Search result for Anomaly detection techniques Online Courses & Certifications
Get Course Alerts by Email
Complete Outlier Detection Algorithms A-Z: In Data Science
by Saurav Singla- 4.8
1.5 hours on-demand video
Outlier Detection Algorithms in Data Science, Machine Learning, Deep Learning, Data Analysis, Statistics with Python Welcome to the course "Complete Outlier Detection Algorithms A-Z: In Data Science". Are you Data Scientist or Data Analyst or Financial Analyst or maybe you are interested in anomaly detection or fraud detection? Angular Based Outlier Detection...
$12.99
Advanced Manufacturing Process Analysis
by Rahul Rai- 4.6
Approx. 13 hours to complete
Data Analysis: Computational Techniques and Platforms Anomaly Detection Resources: Anomaly Detection...
Outlier Detection Algorithms in Data Mining and Data Science
by KDD Expert- 3.6
2.5 hours on-demand video
Welcome to the course " Outlier Detection Techniques ". Welcome to Outlier Detection Techniques, a course designed to teach you not only how to recognise various techniques but also how to implement them correctly. The process of identifying outliers has many names in Data Mining and Machine learning such as outlier mining, outlier modeling, novelty detection or anomaly detection....
$12.99
Data Science: Machine Learning and Statistical Modeling in R
by Star Academy- 4.2
10 hours on-demand video
Master machine learning techniques with R to solve Real-World problems and gain valuable insights from your data. In this course, we will teach you advanced techniques in machine learning with the latest code in R. You will explore, in depth, topics such as data mining, classification, clustering, regression, predictive modeling, anomaly detection, and more....
$11.99
From 0 to 1: Machine Learning, NLP & Python-Cut to the Chase
by Loony Corn- 4.5
20 hours on-demand video
A down-to-earth, shy but confident take on machine learning techniques that you can put to work today The course is very visual : most of the techniques are explained with the help of animations to help you understand better. Supervised/Unsupervised learning, Classification, Clustering, Association Detection, Anomaly Detection, Dimensionality Reduction, Regression....
$14.99
Applied AI with DeepLearning
by Romeo Kienzler , Niketan Pansare , Tom Hanlon , Max Pumperla , Ilja Rasin- 4.4
Approx. 24 hours to complete
If you’re struggling, you’ll see a structured treasure trove of practical techniques that walk you through what you need to do to get on track. Introduction to Anomaly Detection How to implement an anomaly detector (1/2) How to implement an anomaly detector (2/2) How to deploy a real-time anomaly detector Anomaly Detection...
AWS Certified Machine Learning Specialty (MLS-C01)
by Chandra Lingam- 4.6
17 hours on-demand video
*** SEP-2020 Anomaly Detection with Random Cut Forest - Learn the intuition behind anomaly detection using Random Cut Forest. Don’t waste your time sifting through mountains of techniques that are in the wild...
$25.99
Related searches
Data Analytics Foundations for Accountancy II
by Robert Brunner- 4.8
Approx. 70 hours to complete
Module 8: Introduction to Anomaly Detection Introduction to Anomaly Detection Statistical Anomaly Detection Machine Learning and Anomaly Detection...
DDoS Attacks and Defenses
by Edward Chow- 4.5
Approx. 15 hours to complete
A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. Major DDoS Defense Techniques Technical overview of DDoS and mitigation techniques Survey of Major Techniques in DDoS Defense Unsupervised Anomaly-based Malware Detection Techniques DDoS Defense Systems and Techniques 3 DDoS Defense Systems and Techniques...
Cryptographic Hash and Integrity Protection
by Sang-Yoon Chang- 4.5
Approx. 9 hours to complete
Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. This course is a part of the Applied Cryptography specialization....