Virtual Reality (AR/VR), Engineering Analysis, Architectural Engineering, Structural Engineering, Construction Management, Construction, Technical Standard
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Data Ethics, Predictive Modeling, Unsupervised Learning, Natural Language Processing, Predictive Analytics, Data Analysis, Classification And Regression Tree (CART), Regression Analysis, Data Mining, Statistical Analysis, Data Science, Social Media, Text Mining, Anomaly Detection, Business Analytics, Decision Tree Learning, Statistical Modeling, Big Data, Analytics, Cloud Computing
Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems
- Status: Free Trial
Skills you'll gain: Remote Access Systems, Local Area Networks, Software Installation, Command-Line Interface, Microsoft Windows, System Configuration, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, TCP/IP, Mobile Security, Information Systems Security, Linux, Peripheral Devices, USB, Operating Systems, Computer Hardware, Data Storage Technologies, Hardware Troubleshooting
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Compliance Training, Employee Training, Behavior Management, Insurance
- Status: Free Trial
University of London
Skills you'll gain: Linux, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, Network Analysis
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
- Status: Free Trial
Illinois Tech
Skills you'll gain: Data Validation, Regression Analysis, Exploratory Data Analysis, Verification And Validation, Plot (Graphics), Mathematical Modeling, Statistical Methods, Statistical Modeling, Data Transformation, Predictive Modeling, Correlation Analysis, Statistical Analysis, Statistical Inference, Linear Algebra
- Status: Free Trial
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Threat Detection, Test Tools
In summary, here are 10 of our most popular anomaly detection courses
- CUDA Advanced Libraries:Â Johns Hopkins University
- Gen AI in Cybersecurity:Â Edureka
- AI & ML Applications in Oil and Gas Industry:Â L&T EduTech
- BIM Coordination:Â L&T EduTech
- Data Science Fundamentals:Â University of California, Irvine
- Network and Communications Security :Â ISC2
- CompTIA A+ Certification Core 2 (220-1102):Â Packt
- Cybersecurity and the X-Factor:Â Kennesaw State University
- Introduction to Computer Security:Â University of London
- Introduction to Automotive Cybersecurity & Vehicle Networks:Â Starweaver