Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Threat Management, Google Cloud Platform
Skills you'll gain: Agile Project Management, Agile Methodology, Sprint Retrospectives, Team Leadership, Employee Coaching, Team Building, Timelines, Sprint Planning, Continuous Improvement Process, CI/CD, Test Driven Development (TDD), Risk Management
Skills you'll gain: Penetration Testing, Security Testing, Open Web Application Security Project (OWASP), Application Security, Test Tools, Vulnerability Assessments, Web Development Tools, Cybersecurity, Web Applications, SQL
Skills you'll gain: Cloud Security, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Cybersecurity, Security Controls
Skills you'll gain: Penetration Testing, Network Security, Intrusion Detection and Prevention, Wireless Networks, Cybersecurity, Vulnerability Assessments, Computer Networking, Linux, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Skills you'll gain: Endpoint Security, Multi-Factor Authentication, Patch Management, Network Security, Information Systems Security, Cybersecurity, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Continuous Monitoring, Authorization (Computing), Identity and Access Management
Skills you'll gain: Android Development, Mobile Development, C# (Programming Language), Scripting, Application Development, User Interface (UI), Software Installation, Program Development, Computer Graphics, Object Oriented Programming (OOP), Human Computer Interaction, Computer Programming, Development Environment, Interactive Design
Skills you'll gain: Incident Response, Cybersecurity, Human Factors (Security), Security Awareness, Continuous Monitoring, Cyber Security Strategy, Cyber Governance, Crisis Management, Computer Security Awareness Training, Culture Transformation, Threat Management, Threat Detection, Organizational Change, Communication Planning, Employee Engagement
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Security Controls, Intrusion Detection and Prevention, Identity and Access Management, Firewall, Security Management, Network Administration, Cybersecurity, Network Security, System Configuration, Software Installation, Technical Support and Services, System Implementation, Operating Systems
Skills you'll gain: Incident Response, Cybersecurity, Risk Management, Cyber Security Assessment, Cyber Security Strategy, Cyber Governance, Cyber Security Policies, Secure Coding, Malware Protection, Cyber Risk, Governance, Enterprise Risk Management (ERM), Threat Modeling, Intrusion Detection and Prevention, Personally Identifiable Information, Governance Risk Management and Compliance, Application Security, Data Governance, Threat Detection, Compliance Management
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
Skills you'll gain: Penetration Testing, Incident Response, Computer Security Incident Management, Cyber Security Strategy, Application Security, Open Web Application Security Project (OWASP), Cybersecurity, Information Systems Security, Vulnerability Assessments, Secure Coding, Intrusion Detection and Prevention, Hardening, Infrastructure Security, Threat Modeling, Mobile Security, Cloud Security, Vulnerability Management, Disaster Recovery, Containerization
In summary, here are 10 of our most popular anomaly detection courses
- Getting Started with Security Command Center Enterprise:Â Google Cloud
- Advanced Agile Practices and Continuous Improvement:Â Packt
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt
- Cybersecurity Planning, Management, and Compliance:Â Microsoft
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux:Â Packt
- Comprehensive Cisco Security Techniques and Automation:Â Packt
- C# and Unity by Example — 20+ Mini Game Development Projects: Packt
- The Cybersecurity Culture Blueprint: A Proactive Approach:Â LearnQuest
- Check Point Jump Start: Quantum Management:Â Check Point Software Technologies Ltd.
- Incident Response, Risk Management, and Compliance:Â Packt