Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Vulnerability Assessments, Test Tools, Web Development Tools, Web Applications, SQL
- Status: NewStatus: Free Trial
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
- Status: Free Trial
Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Penetration Testing, Network Security, Cloud Computing, Cloud Computing Architecture, Threat Detection, Authentications, Authorization (Computing)
- Status: NewStatus: Free Trial
Skills you'll gain: Deep Learning, Applied Machine Learning, Image Analysis, Computer Vision, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Natural Language Processing, Supervised Learning, Network Architecture, Performance Tuning
- Status: Free Trial
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Management, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Infrastructure Security, Systems Architecture, Threat Detection, Cyber Governance, Authentications, Encryption
- Status: New
Coursera Instructor Network
Skills you'll gain: Prompt Engineering, Risk Modeling, Risk Analysis, Continuous Monitoring, Generative AI, Project Risk Management, Risk Management Framework, Risk Management, Operational Risk, Data-Driven Decision-Making, Business Risk Management, Data Integration, Anomaly Detection, Artificial Intelligence, Threat Detection, Automation
Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Software, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Threat Detection, Cryptography, Engineering Software, Software Testing, CI/CD, Cloud Platforms, Vulnerability Assessments
Google Cloud
Skills you'll gain: Data Loss Prevention, Personally Identifiable Information, Information Privacy, Data Security, Cloud API, Google Cloud Platform, Data Cleansing, Unstructured Data
Skills you'll gain: Penetration Testing, Network Security, Cybersecurity, Threat Detection, General Networking, Vulnerability Management, Linux, System Configuration, Command-Line Interface, Software Installation, Virtual Machines, Network Analysis
Skills you'll gain: Computer Vision, Image Analysis, Real Time Data, Python Programming, Programming Principles, Visualization (Computer Graphics), Algorithms, Development Environment, Deep Learning, Software Installation
- Status: New
Skills you'll gain: Unstructured Data, Large Language Modeling, Data Processing, Text Mining, Generative AI, Semantic Web, Data Transformation, Development Environment, Data Cleansing, Application Programming Interface (API), Metadata Management, Hypertext Markup Language (HTML)
Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management
In summary, here are 10 of our most popular anomaly detection courses
- Web Hacker's Toolbox - Tools Used by Successful Hackers: Packt
- Advanced Cybersecurity Risk Management: Board Infinity
- Securing the IoT Landscape: From Inception to Architecture: LearnQuest
- Practical Deep Learning with Python: Edureka
- Managing Information System Security Architecture: LearnQuest
- GenAI for Risk Managers: Advanced Risk Analysis Techniques: Coursera Instructor Network
- Fundamentals of Secure Software: Packt
- Data Loss Prevention: Qwik Start - JSON: Google Cloud
- Learn Man in the Middle Attacks from Scratch: Packt
- Computer Vision: Face Recognition Quick Starter in Python: Packt