Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Generative AI, Cybersecurity, Incident Response, ChatGPT, Human Factors (Security), OpenAI, Data Ethics, Cyber Security Strategy, Threat Detection
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Disaster Recovery, Intrusion Detection and Prevention, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Attacks, Endpoint Detection and Response, Security Management, Threat Detection, Threat Management, Cyber Security Strategy, Cyber Security Policies, Event Monitoring, Business Continuity, Network Monitoring, Network Analysis, Vulnerability Assessments, Analysis
- Status: Free Trial
Skills you'll gain: Splunk, User Accounts, Security Information and Event Management (SIEM), Incident Response, Event Monitoring, Anomaly Detection, Data Analysis, System Monitoring, Cyber Threat Intelligence, Threat Detection, Machine Learning, Role-Based Access Control (RBAC), Data Import/Export
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Network Security, Firewall, Network Protocols, Cybersecurity, TCP/IP, Network Monitoring, Cryptography, Information Systems Security, Cloud Security, Computer Networking, Virtual Private Networks (VPN), Vulnerability Assessments, Cloud Computing, Wireless Networks, Intrusion Detection and Prevention, Threat Detection, Encryption
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Management, Threat Detection, Cyber Security Assessment, Security Testing, Cyber Attacks, Information Technology, Cyber Risk, Security Requirements Analysis, Risk Management Framework, Servers, Web Applications, Human Factors (Security), Web Servers, Scenario Testing
- Status: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Cyber Security Assessment, Security Testing, Threat Modeling, Network Analysis, Information Privacy
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Threat Modeling, Network Security, Firewall, Cyber Security Assessment, Code Review, Internet Of Things, Anomaly Detection, Network Routing, Proxy Servers
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Generative AI, Anomaly Detection, Feature Engineering, Data Processing, Threat Modeling, Applied Machine Learning, Deep Learning, Security Testing, Data Synthesis, Data Quality, Cybersecurity, Artificial Intelligence, Reinforcement Learning, Artificial Neural Networks, Machine Learning, Performance Tuning
- Status: NewStatus: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), MITRE ATT&CK Framework, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Mobile Security, Cybersecurity, Vulnerability Assessments, Penetration Testing, Cloud Security, Vulnerability Scanning, Threat Detection, Cyber Threat Intelligence, Malware Protection, Vulnerability Management, Information Systems Security, Intrusion Detection and Prevention, Cyber Attacks, Cloud Computing, Network Security, Cryptography
- Status: Free
Google Quantum AI
Skills you'll gain: Failure Analysis, Estimation, Simulation and Simulation Software, Simulations, Hardware Architecture, Theoretical Computer Science, Linear Algebra
- Status: Preview
Edureka
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Incident Response, Cyber Threat Intelligence, Information Systems Security, Infrastructure Security, Network Security, Network Protocols, Threat Detection, Internet Of Things, System Implementation, Simulations
Skills you'll gain: Endpoint Security, Malware Protection, Mobile Security, Cloud Security, Data Security, Cloud Computing, Application Security, Enterprise Application Management, Information Systems Security, Cloud Storage, Virtualization, Virtual Machines, Threat Management, Disaster Recovery, Human Factors (Security), Information Privacy, Encryption
In summary, here are 10 of our most popular anomaly detection courses
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Cyber Incident Response:Â Infosec
- Splunk Administration and Advanced Topics:Â EDUCBA
- Managing Network Security:Â Kennesaw State University
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes
- Foundations and Reconnaissance Techniques:Â Packt
- DDoS Attacks and Defenses:Â University of Colorado System
- Securing AI and Advanced Topics:Â Johns Hopkins University
- Certified Ethical Hacker (CEH) v.12:Â Packt
- Hands-on quantum error correction with Google Quantum AI:Â Google Quantum AI