Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Universidad Austral
Skills you'll gain: Blockchain, FinTech, Internet Of Things, Emerging Technologies, Legal Technology, Digital Transformation, Public Administration, Distributed Computing, Financial Services, Governance, Cryptography, World History
Beginner Ā· Course Ā· 1 - 3 Months

University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Security Controls, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
Beginner Ā· Course Ā· 1 - 4 Weeks

EIT Digital
Skills you'll gain: Real-Time Operating Systems, Embedded Software, Embedded Systems, Internet Of Things, Cryptography, Operating Systems, Network Architecture, Network Security, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Threat Modeling, System Programming, Computer Programming, Software Engineering, C (Programming Language), Real Time Data
Intermediate Ā· Specialization Ā· 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Wireless Networks, Infrastructure Security, General Networking, Cybersecurity, Cloud Platforms, Cryptography, Network Protocols, Automation, Emerging Technologies, Embedded Systems, Software-Defined Networking, Market Analysis
Build toward a degree
Intermediate Ā· Course Ā· 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Encryption, Threat Detection, Cybersecurity
Beginner Ā· Specialization Ā· 3 - 6 Months

Ćcole Polytechnique
Skills you'll gain: Physics, Experimentation, Cryptography, Electrical Engineering, Mathematical Modeling, Laboratory Research, Applied Mathematics, Engineering, Scientific, and Technical Instruments, Emerging Technologies
Mixed Ā· Course Ā· 1 - 3 Months
Skills you'll gain: Blockchain, Digital Assets, FinTech, Financial Inclusion, Emerging Technologies, Identity and Access Management, Financial Services, Cryptography, Automation, Contract Management, Security Controls
Intermediate Ā· Course Ā· 1 - 4 Weeks
University of London
Skills you'll gain: Arithmetic, Computer Graphics, Computational Thinking, General Mathematics, Systems Of Measurement, Algebra, Cryptography
Beginner Ā· Course Ā· 1 - 4 Weeks

Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Beginner Ā· Course Ā· 1 - 3 Months

AI CERTs
Skills you'll gain: Threat Management, Application Security, Vulnerability Management, Security Controls, Encryption, Financial Regulation, Regulatory Compliance
Advanced Ā· Course Ā· 1 - 3 Months

University of Leeds
Skills you'll gain: Logical Reasoning, Computational Logic, Computational Thinking, Algorithms, Theoretical Computer Science, Artificial Intelligence, Cryptography, Graph Theory
Beginner Ā· Course Ā· 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Software Design Patterns, Software Architecture, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
Intermediate Ā· Course Ā· 1 - 3 Months