Filter by
The language used throughout the course, in both instruction and assessments.
Results for "anomaly detection techniques"
Skills you'll gain: DevOps, Mobile Security, Software Security, System Software, Cyberattacks, Leadership and Management
Skills you'll gain: Linux, Network Security, Computer Security Incident Management, Leadership and Management
- Status: Free
Eindhoven University of Technology
Skills you'll gain: Process Analysis, Data Analysis, Data Mining
Coursera Project Network
Skills you'll gain: Data Visualization, Machine Learning
Vanderbilt University
Skills you'll gain: Data Analysis, Data Model
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security, Security Engineering, System Security, Computer Networking, Security Software, Leadership and Management, Security Strategy, Software Security
Skills you'll gain: Algorithms, Dimensionality Reduction, Feature Engineering, Machine Learning, Data Science, Python Programming
Skills you'll gain: Computer Vision, Deep Learning, Matlab
University of Illinois Urbana-Champaign
Skills you'll gain: Machine Learning, Data Analysis, Data Mining, Machine Learning Algorithms, Natural Language Processing, Probability & Statistics, Data Visualization, Bayesian Statistics, General Statistics, Probability Distribution, Statistical Programming, Algorithms, Mathematical Theory & Analysis, Python Programming, Data Visualization Software
- Status: Free
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security
In summary, here are 10 of our most popular anomaly detection techniques courses
- Incident Response and Digital Forensics:Â IBM
- Sound the Alarm: Detection and Response:Â Google
- Process Mining: Data science in Action:Â Eindhoven University of Technology
- Machine Learning - Anomaly Detection via PyCaret:Â Coursera Project Network
- ChatGPT Advanced Data Analysis:Â Vanderbilt University
- Gen AI for Fraud Detection Analytics:Â Edureka
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- AI Workflow: Feature Engineering and Bias Detection:Â IBM
- Advanced Deep Learning Techniques for Computer Vision:Â MathWorks
- AWS: Threat Detection, Logging and Monitoring:Â Whizlabs