Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
Skills you'll gain: C# (Programming Language), Mobile Development, Scripting, Application Development, Cross Platform Development, Computer Programming, User Interface (UI), Development Environment, Software Development, Debugging
Institut Mines-Télécom
Skills you'll gain: Threat Modeling, Threat Detection, Security Requirements Analysis, Cybersecurity, Cyber Attacks, Application Security, Security Testing, Vulnerability Assessments, Secure Coding, SQL, Databases
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Information Systems Security, Command-Line Interface, Security Controls, Virtual Private Networks (VPN), Hardening, Firewall, Vulnerability Scanning, Local Area Networks, Vulnerability Assessments, Zero Trust Network Access, Wireless Networks, Malware Protection, Threat Detection, Security Information and Event Management (SIEM), Encryption, Network Analysis
Board Infinity
Skills you'll gain: Financial Services, Risk Management, Banking, Digital Transformation, FinTech, Regulatory Compliance, Customer Engagement, Environmental Social And Corporate Governance (ESG), Financial Market, Analytics, Cybersecurity, Payment Processing, Innovation, Blockchain, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Penetration Testing, Incident Response, Computer Security Incident Management, Cyber Security Strategy, Application Security, Open Web Application Security Project (OWASP), Cybersecurity, Information Systems Security, Vulnerability Assessments, Secure Coding, Intrusion Detection and Prevention, Hardening, Infrastructure Security, Threat Modeling, Mobile Security, Cloud Security, Vulnerability Management, Disaster Recovery, Containerization
Skills you'll gain: Unstructured Data, Data Processing, Text Mining, Generative AI, Semantic Web, Data Transformation, Development Environment, Application Frameworks, Data Cleansing, Information Architecture, Document Management, Application Programming Interface (API), Image Analysis, Metadata Management, Hypertext Markup Language (HTML)
Skills you'll gain: Incident Response, Cybersecurity, Human Factors (Security), Security Awareness, Continuous Monitoring, Cyber Security Strategy, Cyber Governance, Crisis Management, Computer Security Awareness Training, Culture Transformation, Threat Management, Threat Detection, Organizational Change, Communication Planning, Employee Engagement
Skills you'll gain: Penetration Testing, Network Security, Intrusion Detection and Prevention, Wireless Networks, Cybersecurity, Vulnerability Assessments, Computer Networking, Linux, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Security Controls, Intrusion Detection and Prevention, Identity and Access Management, Firewall, Security Management, Network Administration, Cybersecurity, Network Security, System Configuration, Software Installation, Technical Support and Services, System Implementation, Operating Systems
Skills you'll gain: Computer Security Incident Management, Cybersecurity, Security Management, Cyber Security Strategy, Cyber Attacks, Malware Protection, Data Security, Security Awareness, Vulnerability Assessments, Threat Detection, Email Security
In summary, here are 10 of our most popular anomaly detection courses
- Enhanced Network Security Approach on Google Cloud:Â Google Cloud
- Cybersecurity Fundamentals:Â Johns Hopkins University
- Advanced Game Projects, C# Scripting, and Social Features:Â Packt
- Cybersécurité : comment sécuriser un site web: Institut Mines-Télécom
- Securing Systems and Networks:Â Packt
- Inside BFSI: Structure, Challenges, and Technology:Â Board Infinity
- Advanced Security Strategies and Incident Response:Â Packt
- Preprocessing Unstructured Data for LLMs and RAG Systems:Â Packt
- The Cybersecurity Culture Blueprint: A Proactive Approach:Â LearnQuest
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux:Â Packt