• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Anomaly Detection

Anomaly Detection Courses

Anomaly detection courses can help you learn statistical methods, machine learning techniques, and data preprocessing strategies. You can build skills in identifying outliers, implementing clustering algorithms, and applying time series analysis. Many courses introduce tools like Python libraries such as Scikit-learn and TensorFlow, as well as software for data visualization, which enhance your ability to analyze and interpret complex datasets.


Popular Anomaly Detection Courses and Certifications


  • Status: Preview
    Preview
    W

    Whizlabs

    Microsoft Copilot: Power Platform & Security Best Practices

    Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, AI Enablement, Threat Detection, Compliance Management, AI Security, Workflow Management, Automation, Incident Response

    4.2
    Rating, 4.2 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    W

    Whizlabs

    Exam Prep SC-900: Microsoft Certified Security Fundamentals

    Skills you'll gain: Compliance Management, Microsoft 365, Microsoft Azure, Governance Risk Management and Compliance, DevSecOps, Endpoint Detection and Response, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Threat Detection, Zero Trust Network Access, Data Governance, Active Directory, Endpoint Security, Authorization (Computing), Data Security, Vulnerability Management, Multi-Factor Authentication, Enterprise Security, Operations

    Beginner · Specialization · 1 - 3 Months

  • Status: Free
    Free
    D

    DeepLearning.AI

    Preprocessing Unstructured Data for LLM Applications

    Skills you'll gain: Retrieval-Augmented Generation, Unstructured Data, LLM Application, Data Preprocessing, Metadata Management, JSON, Image Analysis, Data Transformation, Document Management, Vision Transformer (ViT)

    4.5
    Rating, 4.5 out of 5 stars
    ·
    13 reviews

    Beginner · Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Ethical Hacking Essentials: Hands-On Edition

    Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    C

    Coursera

    Landing.AI for Beginners: Build Data Visualization AI Models

    Skills you'll gain: Model Deployment, Prompt Engineering, Generative AI, Cloud Deployment, Image Analysis, Computer Vision, Convolutional Neural Networks, Classification Algorithms

    4.4
    Rating, 4.4 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 4

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Identity Access Management and Authentication

    Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    System Hacking, Malware Threats, and Network Attacks

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Network Protocols

    4.8
    Rating, 4.8 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Data Manipulation and Cleaning in R

    Skills you'll gain: Data Manipulation, Data Cleansing, Data Quality, Data Preprocessing, Tidyverse (R Package), Data Transformation, R Programming, Text Mining, Data Validation, Generative AI, Anomaly Detection

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Secure Your Data at Rest

    Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Encryption, Cloud Storage, Authorization (Computing), Authentications, Database Management, Data Governance, Key Management, Identity and Access Management, Firewall, Threat Detection

    4.5
    Rating, 4.5 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    B

    Board Infinity

    Advanced Cybersecurity Risk Management

    Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)

    4.9
    Rating, 4.9 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    S

    Scrimba

    Intro to Dall-E and GPT Vision

    Skills you'll gain: OpenAI API, Image Analysis, Multimodal Prompts, Prompt Engineering, Generative AI, OpenAI, ChatGPT, Vision Transformer (ViT), Computer Vision, Artificial Intelligence

    4.6
    Rating, 4.6 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to anomaly detection

advanced malware and network anomaly detection
machine learning - anomaly detection via pycaret
1…495051…73

In summary, here are 10 of our most popular anomaly detection courses

  • Microsoft Copilot: Power Platform & Security Best Practices: Whizlabs
  • Exam Prep SC-900: Microsoft Certified Security Fundamentals: Whizlabs
  • Preprocessing Unstructured Data for LLM Applications: DeepLearning.AI
  • Ethical Hacking Essentials: Hands-On Edition: EC-Council
  • Landing.AI for Beginners: Build Data Visualization AI Models: Coursera
  • Certified Ethical Hacker (CEH): Unit 4: Pearson
  • Cyber Security: Identity Access Management and Authentication: Macquarie University
  • System Hacking, Malware Threats, and Network Attacks: Packt
  • Data Manipulation and Cleaning in R: Microsoft
  • Secure Your Data at Rest: Microsoft

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok