Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

University of Leeds
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Data Integrity
Beginner · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Network Security, Encryption, Advanced Encryption Standard (AES), Cybersecurity, Key Management, Security Engineering, Data Integrity, Federated Learning, Security Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Encryption, Information Systems Security, Cybersecurity, Theoretical Computer Science, Computational Logic
Intermediate · Course · 1 - 4 Weeks

Princeton University
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Market Dynamics
Mixed · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Cloud Security, Operating Systems, Responsible AI, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Cyber Security Assessment, Brute-force attacks, Python Programming, Programming Principles, Scripting, Algorithms, Data Structures, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Probability, Computational Logic, Combinatorics, Bayesian Statistics, Algorithms, Theoretical Computer Science, Mathematical Software, Mathematical Theory & Analysis, Cryptography, Logical Reasoning, Deductive Reasoning, Computational Thinking, Computer Science, Encryption, Data Structures, Arithmetic, General Mathematics, Public Key Cryptography Standards (PKCS), Problem Solving, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Python Programming, Brute-force attacks, Algorithms, Data Integrity
Mixed · Course · 1 - 3 Months