Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
L&T EduTech
Skills you'll gain: Design Reviews, Autodesk Revit, Building Information Modeling, Visualization (Computer Graphics), Augmented and Virtual Reality (AR/VR), Engineering Analysis, Architectural Engineering, Coordination, Autodesk, Structural Engineering, Construction Management, Construction, Technical Standard
- Status: Free Trial
Skills you'll gain: Security Information and Event Management (SIEM), Splunk, Threat Detection, System Monitoring, Cybersecurity, Event Monitoring, Continuous Monitoring, Incident Response, Data Analysis Software, Data Management, Real Time Data, Data Storage, Configuration Management, Software Installation, User Interface (UI)
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Security Information and Event Management (SIEM), Cyber Security Policies, Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications
- Status: Free Trial
Emory University
Skills you'll gain: Social Media Marketing, Social Media, Marketing Analytics, Text Mining, Consumer Behaviour, Data Mining, Social Network Analysis, Customer Insights, Market Analysis, Unstructured Data, Trend Analysis, Research
- Status: Free Trial
Skills you'll gain: Image Analysis, Matlab, Computer Vision, Medical Imaging, Spatial Analysis, Algorithms
- Status: Free Trial
University of California San Diego
Skills you'll gain: Collaborative Software, Telecommuting, Human Computer Interaction, Social Network Analysis, Remote Access Systems, Interaction Design, Social Sciences, Driving engagement, Research and Design, Digital Communications
- Status: Preview
Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Deep Learning, Unsupervised Learning, Keras (Neural Network Library), Artificial Neural Networks, Tensorflow, Computer Vision, Image Analysis, Artificial Intelligence, Natural Language Processing, Applied Machine Learning, Machine Learning Algorithms, Generative Model Architectures, Performance Tuning
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
- Status: Preview
Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
- Status: Preview
University of Pennsylvania
Skills you'll gain: Fundraising and Crowdsourcing, Fraud detection, Campaign Management, Social Media, Presentations, Budgeting, Entrepreneurship, Community Development, Driving engagement, Promotional Strategies, Planning, Consumer Behaviour, Decision Making
In summary, here are 10 of our most popular anomaly detection courses
- BIM Coordination:Â L&T EduTech
- Introduction to SIEM (Splunk):Â EDUCBA
- Information Security Analyst:Â EC-Council
- Introduction to Social Media Analytics:Â Emory University
- Image Segmentation, Filtering, and Region Analysis:Â MathWorks
- Social Computing:Â University of California San Diego
- Industrial Cybersecurity:Â Edureka
- Introduction to Deep Learning:Â University of Colorado Boulder
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Systems and Application Security:Â ISC2