Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Security Testing, Threat Modeling, Security Controls, Vulnerability Assessments, Authorization (Computing), Cryptography, Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Threat Modeling, Encryption, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Payment Systems, Distributed Computing, Network Model, Transaction Processing, Emerging Technologies, Virtual Machines, Verification And Validation
Beginner · Course · 1 - 4 Weeks

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Programming Principles, Encryption, Data Structures, Virtualization and Virtual Machines, Network Protocols, Distributed Computing, Network Architecture, Algorithms
Intermediate · Course · 1 - 3 Months

Northeastern University
Skills you'll gain: Cybersecurity, Cyber Attacks, Cryptography, Information Systems Security, Cyber Security Policies, Encryption, Data Security, Network Security, Security Controls, Network Protocols, Threat Modeling, Security Strategy, Personally Identifiable Information, Data Storage, Zero Trust Network Access, Governance Risk Management and Compliance
Mixed · Course · 1 - 3 Months

University of Leeds
Skills you'll gain: Blockchain, Emerging Technologies, FinTech, Banking, Digital Assets, Data Ethics, Payment Systems, Cryptography, Business Ethics, Law, Regulation, and Compliance, Transaction Processing, Complex Problem Solving
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Blockchain, Web Development Tools, Software Development Tools, Application Development, Go (Programming Language), Development Environment, Computer Programming Tools, Business Logic, Software Development, Program Development, Digital Assets, FinTech, Virtual Machines, Transaction Processing, Distributed Computing, Cryptography, Emerging Technologies, Encryption, Business Analysis, Market Dynamics
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Classification Algorithms, Probability Distribution, Machine Learning Algorithms, Data Processing, Algorithms
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Encryption, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), System Monitoring, Virtual Machines, Cryptography, Key Management, Authentications, Cloud Applications, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months
