Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Threat Management, Cloud Security, Threat Detection, Google Cloud Platform, Application Security, IT Security Architecture, Continuous Monitoring, Malware Protection, Security Controls, Data Security, Personally Identifiable Information, Vulnerability Scanning, Identity and Access Management, Security Management, Information Privacy
- Status: New
Macquarie University
Skills you'll gain: Authentications, Identity and Access Management, User Provisioning, AWS Identity and Access Management (IAM), Multi-Factor Authentication, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Threat Management, OAuth, User Accounts, Authorization (Computing), Azure Active Directory, Key Management, Vulnerability Assessments, Role-Based Access Control (RBAC), Cryptographic Protocols
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: Data Security, Network Security, Security Testing, Cybersecurity, Infrastructure Security, Identity and Access Management, Cloud Security, Security Controls, Threat Detection, Firewall, OSI Models, Encryption, Single Sign-On (SSO), Computer Networking, Incident Response, Public Key Infrastructure
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Cloud Security, Network Security, Cloud Computing, Cybersecurity, Network Architecture, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN)
- Status: New
Skills you'll gain: Natural Language Processing, Text Mining, Scikit Learn (Machine Learning Library), Dimensionality Reduction, Statistical Machine Learning, Unsupervised Learning, Python Programming, Bayesian Statistics, NumPy, Supervised Learning, Machine Learning
- Status: New
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Cloud Security, Infrastructure Security, Security Controls, Threat Detection, Performance Tuning
- Status: New
Skills you'll gain: Penetration Testing, Security Testing, Vulnerability Scanning, Application Security, Vulnerability Assessments, Infrastructure Security, Web Applications, Data Security, Web Servers, SQL
- Status: New
Macquarie University
Skills you'll gain: Mobile Security, Android (Operating System), Malware Protection, Apple iOS, Application Security, File Systems, Incident Response, Authentications, Data Integrity, Vulnerability Assessments, Data Analysis Software, Encryption
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Cloud Computing, Role-Based Access Control (RBAC), Threat Management, Authorization (Computing), User Provisioning, Cloud Services, Network Security, Threat Detection, Firewall, Encryption, Load Balancing
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Security Assertion Markup Language (SAML), Google Workspace, Cloud Security, Application Security, Threat Detection, Application Programming Interface (API), Authentications, Security Management, Multi-Factor Authentication, Identity and Access Management, User Accounts
- Status: New
Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Threat Modeling, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)
- Status: New
Coursera Instructor Network
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cybersecurity, Penetration Testing, Threat Detection, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Tensorflow, Risk Management Framework, Data Integrity
In summary, here are 10 of our most popular anomaly detection courses
- Mitigating Security Vulnerabilities on GC - Português: Google Cloud
- Identity Access Management (IAM) and Secure Authentication: Macquarie University
- Protection of Information Assets: Whizlabs
- Security Architecture & Operations: Packt
- Natural Language Processing - Probability Models in Python: Packt
- Secure VPC Networks with Cloud Next Generation Firewall: Google Cloud
- Web Application Security Testing with Google Hacking: Packt
- Mobile Security: Macquarie University
- Managing Security in Google Cloud - Português Brasileiro: Google Cloud
- Google Workspace Security - Español: Google Cloud