Filter by
The language used throughout the course, in both instruction and assessments.
Results for "anomaly+detection+techniques"
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Integrity, Data Analysis Software, User Accounts, USB, Systems Analysis
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Applied Machine Learning, Decision Tree Learning, Supervised Learning, Predictive Modeling, Predictive Analytics
Skills you'll gain: Feature Engineering, Data Ethics, Unsupervised Learning, Dimensionality Reduction, Text Mining, Applied Machine Learning, Data Transformation, Anomaly Detection, Exploratory Data Analysis, Data Manipulation, Data Cleansing, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Natural Language Processing, Quality Assurance, Data Validation, Machine Learning Algorithms, Data Visualization
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
- Status: Free
Skills you'll gain: ChatGPT, Cyber Threat Hunting, Cybersecurity, Malware Protection, Incident Response, Threat Detection, Security Information and Event Management (SIEM), Network Analysis, Network Protocols, Network Security, Generative AI
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
LearnQuest
Skills you'll gain: Data Warehousing, Data Analysis, Cloud Computing, Data Architecture, Big Data, Cloud Services, Analytics, Data Storage, Cloud Computing Architecture, Cloud Infrastructure, Cloud Solutions, Scalability, Data Processing, Extract, Transform, Load, Cloud Platforms, Database Architecture and Administration, Statistical Analysis, Data Strategy, Data-Driven Decision-Making, Spreadsheet Software
University of Illinois Urbana-Champaign
Skills you'll gain: Text Mining, Data Mining, Unstructured Data, Statistical Analysis, Natural Language Processing, Analytics, Data Analysis, Unsupervised Learning, Predictive Modeling, Machine Learning Methods, Supervised Learning, Machine Learning Algorithms, Algorithms
In summary, here are 10 of our most popular anomaly+detection+techniques courses
- Computer Forensics: Infosec
- Cyber Incident Response: Infosec
- Data Security: Cisco Learning and Certifications
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Fraud Detection on Financial Transactions with Machine Learning on Google Cloud: Google Cloud
- AI Workflow: Feature Engineering and Bias Detection: IBM
- Automated Cyber Security Incident Response: EDUCBA
- Applied ChatGPT for Cybersecurity: Infosec
- Advanced System Security Design: University of Colorado System
- Risk Identification, Monitoring, and Analysis: ISC2