Study cryptography principles for securing digital information. Learn about encryption, decryption, and cryptographic protocols.

Skills you'll gain: Cryptography, Generative Model Architectures, Probability Distribution, Machine Learning Algorithms, Algorithms
Intermediate · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Threat Modeling, Network Security, Internet Of Things, Identity and Access Management, Encryption, Security Engineering, Infrastructure Security, Cybersecurity, Security Controls, Threat Management, Cloud Security, Vulnerability Assessments, Threat Detection, Cloud Solutions, Systems Architecture, Cryptography, Information Privacy, Authentications, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Software, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Threat Detection, Cryptography, Software Testing, CI/CD, Cloud Platforms, Vulnerability Assessments, Configuration Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Data Structures, Blockchain, Programming Principles, Data Management, Object Oriented Programming (OOP), Cryptography, Debugging, Application Security
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), System Monitoring, Virtual Machines, Cryptography, Key Management, Authentications, Cloud Applications, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Security Controls, Cloud Computing, Application Design, Time Series Analysis and Forecasting, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Authentications, Predictive Analytics
Beginner · Course · 1 - 3 Months

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Development Testing, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Continuous Monitoring, Wireless Networks, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Application Development, Cloud Applications, Payment Systems, Cryptography, Investments, FinTech, Digital Assets, Open Source Technology, Distributed Computing, Microservices, E-Commerce, Transaction Processing, Interoperability, Algorithms, Scalability, Governance
Intermediate · Course · 1 - 3 Months

Skills you'll gain: User Accounts, Cryptography
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Network Security, Disaster Recovery, Network Administration, Authentications, Vulnerability Assessments, Computer Networking, Network Infrastructure, Wireless Networks, Cybersecurity, Network Monitoring, Local Area Networks, Vulnerability Management, Telecommunications, Network Protocols, Network Switches, Network Routing, Communication Systems, Cryptography, Encryption
Intermediate · Course · 1 - 4 Weeks