Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
University of Pennsylvania
Skills you'll gain: Financial Statement Analysis, Financial Analysis, Financial Accounting, Advanced Analytics, Accounting, Analytics, Predictive Analytics, Financial Forecasting, Financial Modeling, Revenue Recognition, Business Analytics, Auditing, Business Metrics, Performance Analysis, Finance, Anomaly Detection, Key Performance Indicators (KPIs)
- Status: Free Trial
University of Washington
Skills you'll gain: Classification And Regression Tree (CART), Supervised Learning, Applied Machine Learning, Predictive Modeling, Machine Learning Algorithms, Statistical Machine Learning, Machine Learning, Feature Engineering, Scalability, Probability & Statistics, Data Cleansing, Algorithms
- Status: Preview
Eindhoven University of Technology
Skills you'll gain: Process Analysis, Data Mining, Business Process, Data Analysis, Process Mapping, Business Process Modeling, Data Processing, Operational Analysis, Process Improvement, Data Validation
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Data Mining, Text Mining, Anomaly Detection, Big Data, Unstructured Data, Spatial Analysis, Advanced Analytics, Algorithms, Image Analysis, Information Privacy
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Cyber Attacks, Network Security, Application Security, Threat Detection, Web Applications, Mobile Security, Cloud Security, Encryption, Wireless Networks, Authentications, Cloud Computing, Internet Of Things
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Continuous Monitoring, Vulnerability Assessments, Patch Management, System Monitoring, Risk Management Framework, Event Monitoring, Cyber Risk, Threat Detection, Security Information and Event Management (SIEM)
- Status: NewStatus: Free Trial
Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Security Engineering, Cloud Security, Systems Architecture, Information Systems Security, Secure Coding, Cloud Computing, Threat Management, Security Controls, Computer Security, Software As A Service, Threat Detection, Data Security, Public Cloud, Infrastructure As A Service (IaaS), Authorization (Computing), Platform As A Service (PaaS), Role-Based Access Control (RBAC)
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Threat Intelligence, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Cyber Attacks, Threat Detection, MITRE ATT&CK Framework, DevSecOps, Application Security, Malware Protection, Continuous Monitoring, Security Management, Cloud Security, Cyber Security Assessment, Cyber Security Strategy, Technical Writing, Encryption, Authentications
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Malware Protection, Cloud Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Threat Modeling, Cryptography, Cyber Threat Intelligence, Computer Security Awareness Training, Mobile Security, Cyber Attacks, Continuous Monitoring, Penetration Testing, Cloud Computing, Web Applications, Internet Of Things, Network Architecture
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Malware Protection, Vulnerability Scanning, Threat Modeling, Penetration Testing, Threat Detection, Information Systems Security, Cybersecurity, Security Testing, Security Strategy, Network Security
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Mobile Security, Computer Security Incident Management, Mobile Development, Investigation, Cybersecurity, Android (Operating System), Criminal Investigation and Forensics, Apple iOS, Security Strategy, Application Security, Computer Security, Legal Proceedings, Malware Protection, Secure Coding, Disaster Recovery, Cloud Security, Analysis, File Systems, Encryption, Debugging
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, Incident Response, Computer Security Incident Management, Continuous Monitoring, Vulnerability Assessments, Security Strategy, Infrastructure Security, Generative AI Agents
In summary, here are 10 of our most popular anomaly detection courses
- Accounting Analytics:Â University of Pennsylvania
- Machine Learning: Classification:Â University of Washington
- Process Mining: Data science in Action:Â Eindhoven University of Technology
- Pattern Discovery in Data Mining:Â University of Illinois Urbana-Champaign
- Ethical Hacking Essentials: Hands-On Edition:Â EC-Council
- (SSCP) Systems Security Certified Practitioner: Unit 4:Â Pearson
- CISSP Domain 3: Security Architecture and Engineering:Â Infosec
- CompTIA Cybersecurity Analyst (CySA+) CS0-003:Â Pearson
- Certified Ethical Hacker (CEH):Â Pearson
- Certified Ethical Hacker (CEH): Unit 3:Â Pearson