Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Administration, Vulnerability Assessments, Firewall, Network Analysis, Scripting, System Configuration
- Status: New
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
- Status: NewStatus: Free Trial
University of Michigan
Skills you'll gain: Social Network Analysis, Data Analysis, Python Programming, Jupyter, Probability Distribution
- Status: Preview
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
- Status: NewStatus: Free Trial
Skills you'll gain: Cybersecurity, Malware Protection, Data Security, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Event Monitoring, Threat Detection, Cyber Threat Intelligence, Operating System Administration, Computer Security Awareness Training, Network Monitoring, Network Analysis, Operating Systems, Data Integrity, Microsoft Windows, Mac OS, File Systems, Linux, Email Security
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
- Status: New
Skills you'll gain: Cybersecurity, ChatGPT, Infrastructure Security, Security Information and Event Management (SIEM), General Networking, Threat Detection, Incident Response, Cloud Security, System Configuration, Automation
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Crisis Management, Corporate Communications, Risk Management, Business Risk Management, Contingency Planning, Risk Analysis, Forecasting, Communication Strategies, Leadership Studies, Case Studies
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
Skills you'll gain: Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Microsoft Azure, Threat Modeling, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Data Integration, ChatGPT, Jupyter, AI Product Strategy, Automation, Query Languages
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), DevSecOps, Infrastructure Security, Application Security, Hardening, Cloud Security, Network Security, Containerization, Security Testing, Security Controls, Docker (Software), Cyber Security Policies, Secure Coding, Identity and Access Management, Threat Detection, Encryption, Authentications, Verification And Validation
In summary, here are 10 of our most popular anomaly detection courses
- Nmap for Penetration Testing: From Beginner to Advanced:Â Packt
- Cyber Security: Data Security and Information Privacy:Â Macquarie University
- AWS: Security and Key Management:Â Whizlabs
- Network Modeling and Analysis in Python:Â University of Michigan
- Security for Artificial Intelligence Software and Services:Â Board Infinity
- Digital Forensics Essentials: Hands-On Edition:Â EC-Council
- Cybersecurity Foundations: Threats Networks, and IoT Protection:Â Johns Hopkins University
- Cyber Security Projects for Your Dream Job:Â Packt
- Helping Your Organization Manage Risk and Crisis :Â University of Colorado Boulder
- Google Cloud Packet Mirroring with OpenSource IDS:Â Google Cloud