Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

University of Leeds
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Encryption, Information Systems Security, Cybersecurity, Theoretical Computer Science, Computational Logic
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Computer Security Incident Management, Cloud Security, Responsible AI, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Market Dynamics
Mixed · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Python Programming, Brute-force attacks, Algorithms, Data Integrity
Mixed · Course · 1 - 3 Months

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months