Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
Skills you'll gain: Feature Engineering, Dimensionality Reduction, Data Integration, Exploratory Data Analysis, Matlab, Data Processing, Descriptive Statistics, Data Cleansing, Data Transformation, Text Mining, Predictive Modeling, Unstructured Data, Image Analysis
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
University of Pennsylvania
Skills you'll gain: Big Data, Credit Risk, Risk Management, Personalized Service, Digital Transformation, Customer Insights, Machine Learning, Marketing Analytics, Customer Engagement, Risk Analysis, Advanced Analytics, Data-Driven Decision-Making, Anomaly Detection, Financial Data, Consumer Behaviour, Artificial Intelligence, Retail Banking
University of Pennsylvania
Skills you'll gain: Financial Data, Financial Analysis, Financial Statement Analysis, Financial Forecasting, Business Analytics, Predictive Analytics, Analytics, Accounting, Business Metrics, Performance Analysis, Anomaly Detection, Return On Investment, Key Performance Indicators (KPIs), Regression Analysis
University of Illinois Urbana-Champaign
Skills you'll gain: Text Mining, Data Mining, Unstructured Data, Statistical Analysis, Natural Language Processing, Analytics, Data Analysis, Statistical Modeling, Unsupervised Learning, Probability & Statistics, Predictive Modeling, Feature Engineering, Supervised Learning, Machine Learning Algorithms, Algorithms
Skills you'll gain: Cloud Computing, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Computer Security Incident Management, Cloud Security, Operating Systems, Windows Servers, Endpoint Detection and Response, Network Routing, Microsoft Windows, Threat Management
Columbia University
Skills you'll gain: Image Analysis, Computer Vision, Computer Graphics, Computational Thinking, Algorithms, Machine Learning Algorithms, Machine Learning
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Network Architecture, Intrusion Detection and Prevention
DeepLearning.AI
Skills you'll gain: Computer Vision, Tensorflow, Image Analysis, Keras (Neural Network Library), Deep Learning, Artificial Neural Networks, Visualization (Computer Graphics), Machine Learning
MathWorks
Skills you'll gain: Computer Vision, Anomaly Detection, Image Analysis, Matlab, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Application Deployment, PyTorch (Machine Learning Library), Data Visualization, Data Cleansing, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Data Synthesis, Supervised Learning, Performance Tuning, Data Analysis, Machine Learning, Data Manipulation
DeepLearning.AI
Skills you'll gain: iOS Development, Android Development, Tensorflow, Swift Programming, Mobile Development, Application Deployment, Applied Machine Learning, Deep Learning, Embedded Systems, Computer Vision, Machine Learning
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Malware Protection
In summary, here are 10 of our most popular anomaly detection courses
- Data Processing and Feature Engineering with MATLAB:Â MathWorks
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- AI Applications in Marketing and Finance:Â University of Pennsylvania
- Accounting Analytics:Â University of Pennsylvania
- Text Mining and Analytics:Â University of Illinois Urbana-Champaign
- IT Fundamentals for Cybersecurity:Â IBM
- Features and Boundaries:Â Columbia University
- Introduction to Cyber Security:Â New York University
- Advanced Computer Vision with TensorFlow:Â DeepLearning.AI
- Deep Learning for Computer Vision:Â MathWorks