Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Encryption, Information Systems Security, Cybersecurity, Theoretical Computer Science, Computational Logic
Intermediate · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Arithmetic, Algorithms, Theoretical Computer Science, Computational Thinking, Algebra, Python Programming
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

University of Leeds
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Cloud Security, Operating Systems, Responsible AI, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: Probability, Computational Logic, Combinatorics, Bayesian Statistics, Algorithms, Theoretical Computer Science, Mathematical Software, Mathematical Theory & Analysis, Cryptography, Logical Reasoning, Deductive Reasoning, Computational Thinking, Computer Science, Encryption, Data Structures, Arithmetic, General Mathematics, Public Key Cryptography Standards (PKCS), Problem Solving, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Princeton University
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Market Dynamics
Mixed · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Cyber Security Assessment, Brute-force attacks, Python Programming, Programming Principles, Scripting, Algorithms, Data Structures, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Computer Security Incident Management, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Information Systems Security, Network Architecture, Computer Networking, DevSecOps, Risk Management, OAuth, Data Management, Software Development Methodologies, Cybersecurity
Beginner · Specialization · 3 - 6 Months