Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography
Beginner · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Cryptographic Protocols, Combinatorics, Computational Logic, Deductive Reasoning, Graphing, Cryptography, Probability, Key Management, Computational Thinking, Encryption, Probability & Statistics, Programming Principles, Network Analysis, Theoretical Computer Science, Bayesian Statistics, Python Programming, Cybersecurity, Algorithms
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Application Security, Data Security, Information Technology, Cyber Security Strategy, Authentications, Penetration Testing, Computer Security Incident Management
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cloud Security, Identity and Access Management, Disaster Recovery, Data Governance, Data Management, Cloud Computing Architecture, Cloud Computing, IT Security Architecture, Cloud Standards, Security Controls, Application Security, Data Security, Cloud Deployment, Cloud Services, Cybersecurity, Threat Management, Security Management, Security Engineering, Network Security, Cryptography
Advanced · Course · 3 - 6 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Duke University
Skills you'll gain: File I/O, Object Oriented Design, Java Programming, Object Oriented Programming (OOP), Data Structures, Java, Cryptography, Software Engineering, Computer Programming, Code Reusability, Algorithms, Encryption, Maintainability, Data Store, Program Development, Web Analytics and SEO, Data Import/Export, Web Servers, Server Side
Beginner · Course · 1 - 3 Months

University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Development Testing, Test Script Development, Application Development, Transaction Processing, Emerging Technologies, Application Design, Application Frameworks, Cryptographic Protocols, Web Development Tools, Network Protocols, Program Development, Distributed Computing, Cloud Platforms, Computing Platforms, Development Environment, Integrated Development Environments, Programming Principles
Intermediate · Specialization · 3 - 6 Months

John Wiley & Sons
Skills you'll gain: IT Security Architecture, DevSecOps, Cloud Security, Mobile Security, Cloud Computing Architecture, Application Security, Network Security, Infrastructure Security, Cloud Computing, Security Controls, Cloud Infrastructure, Zero Trust Network Access, Firewall, Cloud Solutions, Endpoint Security, Load Balancing, Continuous Monitoring, System Monitoring, System Configuration, Cryptography
Intermediate · Course · 1 - 4 Weeks

John Wiley & Sons
Skills you'll gain: Vulnerability Scanning, Incident Response, Vulnerability Assessments, Cloud Security, Threat Management, Endpoint Security, Cyber Threat Intelligence, Risk Management, Risk Management Framework, Incident Management, Vulnerability Management, Security Management, Cyber Security Assessment, Intrusion Detection and Prevention, Threat Detection, Cloud Computing, Security Strategy, Cyber Security Strategy, Network Security, Cryptography
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment
Beginner · Specialization · 3 - 6 Months
Duke University
Skills you'll gain: File I/O, UI Components, Object Oriented Design, Java Programming, Software Design, Maintainability, Debugging, Web Design and Development, Software Engineering, Code Reusability, Hypertext Markup Language (HTML), Computer Programming, Program Development, Event-Driven Programming, Bioinformatics, Encryption, Javascript, Algorithms, Data Analysis, Cascading Style Sheets (CSS)
Beginner · Specialization · 3 - 6 Months

John Wiley & Sons
Skills you'll gain: Incident Response, IT Security Architecture, DevSecOps, Vulnerability Scanning, Vulnerability Assessments, Cloud Security, Threat Management, Security Management, Computer Security Incident Management, Endpoint Security, Mobile Security, Security Strategy, Cloud Computing Architecture, Cyber Threat Intelligence, Cryptographic Protocols, Cybersecurity, Cyber Security Policies, Cyber Security Strategy, Cryptography, Risk Management
Intermediate · Specialization · 1 - 3 Months