Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Status: NewStatus: Free TrialSkills you'll gain: Image Analysis, Tensorflow, Amazon Web Services, Cloud Applications, Application Development, Application Deployment, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Data Processing, Front-End Web Development
Status: NewStatus: Free TrialSkills you'll gain: Vulnerability Assessments, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Hardening, Risk Analysis
Status: NewStatus: PreviewEIT Digital
Skills you'll gain: Cybersecurity, Information Systems Security, Cyber Threat Intelligence, Data Ethics, Deep Learning, Intrusion Detection and Prevention, Artificial Intelligence and Machine Learning (AI/ML), Malware Protection, Natural Language Processing, Artificial Intelligence, Threat Detection, Anomaly Detection, Machine Learning, Supervised Learning
Status: Free TrialSkills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity, Technical Communication
Status: NewStatus: Free TrialLearnQuest
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Computer Security Incident Management, Scripting, Cyber Operations, Event Monitoring, Network Analysis, Automation, Machine Learning Methods, Machine Learning Algorithms
Status: Free TrialSkills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Status: PreviewMicrosoft
Skills you'll gain: Generative AI, Large Language Modeling, Data Ethics, LLM Application, Prompt Engineering, Responsible AI, Feature Engineering, Artificial Intelligence, Anomaly Detection, Data Synthesis, Information Privacy
Status: Free TrialJohns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Status: PreviewSkills you'll gain: Generative AI, Email Security
Status: NewStatus: Free TrialSkills you'll gain: Cybersecurity, Cyber Threat Intelligence, Network Security, Cyber Security Strategy, Data Security, Security Controls, Continuous Monitoring, Threat Management, Security Strategy, Incident Response, Vulnerability Assessments, Systems Architecture, Risk Management Framework
Status: NewStatus: Free TrialSkills you'll gain: Incident Response, Threat Modeling, Threat Detection, Computer Security Incident Management, Malware Protection, Cybersecurity, Cyber Attacks, Network Analysis, Microsoft Windows, Operating Systems, Virtual Environment

Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Network Monitoring, Network Analysis
In summary, here are 10 of our most popular anomaly detection courses
- Mask Detector with Python & TensorFlow: Build & Deploy:Â EDUCBA
- Ethical Hacking Capstone Project: Breach, Response, AI:Â IBM
- AI for Cybersecurity:Â EIT Digital
- Incident Response and Digital Forensics:Â IBM
- GenAI for Cybersecurity: Blue Team:Â LearnQuest
- Sound the Alarm: Detection and Response:Â Google
- Generative AI for Data Science:Â Microsoft
- Information Assurance Analysis:Â Johns Hopkins University
- Gen AI for Fraud Detection Analytics:Â Edureka
- Cybersecurity Prevention and Detection: Unit 4:Â Pearson










