Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Creo Incubator
Skills you'll gain: Digital Assets, Blockchain, Financial Services, FinTech, Payment Systems, Emerging Technologies, Transaction Processing, Cryptography, Systems Architecture, Business Process Automation, Innovation, Healthcare 5.0, Verification And Validation
Beginner · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Encryption, Amazon Web Services, Cryptography, Telecommunications, File Management, Mobile Security, Data Sharing
Beginner · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Encryption
Advanced · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Computer Security Incident Management, Incident Response, Network Security, Information Systems Security, Security Information and Event Management (SIEM), Encryption, Security Controls, Infrastructure Security, Cyber Risk, TCP/IP, Cryptography, Vulnerability Management, Multi-Factor Authentication, Virtual Private Networks (VPN), Authentications, Operating Systems
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Loans, Web Applications, Cloud Applications, Application Deployment, Program Development, Application Security, Open Source Technology, Development Environment, Data Storage
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Security Management, Human Factors (Security), Information Privacy, Key Management, Cyber Governance, Application Security, Infrastructure Security, Threat Modeling, OSI Models, Security Testing, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cryptography, ISO/IEC 27001, Network Security, Malware Protection, Incident Management, Statistical Analysis, Cyber Security Strategy
Earn a degree
Degree · 1 - 4 Years

Ball State University
Skills you'll gain: Data Ethics, Full-Stack Web Development, Graph Theory, Data Collection, Supervised Learning, Software Development Methodologies, File Systems, SQL, Unsupervised Learning, Statistical Methods, Data Wrangling, Theoretical Computer Science, Cryptography, Object Oriented Programming (OOP), Statistical Hypothesis Testing, Text Mining, Artificial Intelligence, Logistic Regression, Statistical Programming, Natural Language Processing
Earn a degree
Degree · 1 - 4 Years

Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Management, Cybersecurity, Security Awareness, Security Controls, Multi-Factor Authentication, Authentications, Financial Market, Market Data, Financial Regulations, Regulatory Compliance
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Computer Networking, Network Protocols, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Encryption, OSI Models, Network Architecture, Computer Networking, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security, Software-Defined Networking
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Communication Systems
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks