Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: New
Skills you'll gain: Linux Administration, Package and Software Management, Linux, Command-Line Interface, Linux Servers, Linux Commands, Unix Commands, File Systems, OS Process Management, Bash (Scripting Language), Unix, Software Installation, Systems Administration, Unix Shell, File Management, Service Management, Authorization (Computing), Operating Systems, Servers, Data Storage
- Status: New
Skills you'll gain: Cybersecurity, Incident Response, Cryptography, Information Systems Security, Network Security, Vulnerability Scanning, Encryption, Security Controls, Vulnerability Assessments, Infrastructure Security, Penetration Testing, Cloud Security, Intrusion Detection and Prevention, Authorization (Computing), Firewall, Identity and Access Management, Linux, Microsoft Windows
- Status: NewStatus: Free Trial
Board Infinity
Skills you'll gain: Financial Services, Risk Management, Banking, Customer experience strategy (CX), Digital Transformation, FinTech, Regulatory Compliance, Environmental Social And Corporate Governance (ESG), Financial Market, Cybersecurity, Payment Processing, Innovation, Blockchain, Artificial Intelligence and Machine Learning (AI/ML)
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Security Management, Event Monitoring, Threat Detection, Continuous Monitoring, System Monitoring, Google Cloud Platform
- Status: Free Trial
Skills you'll gain: Text Mining, Natural Language Processing, Microsoft Azure, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Unstructured Data, Analytics, Application Development, Application Programming Interface (API)
- Status: Free Trial
Skills you'll gain: Vulnerability Management, Threat Detection, Vulnerability Scanning, Vulnerability Assessments, Threat Management, Cyber Threat Intelligence, Security Strategy, Security Testing, Incident Response
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Threat Modeling, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols, Authentications
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Security Information and Event Management (SIEM), Threat Detection, Incident Management
Skills you'll gain: Unity Engine, Mobile Development, Android (Operating System), Video Game Development, Game Design, C# (Programming Language), Animation and Game Design, Scripting, User Interface (UI), Programming Principles, Development Environment
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, iOS Development, Threat Detection, Cyber Security Policies, Network Security, Event Monitoring
DeepLearning.AI
Skills you'll gain: Image Analysis, Computer Vision, Deep Learning, Artificial Neural Networks, Tensorflow, PyTorch (Machine Learning Library), Applied Machine Learning, Machine Learning Methods, Algorithms
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
In summary, here are 10 of our most popular anomaly detection courses
- LPIC-1 Linux Administrator (101-500): Packt
- GIAC Security Essentials (GSEC): Packt
- Inside BFSI: Structure, Challenges, and Technology: Board Infinity
- Chronicle SIEM: Multi Event Rules: Google Cloud
- Intro to Natural Language Processing in Microsoft Azure: Microsoft
- Incident Response and Defense with OpenVAS: IBM
- Advanced Cybersecurity Techniques: Johns Hopkins University
- Managing Threat Intelligence with Cortex XSOAR: Google Cloud
- C# and Unity by Example — 20+ Mini Game Development Projects: Packt
- Check Point Jump Start: Harmony Mobile: Check Point Software Technologies Ltd.