Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Network Architecture, Cloud Computing, Threat Management, Zero Trust Network Access, Cybersecurity, Cyber Attacks, Network Security, Cyber Security Assessment, IT Security Architecture, Threat Detection, Mobile Security, Hardening
Skills you'll gain: Vulnerability Scanning, Threat Modeling, Vulnerability Management, Vulnerability Assessments, Secure Coding, Security Testing, Threat Management, Cyber Governance, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Application Security, Open Web Application Security Project (OWASP), Threat Detection, Cybersecurity, Risk Management Framework, Security Management, Security Controls, Code Review, Incident Response
Skills you'll gain: Threat Detection, Software-Defined Networking, Network Architecture, Network Planning And Design, Network Security, Cybersecurity, Cloud Computing Architecture, Network Infrastructure, Internet Of Things, Multi-Cloud, Cloud Security, Wide Area Networks, Technical Consulting
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Threat Management, Cloud Security, Threat Detection, Application Security, Continuous Monitoring, Cybersecurity, Security Controls, Data Security, Personally Identifiable Information, Identity and Access Management, Cloud Services, Automation
Google Cloud
Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Data Security, Network Security, Cloud Computing, Encryption, Infrastructure Security, Google Cloud Platform, Public Cloud, Threat Detection, Authentications, Authorization (Computing), Identity and Access Management, Data Centers
Skills you'll gain: Firewall, Network Security, Network Administration, Network Troubleshooting, Amazon Web Services, Network Monitoring, System Configuration, Infrastructure Security, Virtual Private Networks (VPN), Endpoint Security, Intrusion Detection and Prevention, Threat Management, Malware Protection, Application Deployment, Configuration Management
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Google Workspace, Cloud Security, Application Security, Threat Detection, Application Programming Interface (API), Authentications, Security Management, Multi-Factor Authentication, Identity and Access Management, User Accounts
Imperial College London
Skills you'll gain: Supervised Learning, Data Ethics, Unsupervised Learning, Exploratory Data Analysis, PySpark, Bayesian Statistics, Ggplot2, Dimensionality Reduction, Linear Algebra, Big Data, Anomaly Detection, Data Analysis, Data Visualization, A/B Testing, Data Transformation, Deep Learning, Unstructured Data, Data Pipelines, Applied Machine Learning, Learning Strategies
University of London
Skills you'll gain: Security Management, Key Management, Human Factors (Security), Information Privacy, Security Testing, Cyber Governance, Cryptography, Infrastructure Security, Threat Modeling, Application Security, OSI Models, Malware Protection, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Security Awareness, Data Collection, Criminal Investigation and Forensics, Data Analysis
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Infrastructure Security, Cloud Infrastructure, Cybersecurity, Network Security, Cloud Computing, Google Cloud Platform, Threat Detection, Authentications, Authorization (Computing), Data Storage, Data Governance, Encryption
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Continuous Monitoring, Cloud Security, Proxy Servers, Google Cloud Platform, Infrastructure Security, Identity and Access Management, Threat Detection, Intrusion Detection and Prevention, Hardening, Firewall, Network Monitoring, Network Troubleshooting
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cloud Security, Proxy Servers, Google Cloud Platform, Firewall, Network Monitoring, Intrusion Detection and Prevention, Threat Detection, Identity and Access Management
In summary, here are 10 of our most popular anomaly detection courses
- Cloud Security, Resiliency, and Vulnerability Management:Â Packt
- Vulnerability Types and Concepts:Â Packt
- Designing Software-Defined Branch Infrastructures:Â LearnQuest
- Mitigating Security Vulnerabilities on GC - Português: Google Cloud
- Trust and Security with Google Cloud - Español: Google Cloud
- Cisco CCNP Security SNCF (Exam 300-710):Â Packt
- Google Workspace Security - Español: Google Cloud
- Master of Science in Machine Learning and Data Science:Â Imperial College London
- Master of Science in Cyber Security:Â University of London
- Trust and Security with Google Cloud - Português Brasileiro: Google Cloud