Filter by
The language used throughout the course, in both instruction and assessments.
Results for "anomaly+detection+techniques"
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
DeepLearning.AI
Skills you'll gain: Unsupervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Machine Learning, Machine Learning Algorithms, Supervised Learning, Artificial Intelligence, Reinforcement Learning, Artificial Neural Networks, Deep Learning, Anomaly Detection, Dimensionality Reduction, Algorithms, Regression Analysis
- Status: Free
Eindhoven University of Technology
Skills you'll gain: Process Analysis, Process Improvement, Business Process Management, Data Mining, Business Process Modeling, Process Optimization, Data Processing, Operational Analysis, Data Analysis, Real Time Data, Data Science, Verification And Validation, Algorithms
Skills you'll gain: Debugging, Technical Communication, Network Troubleshooting, Performance Tuning, Problem Management, Technical Documentation, Technical Support, System Monitoring, System Support, Capacity Management, Incident Management, Performance Testing, Application Performance Management, Network Performance Management, Continuous Monitoring, Virtual Machines, Scripting
Skills you'll gain: Feature Engineering, Applied Machine Learning, Advanced Analytics, Predictive Modeling, Analytics, Unsupervised Learning, Data Ethics, Machine Learning, Machine Learning Algorithms, Supervised Learning, Random Forest Algorithm, Decision Tree Learning, Performance Tuning, Python Programming
University of Illinois Urbana-Champaign
Skills you'll gain: Data Visualization, Data Visualization Software, Text Mining, Data Presentation, Data Mining, Interactive Data Visualization, Data Storytelling, Dashboard, Visualization (Computer Graphics), Tableau Software, Plot (Graphics), Natural Language Processing, Unsupervised Learning, Unstructured Data, Statistical Analysis, Graphing, Big Data, Anomaly Detection, Analytics, Data Validation
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Advanced Analytics, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Security, Applied Machine Learning, Artificial Neural Networks, Email Security, Natural Language Processing
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Cyber Security Policies, Investigation, Event Monitoring, Threat Detection, Contingency Planning, Communication Planning
In summary, here are 10 of our most popular anomaly+detection+techniques courses
- Sound the Alarm: Detection and Response: Google
- Unsupervised Learning, Recommenders, Reinforcement Learning: DeepLearning.AI
- Process Mining: Data science in Action: Eindhoven University of Technology
- Troubleshooting and Debugging Techniques: Google
- The Nuts and Bolts of Machine Learning: Google
- Data Mining: University of Illinois Urbana-Champaign
- Incident Response and Digital Forensics: IBM
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery : ISC2
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Vulnerability Scanning with Nmap: Network Scanning: Coursera Project Network