Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: New
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Network Security, Threat Detection, Proxy Servers, Network Monitoring, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Google Cloud Platform, Identity and Access Management
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Google Workspace, Application Security, Cloud Security, Security Management, Application Programming Interface (API), Authentications, Threat Detection, Identity and Access Management, Multi-Factor Authentication, User Accounts
Skills you'll gain: Email Security, Data Loss Prevention, Google Workspace, Security Management, Threat Management, Malware Protection, Network Routing, Threat Detection
- Status: New
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Continuous Monitoring, Network Security, Network Monitoring, Proxy Servers, Intrusion Detection and Prevention, Threat Detection, Firewall, Google Cloud Platform, Infrastructure Security, Network Troubleshooting, Identity and Access Management
Universidad de los Andes
Skills you'll gain: Supervised Learning, Unsupervised Learning, Anomaly Detection, Dimensionality Reduction, Artificial Intelligence, Machine Learning, Regression Analysis, Probability & Statistics, Data Ethics, Image Analysis, Natural Language Processing, Computer Vision, Embedded Systems, Applied Machine Learning, Linear Algebra, Machine Learning Algorithms, Statistical Methods, Predictive Modeling, Bayesian Statistics, Ethical Standards And Conduct
University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Infrastructure Security, Information Privacy, Cyber Governance, Application Security, Network Security, Threat Modeling, Cryptography, OSI Models, Security Testing, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, ISO/IEC 27001, Penetration Testing, Malware Protection, Data Literacy, Data Collection
Universidad de los Andes
Skills you'll gain: Real-Time Operating Systems, Supervised Learning, Unsupervised Learning, Anomaly Detection, Computer Vision, Reinforcement Learning, Cloud-Native Computing, Natural Language Processing, Containerization, Deep Learning, Dimensionality Reduction, Artificial Intelligence, Machine Learning, CI/CD, Probability & Statistics, Control Systems, Data Ethics, Application Deployment, Epidemiology, Education Software and Technology
Imperial College London
Skills you'll gain: Data Ethics, Supervised Learning, Exploratory Data Analysis, Unsupervised Learning, Student Support and Services, PySpark, Data Pipelines, Linear Algebra, Ggplot2, Dimensionality Reduction, Student Services, Data Processing, Big Data, Agentic systems, Graphing, A/B Testing, Unstructured Data, Deep Learning, Bayesian Statistics, Applied Machine Learning
- Status: New
Macquarie University
Skills you'll gain: Authentications, Identity and Access Management, User Provisioning, AWS Identity and Access Management (IAM), Multi-Factor Authentication, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Threat Management, OAuth, User Accounts, Authorization (Computing), Azure Active Directory, Key Management, Vulnerability Assessments, Role-Based Access Control (RBAC), Cryptographic Protocols
- Status: New
Macquarie University
Skills you'll gain: Mobile Security, Threat Detection, Cybersecurity, File Systems, Data Security, Data Integrity, Data Analysis Software, Data Validation, Data Ethics, Data Storage Technologies, Microsoft Windows, Verification And Validation, Internet Of Things, Encryption, Network Monitoring, Real Time Data
University of Colorado Boulder
Skills you'll gain: Object Oriented Design, User Story, New Product Development, Systems Engineering, Real-Time Operating Systems, Unsupervised Learning, Field-Programmable Gate Array (FPGA), Failure Analysis, Delegation Skills, Sampling (Statistics), Supplier Management, Sustainability Reporting, Accountability, Data Ethics, Data Mining, Goal Setting, Proposal Writing, Generative AI, Process Capability, Diversity Equity and Inclusion Initiatives
- Status: New
Macquarie University
Skills you'll gain: DevSecOps, Application Security, Secure Coding, MLOps (Machine Learning Operations), Security Engineering, Threat Modeling, Security Testing, Software Architecture, Kubernetes, Cloud Security, CI/CD, Microsoft Azure, Web Applications, Docker (Software), Containerization, Infrastructure as Code (IaC), Machine Learning, Version Control, Dependency Analysis
In summary, here are 10 of our most popular anomaly detection courses
- Networking in Google Cloud: Network Security - Français: Google Cloud
- Google Workspace Security - Français: Google Cloud
- Google Workspace Mail Management - Português Brasileiro: Google Cloud
- Networking in Google Cloud: Network Security - 日本語版: Google Cloud
- Inteligencia Artificial: Machine learning, ética y nuevas tendencias Certificado MasterTrack®: Universidad de los Andes
- Master of Science in Cyber Security: University of London
- Maestría en Inteligencia Artificial: Universidad de los Andes
- Master of Science in Machine Learning and Data Science: Imperial College London
- Identity Access Management (IAM) and Secure Authentication: Macquarie University
- Digital Forensics: Macquarie University