Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.
University of California, Irvine
Skills you'll gain: Blockchain, Data Sharing, Cryptography, Transaction Processing, Fraud detection, Distributed Computing, FinTech, Systems Architecture, Emerging Technologies, Software Versioning, Data Validation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Virtual Machines, Blockchain, Identity and Access Management, Transaction Processing, Google Cloud Platform, Cryptography, Cloud Security
Advanced · Project · Less Than 2 Hours

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Network Security, Security Engineering, Cybersecurity, Vulnerability Assessments, Public Key Cryptography Standards (PKCS), Transaction Processing, Data Validation, Distributed Computing, Data Integrity, Network Protocols, Fraud detection, Verification And Validation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Security Controls, Blockchain, Security Testing, Network Infrastructure, Network Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Network Protocols, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Digital Forensics, Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Cloud Computing Architecture, Network Security, Incident Response, Threat Management, Cloud Security, Threat Modeling, Risk Analysis, Business Risk Management, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Cyber Threat Intelligence
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

École Polytechnique
Skills you'll gain: Emerging Technologies, Communication Systems, Telecommunications, Cryptography, Simulations, Physics, Computing Platforms, Algorithms, Mathematical Modeling
Mixed · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Vulnerability Assessments, Identity and Access Management, Asset Management
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Threat Modeling, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Big Data, Cybersecurity, Pedagogy, Data Security, Cryptography, Information Privacy, Encryption, Responsible AI, AI Personalization, Computer Science, Information Technology, Web Applications, Web Servers, Machine Learning, Supervised Learning
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks