Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, Virtual Machines, SQL
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Network Security, Private Cloud, Threat Detection, Firewall, Security Management, Cyber Security Policies, Identity and Access Management
Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, Network Protocols, Network Security, Network Administration, Vulnerability Assessments, Firewall, Performance Tuning, Network Analysis, Scripting, System Configuration
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Risk Management Framework, Cybersecurity, Threat Management, Risk Management, Security Strategy, Network Security, Investigation, Security Controls, Security Testing, Cloud Technologies, Vulnerability Assessments, Virtualization and Virtual Machines
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
- Status: Free Trial
Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Network Infrastructure, Enterprise Security, Network Architecture, Security Controls, System Configuration, Performance Tuning, Cybersecurity, Malware Protection, Threat Detection
Coursera Project Network
Skills you'll gain: Time Series Analysis and Forecasting, Data Visualization, Data Visualization Software, Statistical Visualization, Plot (Graphics), Box Plots, Anomaly Detection, Heat Maps, Plotly, Exploratory Data Analysis, Data Processing, Python Programming
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Penetration Testing, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments, Prompt Engineering
- Status: Free Trial
Skills you'll gain: Microsoft Copilot, Data Quality, Anomaly Detection, Data Ethics, Generative AI, Data Pipelines, Data Cleansing, Data Synthesis, Data Validation, Data Processing, Data Transformation, Natural Language Processing, Prompt Engineering, Artificial Intelligence, Automation
- Status: Free Trial
Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Generative AI, Data Analysis, Advanced Analytics, OpenAI, AI Personalization, Analytics, Data Transformation, Anomaly Detection, Predictive Analytics, Data Cleansing, Data Processing, Machine Learning Algorithms
- Status: Free Trial
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Application Performance Management, Event Monitoring, Vulnerability Management, Incident Response, Query Languages
In summary, here are 10 of our most popular anomaly detection courses
- Intermediate Ethical Hacking Techniques:Â Packt
- Check Point Jump Start: Cloud Security :Â Check Point Software Technologies Ltd.
- Nmap for Penetration Testing: From Beginner to Advanced:Â Packt
- Incident Response and Risk Management:Â Packt
- Cybersecurity: Protecting your Information at Home:Â Kennesaw State University
- Enterprise Firewall Administrator:Â Fortinet, Inc.
- Time Series Data Visualization And Analysis Techniques :Â Coursera Project Network
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Data Preparation and Evaluation with Copilot:Â Microsoft
- Security Foundations, Threats, and Network Protection:Â Packt