Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Indian Institute of Science
Skills you'll gain: Biomedical Technology, Biomedical Engineering, Medical Devices, Medical Equipment and Technology, Vital Signs, Chemistry, ISO 13485 Standard, Materials science, Analytical Chemistry, Diagnostic Tests, Molecular Biology, Biology, Electocardiography, Neurology, Electronics, Artificial Intelligence, Oncology
- Status: New
Macquarie University
Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security
- Status: Free Trial
Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Social Network Analysis, Network Analysis, Data Visualization, Graph Theory, Relational Databases, Data Visualization Software, Data Storytelling, Data Analysis, Database Theory, Exploratory Data Analysis, Social Sciences, Statistical Analysis, Machine Learning, R Programming, Analytics, Sociology, Natural Language Processing, Data Manipulation, Text Mining, Statistical Modeling
- Status: Free Trial
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
- Status: Free Trial
Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cybersecurity, Risk Management Framework, Cyber Risk, Risk Management, Risk Analysis, Threat Management, IT Management, Vulnerability Management, Cyber Threat Intelligence, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Continuous Monitoring, Disaster Recovery, Governance Risk Management and Compliance
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
- Status: Preview
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
- Status: NewStatus: Free Trial
Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management
- Status: Free Trial
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Application Performance Management, Event Monitoring, Vulnerability Management, Incident Response, Query Languages
- Status: Preview
Johns Hopkins University
Skills you'll gain: Responsible AI, Data Ethics, Risking, Artificial Intelligence, Machine Learning, AI Product Strategy, Ethical Standards And Conduct, Case Studies, Legal Risk, Law, Regulation, and Compliance, Data-Driven Decision-Making, Analysis
- Status: New
Macquarie University
Skills you'll gain: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience
In summary, here are 10 of our most popular anomaly detection courses
- Sensors and Systems for Biomedical Applications:Â Indian Institute of Science
- Cyber Security: Essentials:Â Macquarie University
- Security Foundations, Threats, and Network Protection:Â Packt
- Social Media Analytics:Â Johns Hopkins University
- CompTIA CySA+ (CS0-003):Â Packt
- Cisco Cybersecurity Fundamentals:Â Board Infinity
- Advanced Cybersecurity Topics:Â Johns Hopkins University
- Introduction to Automotive Cybersecurity & Vehicle Networks:Â Starweaver
- CompTIA Security+ (SY0-701):Â Packt
- Manage Security Operations:Â Microsoft