• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Anomaly Detection

Anomaly Detection Courses

Anomaly detection courses can help you learn statistical methods, machine learning techniques, and data preprocessing strategies. You can build skills in identifying outliers, implementing clustering algorithms, and applying time series analysis. Many courses introduce tools like Python libraries such as Scikit-learn and TensorFlow, as well as software for data visualization, which enhance your ability to analyze and interpret complex datasets.


Popular Anomaly Detection Courses and Certifications


  • P

    Packt

    Web Hacker's Toolbox - Tools Used by Successful Hackers

    Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    B

    Board Infinity

    Security for Artificial Intelligence Software and Services

    Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing

    3.5
    Rating, 3.5 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Computer Vision: Face Recognition Quick Starter in Python

    Skills you'll gain: Computer Vision, Python Programming, Image Analysis, Real Time Data, Visualization (Computer Graphics), Development Environment, Deep Learning, Software Installation, Performance Tuning, System Configuration, Algorithms

    Beginner · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    The Pearson Complete Course for CISM Certification: Unit 4

    Skills you'll gain: Disaster Recovery, Business Continuity, Threat Modeling, Threat Detection, Cyber Attacks, Security Awareness, Risk Analysis, Compliance Management, Regulatory Requirements, Business Analysis, Investigation

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Security Command Center Fundamentals

    Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Identity and Access Management, Vulnerability Management

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Certified Incident Handler (ECIH) v2

    Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Disaster Recovery, Vulnerability Assessments, Cyber Threat Intelligence, Network Security, Risk Management

    Intermediate · Specialization · 1 - 3 Months

  • P

    Packt

    Fundamentals of Secure Software

    Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Software, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Threat Detection, Cryptography, Software Testing, CI/CD, Cloud Platforms, Vulnerability Assessments, Configuration Management

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: Protecting your Information at Home

    Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption

    4.8
    Rating, 4.8 out of 5 stars
    ·
    35 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Online Influence and Persuasion

    Skills you'll gain: Social Network Analysis, Network Analysis, Data Analysis, Exploratory Data Analysis, Analytics, Statistical Analysis, Social Sciences, Behavioral Economics, Research, Data Collection, Sociology, Data Transformation, Persuasive Communication, Application Programming Interface (API), Media and Communications, Substance Abuse, Psychology

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Kubernetes Security Specialist (CKS)

    Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Threat Management, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Intrusion Detection and Prevention, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Application Security

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: DevSecOps

    Skills you'll gain: DevSecOps, Secure Coding, Cloud-Native Computing, Software Architecture, Security Engineering, Software Design, Microsoft Azure, Cybersecurity, DevOps, Kubernetes, Infrastructure as Code (IaC), Web Applications, Azure DevOps, Containerization, API Design, Docker (Software), Software Engineering, Role-Based Access Control (RBAC), Dependency Analysis, Git (Version Control System)

    Beginner · Course · 1 - 3 Months

  • G

    Google Cloud

    Enhanced Network Security Approach on Google Cloud

    Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security

    Advanced · Project · Less Than 2 Hours

Searches related to anomaly detection

advanced malware and network anomaly detection
machine learning - anomaly detection via pycaret
create a cosmetic anomaly detection model using visual inspection ai
create a component anomaly detection model using visual inspection ai
deploy and test a visual inspection ai component anomaly detection solution
deploy and test a visual inspection ai cosmetic anomaly detection solution
1…525354…66

In summary, here are 10 of our most popular anomaly detection courses

  • Web Hacker's Toolbox - Tools Used by Successful Hackers: Packt
  • Security for Artificial Intelligence Software and Services: Board Infinity
  • Computer Vision: Face Recognition Quick Starter in Python: Packt
  • The Pearson Complete Course for CISM Certification: Unit 4: Pearson
  • Security Command Center Fundamentals: Google Cloud
  • Certified Incident Handler (ECIH) v2: Packt
  • Fundamentals of Secure Software: Packt
  • Cybersecurity: Protecting your Information at Home: Kennesaw State University
  • Online Influence and Persuasion: Johns Hopkins University
  • Certified Kubernetes Security Specialist (CKS): Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok