Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Continuous Monitoring, Vulnerability Management, Data Security, System Monitoring, Security Management, Security Information and Event Management (SIEM), Threat Detection, Information Privacy
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Network Analysis, Statistical Modeling, Bayesian Network, R (Software), R Programming, Social Network Analysis, Simulations, Graph Theory, Statistical Analysis, Probability & Statistics, Markov Model, Probability Distribution, Data Visualization, Machine Learning, Statistical Hypothesis Testing
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, Intrusion Detection and Prevention, System Monitoring, Security Information and Event Management (SIEM), Real Time Data
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: Network Security, Security Testing, Cybersecurity, Infrastructure Security, Identity and Access Management, Cloud Security, Security Controls, Security Awareness, Threat Detection, Firewall, OSI Models, Computer Networking, Data Encryption Standard, Cloud Computing, Incident Response, Public Key Infrastructure
- Status: Preview
University of Michigan
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Strategy, Policy Analysis, Public Policies, Vulnerability, Threat Detection, Human Factors, Human Computer Interaction, Technology Strategies, Emerging Technologies
- Status: New
Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
- Status: New
Skills you'll gain: Maintainability, Code Review, Software Architecture, Software Design, Object Oriented Design, Debugging, Testability, Programming Principles, Scalability
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Incident Response, Security Information and Event Management (SIEM), Google Gemini, Vulnerability Management, Technical Analysis
- Status: New
Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Cyber Threat Hunting, MITRE ATT&CK Framework, Cybersecurity, Incident Response, Google Gemini, Vulnerability Assessments, Data Integration
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Endpoint Detection and Response, Security Information and Event Management (SIEM), Vulnerability Assessments, Google Gemini, Interactive Data Visualization, Data Security, Incident Response, Infrastructure Security
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, Incident Response, Cybersecurity, Google Gemini, Computer Security Incident Management, Vulnerability Management, Continuous Monitoring, Infrastructure Security, Generative AI Agents
In summary, here are 10 of our most popular anomaly detection courses
- Mitigating Security Vulnerabilities on Google Cloud 日本語版: Google Cloud
- Computational and Graphical Models in Probability: Johns Hopkins University
- Mitigating Security Vulnerabilities on GC - Português: Google Cloud
- Protection of Information Assets: Whizlabs
- 디지털 민주주의의 명암: University of Michigan
- Palo Alto Networks Cybersecurity Fundamentals: Packt
- Writing Clean Code: 20 Code Smells & How to Avoid Them: Packt
- Google Threat Intelligence - Français: Google Cloud
- Beginning Security: Packt
- Google Threat Intelligence - Español: Google Cloud