Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Amazon Web Services
Skills you'll gain: Encryption, Amazon Web Services, Cryptography, Telecommunications, File Management, Mobile Security, Data Sharing
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Cloud Security, Google Cloud Platform, Encryption, OAuth, Identity and Access Management, Security Controls, Authorization (Computing), Application Security, Authentications, Data Security, Key Management, Cloud Applications, Role-Based Access Control (RBAC), Cloud Storage, Data Encryption Standard, Virtual Machines, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Encryption
Advanced · Course · 1 - 3 Months

Skills you'll gain: Cloud Applications, Application Deployment, Application Security
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Digital Forensics, Security Management, Human Factors (Security), Information Privacy, Key Management, Cyber Governance, Application Security, Infrastructure Security, Threat Modeling, OSI Models, Security Testing, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cryptography, ISO/IEC 27001, Network Security, Malware Protection, Statistical Analysis, Cyber Security Strategy
Earn a degree
Degree · 1 - 4 Years

Pontificia Universidad Católica de Chile
Skills you'll gain: Epidemiology, Diagnostic Tests, Descriptive Analytics, Business Analytics, Biostatistics, Gerontology, Social Determinants Of Health, Public Key Infrastructure, Encryption, Cryptography, Health Policy, Healthcare Ethics, Digital Transformation, Occupational Health, Telehealth, Leadership, Public Health, Object Oriented Programming (OOP), Program Evaluation, Health Systems
Credit offered
Mastertrack · 6 - 12 Months

Ball State University
Skills you'll gain: Data Ethics, Full-Stack Web Development, Graph Theory, Data Collection, Supervised Learning, Software Development Methodologies, File Systems, SQL, Unsupervised Learning, Statistical Methods, Data Wrangling, Theoretical Computer Science, Cryptography, Object Oriented Programming (OOP), Statistical Hypothesis Testing, Text Mining, Artificial Intelligence, Logistic Regression, Statistical Programming, Natural Language Processing
Earn a degree
Degree · 1 - 4 Years

Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Management, Cybersecurity, Security Awareness, Security Controls, Multi-Factor Authentication, Authentications, Financial Market, Market Data, Financial Regulations, Regulatory Compliance
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Encryption, OSI Models, Network Architecture, Computer Networking, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security, Software-Defined Networking
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Communication Systems
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks