Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Data Governance, Data Processing, Data Integrity, Data Access, Data Management, Data Validation, Data Strategy, Data Collection, Data Analysis, Statistical Analysis, Sampling (Statistics), Statistical Methods
- Status: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Penetration Testing, Cyber Threat Hunting, Vulnerability Management, Threat Modeling, Cybersecurity, Threat Detection, Cryptography, Security Testing, Vulnerability Assessments, Application Security, MITRE ATT&CK Framework, Encryption, Open Web Application Security Project (OWASP), Network Analysis
- Status: Free Trial
University of Colorado System
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Threat Detection, Cyber Security Strategy, Threat Management, Data Security, Cybersecurity, Endpoint Detection and Response, Firewall, Cyber Attacks, Security Controls, Network Security, Cyber Security Assessment, System Monitoring
- Status: Preview
National Taiwan University
Skills you'll gain: Building Information Modeling, Autodesk Revit, Integration Testing, Construction Estimating, Civil and Architectural Engineering, Data Integration, 3D Modeling, Simulation and Simulation Software, Construction Management
- Status: Free Trial
Skills you'll gain: Feature Engineering, Unsupervised Learning, Data Ethics, Dimensionality Reduction, Anomaly Detection, Text Mining, Applied Machine Learning, Data Transformation, Data Cleansing, Exploratory Data Analysis, Data Science, Artificial Intelligence, Machine Learning, Natural Language Processing, Data Quality, Machine Learning Algorithms, Python Programming
- Status: Free Trial
Skills you'll gain: Image Analysis, Anomaly Detection, Computer Vision, Data Processing, Data Manipulation, Data Store, Automation, Data Transformation, Metadata Management, Histogram, Spatial Analysis, Data Import/Export, Data Storage Technologies, Data Storage, Matlab, Color Theory, Unsupervised Learning, Machine Learning, Algorithms
- Status: Preview
University of Alberta
Skills you'll gain: Physics, Mathematical Modeling, Simulations, Scientific Methods, General Science and Research, Scientific Visualization
- Status: Free Trial
EC-Council
Skills you'll gain: Mobile Security, Penetration Testing, Cloud Security, Cybersecurity, Network Security, Cyber Attacks, Vulnerability Assessments, Wireless Networks, Threat Detection, Security Awareness, Application Security, Web Applications, Internet Of Things, Encryption, Authentications
- Status: Free Trial
Wesleyan University
Skills you'll gain: Predictive Modeling, Data Mining, Unsupervised Learning, Predictive Analytics, Random Forest Algorithm, Decision Tree Learning, Quantitative Research, Data Analysis, Data Validation, Analytics, Statistical Analysis, Forecasting, Exploratory Data Analysis, Supervised Learning, Applied Machine Learning, Regression Analysis, Big Data, Statistical Methods, Machine Learning, Python Programming
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Data Manipulation, Applied Machine Learning, Decision Tree Learning, Risk Modeling, Machine Learning Methods, Threat Detection, Supervised Learning, Advanced Analytics, Predictive Modeling, Machine Learning, Predictive Analytics, Transaction Processing
- Status: Free Trial
DeepLearning.AI
Skills you'll gain: Image Analysis, Tensorflow, Computer Vision, Visualization (Computer Graphics), Keras (Neural Network Library), Machine Learning Methods, Deep Learning, Feature Engineering, Artificial Neural Networks, Data Processing
- Status: Free Trial
University of Colorado System
Skills you'll gain: Incident Response, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Cyber Threat Intelligence, Business Risk Management, Penetration Testing, Cloud Security, Security Testing, Authentications, Computer Security Incident Management, Risk Management, Threat Management, Threat Detection, Cyber Security Strategy, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Vulnerability Scanning, Computer Security Awareness Training, Vulnerability Assessments
In summary, here are 10 of our most popular anomaly detection courses
- Total Data Quality:Â University of Michigan
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- BIM Application for Engineers:Â National Taiwan University
- AI Workflow: Feature Engineering and Bias Detection:Â IBM
- Image Processing for Engineering and Science:Â MathWorks
- Astro 101: Black Holes:Â University of Alberta
- Ethical Hacking Essentials (EHE):Â EC-Council
- Machine Learning for Data Analysis:Â Wesleyan University
- Fraud Detection on Financial Transactions with Machine Learning on Google Cloud:Â Google Cloud