Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "anomaly detection techniques"
Coursera Project Network
Skills you'll gain: Anomaly Detection, Jupyter, Exploratory Data Analysis, Application Deployment, Unsupervised Learning, Data Visualization, Applied Machine Learning, Machine Learning, Machine Learning Software, Machine Learning Algorithms
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
University of Colorado Boulder
Skills you'll gain: Unsupervised Learning, Anomaly Detection, Machine Learning Methods, Data Mining, Applied Machine Learning, Feature Engineering, Exploratory Data Analysis, Data Analysis, Machine Learning Algorithms, Algorithms
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
University of Colorado Boulder
Skills you'll gain: Unsupervised Learning, Regression Analysis, Dimensionality Reduction, Data Analysis, Anomaly Detection, Supervised Learning, Machine Learning, Machine Learning Algorithms, Analytics, Scikit Learn (Machine Learning Library), Predictive Modeling, Statistical Analysis, Applied Machine Learning, Machine Learning Methods, Statistical Modeling, Data-Driven Decision-Making, Exploratory Data Analysis, Classification And Regression Tree (CART), Data Mining, Feature Engineering
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
- Status: Free
Imperial College London
Skills you'll gain: Creative Thinking, Brainstorming, Ideation, Creativity, Resourcefulness, Curiosity, Problem Solving, Analytical Skills, Collaboration, Analysis
Coursera Project Network
Skills you'll gain: Time Series Analysis and Forecasting, Data Visualization Software, Statistical Visualization, Plot (Graphics), Box Plots, Anomaly Detection, Heat Maps, Data Analysis, Spatial Data Analysis, Exploratory Data Analysis, Data Processing
- Status: Free
Coursera Project Network
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Network Analysis
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Advanced Analytics, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Security, Applied Machine Learning, Artificial Neural Networks, Email Security, Natural Language Processing
In summary, here are 10 of our most popular anomaly detection techniques courses
- Machine Learning - Anomaly Detection via PyCaret:Â Coursera Project Network
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Data Balancing with Gen AI: Credit Card Fraud Detection:Â Coursera Project Network
- Association Rules Analysis:Â University of Colorado Boulder
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Intrusion Detection:Â Johns Hopkins University
- Data Analysis with Python:Â University of Colorado Boulder
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University
- Creative Thinking: Techniques and Tools for Success:Â Imperial College London
- Time Series Data Visualization And Analysis Techniques :Â Coursera Project Network