Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
- Status: Free Trial
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: Free Trial
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN), Encryption
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, Cybersecurity, Incident Response, Continuous Monitoring, Vulnerability Assessments, Infrastructure Security, Generative AI Agents
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Endpoint Detection and Response, Incident Response, Vulnerability Management, Continuous Monitoring, Interactive Data Visualization, Generative AI Agents, Artificial Intelligence
- Status: NewStatus: Free
DeepLearning.AI
Skills you'll gain: Prompt Engineering, Generative AI, Image Analysis, Large Language Modeling, Computer Vision, AI Personalization, Applied Machine Learning
- Status: Free Trial
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Large Language Modeling, Artificial Intelligence, Natural Language Processing, Program Development, Anomaly Detection, Vulnerability Management, Content Creation, IBM Cloud, Incident Management
- Status: New
Skills you'll gain:
- Status: New
Skills you'll gain: Classification And Regression Tree (CART), Unsupervised Learning, Generative AI
- Status: NewStatus: Free Trial
Skills you'll gain: AI Personalization, Anomaly Detection, Microsoft Azure, Computer Vision, Image Analysis, Artificial Intelligence, Natural Language Processing, Artificial Intelligence and Machine Learning (AI/ML), Cloud Applications, Applied Machine Learning, Text Mining, Application Programming Interface (API), Application Development, Time Series Analysis and Forecasting, Data Processing, Restful API
In summary, here are 10 of our most popular anomaly detection courses
- Assets, Threats, and Vulnerabilities: Google
- Into the Trenches: Security Operations Center : EC-Council
- Computer Networks and Network Security: IBM
- Connect and Protect: Networks and Network Security: Google
- Information Security Fundamentals: EC-Council
- Google Threat Intelligence 한국어: Google Cloud
- Google Threat Intelligence - 繁體中文: Google Cloud
- Prompt Engineering for Vision Models: DeepLearning.AI
- IBM Generative AI for Cybersecurity Professionals: IBM
- Algorithm Alchemy: Unlocking the Secrets of Machine Learning: Packt