Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

University of California San Diego
Skills you'll gain: Big Data, Cybersecurity, Pedagogy, Student Engagement, Blockchain, Digital pedagogy, Algorithms, Data Security, Teaching, digital literacy, Cryptography, Technical Communication, Diversity Awareness, K-12 pedagogy, Information Privacy, Emerging Technologies, Computer Networking, Digital Transformation, Diversity Equity and Inclusion Initiatives, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: IBM Cloud, Cryptography, Algorithms, Python Programming, Linear Algebra, Computational Thinking, Jupyter, Simulation and Simulation Software, Physics, Software Installation, Development Environment
Beginner · Course · 3 - 6 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Modeling, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Data Security, Identity and Access Management, Infrastructure Security, Hardening
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google App Engine, Authentications, Application Deployment, Identity and Access Management, Google Cloud Platform, Cloud Applications, Authorization (Computing), User Accounts, Cryptography, Python Programming
Beginner · Project · Less Than 2 Hours

Association of International Certified Professional Accountants
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Legal Technology, Digital Assets, Payment Systems, Cryptography, Accounting and Finance Software, Technology Solutions, Transaction Processing, Supply Chain Management, Technical Services
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Authentications, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Security Controls
Intermediate · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud API, Middleware, Cryptography
Beginner · Project · Less Than 2 Hours

The State University of New York
Skills you'll gain: Blockchain, FinTech, Cryptography, Digital Assets, Payment Systems, Distributed Computing, Identity and Access Management, Web Applications, Transaction Processing, Emerging Technologies, Application Programming Interface (API), Scalability, Technical Standard
Beginner · Course · 1 - 4 Weeks
University of Illinois Urbana-Champaign
Skills you'll gain: Blockchain, Cryptography, FinTech, Governance, Emerging Technologies, Payment Systems, Transaction Processing, Distributed Computing, Digital Assets, Cyber Governance, Regulation and Legal Compliance, Ledgers (Accounting), Data Security, Interoperability, Case Studies, Scalability
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Encryption, Data Structures, Virtualization and Virtual Machines, Network Protocols, Distributed Computing, Algorithms
Intermediate · Course · 1 - 3 Months