Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Graph Theory, Data Structures, Operations Research, Public Key Cryptography Standards (PKCS), Cryptography, Programming Principles, Computational Thinking, Pseudocode, Design Strategies, Computer Science, Tree Maps, Encryption, Linear Algebra, Combinatorics, Mathematical Modeling, Advanced Mathematics, IBM Cloud, Python Programming
Build toward a degree
Advanced · Specialization · 3 - 6 Months

ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, FinTech, Emerging Technologies, Ledgers (Accounting), Business Modeling, Internet Of Things, Distributed Computing, Open Source Technology, Digital Assets, Transaction Processing, Scalability
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Application Deployment, Encryption, Web Applications, Business Process, Digital Assets, Transaction Processing, Automation, Data Integrity, Algorithms
Beginner · Course · 1 - 3 Months
Skills you'll gain: Blockchain, Digital Assets, FinTech, Business Strategy, Strategic Decision-Making, Governance, Financial Services, Financial Regulation, Ledgers (Accounting), Work Breakdown Structure, Project Implementation, Business Modeling, Banking Services, Financial Systems, Project Design, Solution Design, Cryptography, Design, Emerging Technologies, Payment Systems
Beginner · Specialization · 3 - 6 Months

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, AI Security, Endpoint Security, Threat Modeling, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
Intermediate · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Threat Detection, Cybersecurity, Workflow Management
Beginner · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Authentications, Cryptography, Secure Coding, Kotlin, Android (Operating System), OAuth, Encryption, Mobile Security, Android Development, Key Management, Exploit development, Application Security, Android Studio, Data Security, Open Web Application Security Project (OWASP), Authorization (Computing), Mobile Development, Security Engineering, Security Controls, Application Development
Intermediate · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Wireless Networks, General Networking, Cybersecurity, IBM Cloud, Cloud Platforms, Cryptography, Automation, Emerging Technologies, Software-Defined Networking, Market Analysis
Build toward a degree
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cybersecurity, Cloud Deployment, Network Administration, Cloud Infrastructure, Firewall, Endpoint Detection and Response, Network Infrastructure, Data Security, Docker (Software), AI Security, Virtual Private Networks (VPN), Software As A Service, Hybrid Cloud Computing, Threat Modeling, Containerization, Threat Detection, Threat Management, Security Controls
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

28DIGITAL
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Internet Of Things, Security Requirements Analysis, Network Architecture, Network Security, Operating Systems, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), System Programming, Simple Object Access Protocol (SOAP), Application Development, System Requirements, C (Programming Language), System Design and Implementation, Software Development
Intermediate · Specialization · 3 - 6 Months