Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management
Beginner · Course · 1 - 3 Months

Simplilearn
Skills you'll gain: Cybersecurity, Data Security, Cryptography, AI Security, Brute-force attacks, Authentications, Data Integrity
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Blockchain, Network Security, Security Engineering, Computer Security, Infrastructure Security, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Key Management, Scalability, Distributed Computing, Data Integrity, Exploitation techniques, Algorithms
Beginner · Course · 1 - 3 Months
Skills you'll gain: Blockchain, Ledgers (Accounting), Financial Inclusion, FinTech, Emerging Technologies, Cryptography, Payment Systems, Digital Assets, Stakeholder Analysis, Distributed Computing, Program Implementation, Public Key Cryptography Standards (PKCS), Information Privacy, Governance, Network Security, Data Integrity, Financial Services
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Application Security, Security Testing, Network Security, Data Security, Cryptography, Transaction Processing, Malware Protection, Command-Line Interface, Encryption, Key Management, Scripting, Network Protocols
Intermediate · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Encryption, Network Security, Cybersecurity, Authentications, Public Key Cryptography Standards (PKCS), Vulnerability Assessments, Data Validation, Data Integrity, Transaction Processing, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Institut Mines-Télécom
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Public Key Cryptography Standards (PKCS), Authentications, FinTech, Data Security, Transaction Processing, Emerging Technologies, Data Integrity, Algorithms, Verification And Validation
Intermediate · Course · 1 - 3 Months
University of California, Irvine
Skills you'll gain: Blockchain, FinTech, Cryptography, Distributed Computing, Transaction Processing, Payment Systems, Emerging Technologies, Digital Assets, Software Systems, Computer Systems, Software Architecture, Data Integrity, Network Analysis, Peer Review
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Cryptography, Network Security, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Vulnerability Assessments, Transaction Processing
Advanced · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks