Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: New
Coursera Instructor Network
Skills you'll gain: Prompt Engineering, Risk Modeling, Risk Analysis, Continuous Monitoring, Generative AI, Project Risk Management, Risk Management Framework, Risk Management, Operational Risk, Data-Driven Decision-Making, Business Risk Management, Data Integration, Anomaly Detection, Artificial Intelligence, Threat Detection, Automation
Skills you'll gain: Penetration Testing, Network Security, Cybersecurity, Threat Detection, General Networking, Vulnerability Management, Linux, System Configuration, Command-Line Interface, Software Installation, Virtual Machines, Network Analysis
Skills you'll gain: Computer Vision, Image Analysis, Real Time Data, Python Programming, Programming Principles, Visualization (Computer Graphics), Algorithms, Development Environment, Deep Learning, Software Installation
- Status: New
Skills you'll gain: Unstructured Data, Large Language Modeling, Data Processing, Text Mining, Generative AI, Semantic Web, Data Transformation, Development Environment, Data Cleansing, Application Programming Interface (API), Metadata Management, Hypertext Markup Language (HTML)
Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Network Security, Cybersecurity, Infrastructure Security, Information Systems Security, Intrusion Detection and Prevention, Threat Modeling, Firewall, Governance, Network Protocols, Data Ethics, Artificial Intelligence
Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Security Strategy, Information Systems Security, Security Controls, Security Awareness, Automation
- Status: New
Skills you'll gain: Incident Response, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Modeling, Vulnerability Scanning, Threat Detection, Intrusion Detection and Prevention, Application Security, Penetration Testing, Network Security, Malware Protection, Network Analysis
- Status: NewStatus: Free Trial
Skills you'll gain: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cloud Computing, Zero Trust Network Access, Cybersecurity, Network Security, Cyber Security Assessment, Threat Detection, Mobile Security, Hardening, Security Controls, Disaster Recovery, Authentications
- Status: NewStatus: Free Trial
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Information Systems Security, Application Security, Patch Management, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Continuous Monitoring, Authorization (Computing)
- Status: NewStatus: Free Trial
Skills you'll gain: Security Controls, Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Threat Management, Endpoint Security, Cloud Security, Governance Risk Management and Compliance, Security Management, Cybersecurity, Risk Management, Compliance Management, Risk Appetite, Network Security, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Risk Analysis
Google Cloud
Skills you'll gain: Cloud API, Application Programming Interface (API), Google Cloud Platform, Cloud Security, Load Balancing, Threat Management, Threat Detection
In summary, here are 10 of our most popular anomaly detection courses
- GenAI for Risk Managers: Advanced Risk Analysis Techniques: Coursera Instructor Network
- Learn Man in the Middle Attacks from Scratch: Packt
- Computer Vision: Face Recognition Quick Starter in Python: Packt
- Preprocessing Unstructured Data for LLMs and RAG Systems: Packt
- Security Command Center Fundamentals: Google Cloud
- Artificial Intelligence Industrial Control Systems Security: Johns Hopkins University
- Enhancing Mac Security: Strategies for Protection: LearnQuest
- CyberSec First Responder (CFR-310): Packt
- Cloud Security, Resiliency, and Vulnerability Management: Packt
- Comprehensive Cisco Security Techniques and Automation: Packt