Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Beginner · Course · 1 - 4 Weeks

Macquarie University
Beginner · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Information Assurance, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Combinatorics, Probability & Statistics, Data Analysis, Advanced Mathematics, Linear Algebra, Mathematics and Mathematical Modeling, Mathematical Theory & Analysis, Applied Mathematics, Statistics, Analysis, Statistical Analysis, Probability, Algorithms, Algebra
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Computer Security Incident Management, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Information Systems Security, Network Architecture, Computer Networking, DevSecOps, Risk Management, OAuth, Data Management, Software Development Methodologies, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Macquarie University
Intermediate · Specialization · 3 - 6 Months
LearnQuest
Skills you'll gain: Blockchain, Key Management, Security Controls, Cryptography, Cybersecurity, Security Engineering, Application Security, Network Security, Vulnerability Assessments, Encryption, Secure Coding, Data Security, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Transaction Processing, Risk Management, Code Review, Data Integrity
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Public Key Infrastructure, Network Monitoring, Encryption, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches, Authentications
Intermediate · Course · 1 - 4 Weeks
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Encryption, Transaction Processing, Authentications, FinTech, Data Security, Emerging Technologies, Data Integrity, Distributed Computing
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Cryptography, Exploit development, Amazon Web Services, Infrastructure Security, Cyber Security Strategy, Amazon Elastic Compute Cloud, Application Security, Cloud Computing, Email Security, Public Key Infrastructure, Containerization, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Enterprise Security, Regulation and Legal Compliance, Data Security, Cybersecurity, Secure Coding, Application Frameworks, Distributed Denial-Of-Service (DDoS) Attacks, Emerging Technologies, Distributed Computing, Transaction Processing
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months