Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Network Security, Wireless Networks, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Scanning, System Configuration, Encryption, General Networking, Network Analysis, Linux, Linux Commands, Command-Line Interface, Virtual Machines
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Attacks, Security Management, Cybersecurity, Risk Management Framework, Application Security, Incident Management, Security Strategy, Cyber Security Policies, Cyber Governance, Secure Coding, Threat Management, Intrusion Detection and Prevention, Personally Identifiable Information, Data Security, Cyber Security Assessment, Security Controls, Data Loss Prevention, Cyber Threat Intelligence
- Status: Preview
DeepLearning.AI
Skills you'll gain: Computer Vision, Keras (Neural Network Library), Image Analysis, Deep Learning, Artificial Neural Networks, Tensorflow, Dimensionality Reduction, Applied Machine Learning, Network Architecture, Algorithms
- Status: Preview
Maven Analytics
Skills you'll gain: Unsupervised Learning, Data Visualization, Data Quality, Data Cleansing, Box Plots, Regression Analysis, Forecasting, Histogram, Data Validation, Applied Machine Learning, Machine Learning, Time Series Analysis and Forecasting, Exploratory Data Analysis, Data Science, Classification And Regression Tree (CART), Statistical Modeling, Predictive Modeling, Supervised Learning, Machine Learning Algorithms, Business Intelligence
Skills you'll gain: Cyber Threat Hunting, Microsoft Azure, Threat Detection, Cyber Threat Intelligence, Incident Management, Incident Response, Security Information and Event Management (SIEM), ChatGPT, Interactive Data Visualization, Data Integration, Jupyter, Anomaly Detection, Automation, Query Languages
- Status: NewStatus: Free Trial
Skills you'll gain: Security Controls, Vulnerability Assessments, Cybersecurity, Authentications, Cyber Security Strategy, Zero Trust Network Access, Threat Management, Threat Detection, Information Systems Security, Encryption, Network Security, Data Security
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Mobile Security, Application Deployment, Threat Management, Malware Protection, Endpoint Security, Threat Detection, Cyber Security Policies, System Configuration, Systems Integration, Solution Architecture
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
- Status: New
Skills you'll gain: Salesforce, Generative AI, Artificial Intelligence, Data Ethics, Large Language Modeling, Customer Relationship Management, Data Modeling, Automation, Predictive Modeling, Data Security
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Infrastructure as Code (IaC), Endpoint Security, Cloud Security, Vulnerability Assessments, Network Security, Cloud Computing Architecture, Threat Detection, Zero Trust Network Access, Infrastructure Security, Cybersecurity, Security Strategy, Disaster Recovery, Mobile Security, Wireless Networks
- Status: Preview
DeepLearning.AI
Skills you'll gain: Image Analysis, Computer Vision, Deep Learning, Artificial Neural Networks, Tensorflow, PyTorch (Machine Learning Library), Applied Machine Learning, Machine Learning Methods, Network Architecture, Algorithms
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Detection, Application Security, Malware Protection, Vulnerability Assessments, Network Security, Security Awareness, Web Applications, Remote Access Systems, Javascript
In summary, here are 10 of our most popular anomaly detection courses
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux: Packt
- Incident Response, Risk Management, and Compliance: Packt
- Réseaux neuronaux convolutifs: DeepLearning.AI
- Complete Visual Guide to Machine Learning: Maven Analytics
- Microsoft Sentinel: Complete Azure Introduction: Packt
- Cybersecurity Foundations & Threat Mitigation: Packt
- Check Point Jump Start: Harmony Mobile: Check Point Software Technologies Ltd.
- Automating Response to Phishing with Cortex XSOAR: Google Cloud
- Salesforce Certified AI Specialist Certification: Packt
- Cloud Security, Resiliency, and Vulnerability Management: Packt