Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Technical University of Denmark (DTU)
Skills you'll gain: Laboratory Testing, Quality Assurance, Microbiology, Infectious Diseases, Bioinformatics, Clinical Laboratory Science, Epidemiology, Medical Science and Research, Public Health, Pharmacology, Molecular Biology, Data Sharing
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, TCP/IP, Cybersecurity, Debugging
- Status: Free TrialStatus: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Attacks, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
- Status: Free Trial
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Endpoint Security, Incident Response, Scripting, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Authorization (Computing), IT Automation, Intrusion Detection and Prevention
- Status: Free Trial
Technical University of Munich (TUM)
Skills you'll gain: Global Positioning Systems, Human Factors, Manufacturing Processes, Digital Transformation, Aerospace Basic Quality System Standards, Environmental Monitoring, Control Systems, Production Process, Automation, Manufacturing and Production, Structural Analysis, Leadership, Big Data, Human Machine Interfaces, Cybersecurity, Mathematical Modeling, Artificial Intelligence, Engineering Design Process, Threat Detection, Network Architecture
- Status: Free Trial
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
- Status: Free Trial
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Control Systems, Continuous Monitoring, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Process Analysis, Data Sharing, Manufacturing Processes, Manufacturing Operations, Product Design, Manufacturing and Production, Constructive Feedback
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Text Mining, Data Mining, Unstructured Data, Statistical Analysis, Natural Language Processing, Analytics, Data Analysis, Unsupervised Learning, Probability & Statistics, Regression Analysis, Predictive Modeling, Supervised Learning, Machine Learning Algorithms
- Status: Free Trial
DeepLearning.AI
Skills you'll gain: Generative AI, Tensorflow, Computer Vision, Image Analysis, Deep Learning, Keras (Neural Network Library), Applied Machine Learning, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Feature Engineering, Distributed Computing, Computer Graphics, Unsupervised Learning, Network Model, Visualization (Computer Graphics), Network Architecture, Performance Tuning, Machine Learning Methods, API Design, Object Oriented Programming (OOP)
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
Skills you'll gain: Computer Vision, Image Analysis, Artificial Neural Networks, IBM Cloud, Keras (Neural Network Library), Cloud Applications, Deep Learning, Tensorflow, Visualization (Computer Graphics), PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Computer Programming, Application Deployment, Augmented Reality, Machine Learning, Data Processing
In summary, here are 10 of our most popular anomaly detection courses
- Antimicrobial resistance - theory and methods:Â Technical University of Denmark (DTU)
- Ciberseguridad de Google:Â Google
- Google Cloud Cybersecurity:Â Google Cloud
- Python for Cybersecurity:Â Infosec
- Digitalisation in Aeronautics and Space:Â Technical University of Munich (TUM)
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Digital Manufacturing & Design Technology:Â University at Buffalo
- Text Mining and Analytics:Â University of Illinois Urbana-Champaign
- TensorFlow: Advanced Techniques:Â DeepLearning.AI
- Real-Time Cyber Threat Detection and Mitigation:Â New York University