Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Hardening, Security Controls, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: OSI Models, Network Security, TCP/IP, Network Architecture, Network Protocols, General Networking, Network Routing, Network Routers, Computer Networking, Network Infrastructure, Routing Protocols, Network Model, Cryptography, Web Applications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration
Intermediate · Specialization · 3 - 6 Months

University of Leeds
Skills you'll gain: Logical Reasoning, Computational Logic, Computational Thinking, Algorithms, Theoretical Computer Science, Artificial Intelligence, Cryptography, Graph Theory
Beginner · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

University of Cape Town
Skills you'll gain: Design Thinking, Entrepreneurship, Business Modeling, Blockchain, Solution Design, Cryptography, Financial Regulations, FinTech, Financial Regulation, Business Planning, Emerging Technologies, Financial Systems, Video Production, Business Strategies, Market Opportunities, Business Strategy, Mobile Banking, Banking, Machine Learning, New Business Development
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Audit Planning, Service Level Agreement, Data Governance, Systems Development Life Cycle, Data Loss Prevention, Security Testing, Network Security, Software Development Life Cycle, IT Management, Systems Development, Incident Management, Problem Management, Control Objectives for Information and Related Technology (COBIT), Cryptography, Cloud Management, Software Development Methodologies, Auditing, Quality Assurance, Internal Controls, Risk Management Framework
Intermediate · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
Beginner · Course · 1 - 3 Months

Fractal Analytics
Skills you'll gain: Cloud Computing, Information Technology, Cybersecurity, Linear Algebra, Critical Thinking, Simulations
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection, Cryptography, Encryption
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Software Design Patterns, Software Architecture, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
Beginner · Course · 1 - 4 Weeks