Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Encryption, Information Systems Security, Cybersecurity, Theoretical Computer Science, Computational Logic
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Beginner · Course · 1 - 3 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Probability, Computational Logic, Combinatorics, Bayesian Statistics, Algorithms, Theoretical Computer Science, Mathematical Software, Mathematical Theory & Analysis, Cryptography, Logical Reasoning, Deductive Reasoning, Computational Thinking, Computer Science, Encryption, Data Structures, Arithmetic, General Mathematics, Public Key Cryptography Standards (PKCS), Problem Solving, Cybersecurity
Beginner · Specialization · 3 - 6 Months

University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Cryptography, Algorithms, Theoretical Computer Science, Mathematical Theory & Analysis, Arithmetic, Computational Thinking, Public Key Cryptography Standards (PKCS), Data Structures, Applied Mathematics, Logical Reasoning, Deductive Reasoning
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Application Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Algorithms, Data Structures, File I/O
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Cybersecurity, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Responsible AI, Network Security, Threat Detection, Cyber Attacks, NIST 800-53, Information Technology
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months