Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: Free
Google Quantum AI
Skills you'll gain: Debugging, Hardware Architecture, Failure Analysis, Computer Programming Tools, Theoretical Computer Science, Mathematical Modeling, Computer Hardware, Simulations, Linear Algebra, Computer Science
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
- Status: Preview
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Management, Data Validation, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Free Trial
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Cyber Attacks, Threat Detection, Network Security, Data Integrity, Data Storage, Network Analysis, Microsoft Windows, Mac OS, Linux, Web Applications, File Systems
- Status: Free Trial
LearnKartS
Skills you'll gain: Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Information Systems Security, Cyber Attacks, Penetration Testing, Firewall, Threat Detection, Exploitation techniques, Internet Of Things
- Status: Free Trial
Skills you'll gain: Audit Planning, Auditing, Internal Controls, Risk Management Framework, Continuous Monitoring, Compliance Auditing, Project Coordination, Financial Controls, Quality Assurance, Information Systems Security, Cyber Security Assessment, Fraud detection, Governance, Presentations
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Precision Medicine, Game Theory, Reinforcement Learning, Data-Driven Decision-Making, Clinical Trials, Bioinformatics, Data Analysis, Image Analysis, Analytics, Markov Model, Bayesian Statistics, Time Series Analysis and Forecasting, Data Science, Predictive Analytics, Strategic Decision-Making, Anomaly Detection, Probability Distribution, Cybersecurity, Statistical Analysis, Machine Learning Methods
- Status: NewStatus: Preview
Knowledge Accelerators
Skills you'll gain: Identity and Access Management, Mobile Security, Threat Management, Authentications, Fraud detection, Cyber Security Policies, Multi-Factor Authentication, Cloud Security, Data Security, Safety and Security, Network Security, Artificial Intelligence
- Status: Preview
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Incident Response, Vulnerability Assessments, Network Security, Application Security, Governance Risk Management and Compliance, Cloud Security, Risk Management
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery
In summary, here are 10 of our most popular anomaly detection courses
- Cybersecurity Tools and Technologies:Â Microsoft
- Hands-on quantum error correction with Google Quantum AI:Â Google Quantum AI
- Cyber Security in Manufacturing :Â University at Buffalo
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Digital Forensics Essentials (DFE):Â EC-Council
- System and Network Security:Â LearnKartS
- Information Systems Auditing and Governance:Â Packt
- Systems and Application Security:Â ISC2
- Data Science Decisions in Time:Â Johns Hopkins University
- Cybersecurity Awareness Essentials for Employees:Â Knowledge Accelerators