Filter by
The language used throughout the course, in both instruction and assessments.
Results for "anomaly+detection+techniques"
Skills you'll gain: Machine Learning, Python Programming
Cisco Learning and Certifications
- Status: Free
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security
Infosec
University of Colorado Boulder
Skills you'll gain: Algorithms, Data Mining, Data Warehousing
Skills you'll gain: Algorithms, Dimensionality Reduction, Feature Engineering, Machine Learning, Data Science, Python Programming
University of California, Davis
Skills you'll gain: Security Engineering, Computer Programming, Software Security
University of Colorado System
Skills you'll gain: Cryptography, Security Engineering, Algorithms, Mathematics, Theoretical Computer Science, Critical Thinking, Mathematical Theory & Analysis, System Security, Computer Security Models, Cyberattacks, Probability Distribution, Software Security, Applied Mathematics, Computational Logic, BlockChain, Computational Thinking
University of Illinois Urbana-Champaign
Skills you'll gain: Data Analysis, Data Mining, Natural Language Processing, Probability & Statistics, Machine Learning, Bayesian Statistics, General Statistics, Machine Learning Algorithms, Probability Distribution, Algorithms
DeepLearning.AI
Skills you'll gain: Algorithms, Machine Learning, Machine Learning Algorithms, Applied Machine Learning, Human Learning, Deep Learning, Machine Learning Software, Mathematics, Reinforcement Learning, Statistical Machine Learning
In summary, here are 10 of our most popular anomaly+detection+techniques courses
- Introduction to SIEM (Splunk):Â EDUCBA
- The Nuts and Bolts of Machine Learning:Â Google
- Threat Analysis:Â Cisco Learning and Certifications
- Applied ChatGPT for Cybersecurity:Â Infosec
- Computer Forensics:Â Infosec
- Data Mining Foundations and Practice:Â University of Colorado Boulder
- AI Workflow: Feature Engineering and Bias Detection:Â IBM
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- Applied Cryptography:Â University of Colorado System
- Incident Response and Recovery:Â ISC2