Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Skills you'll gain: Network Security, Remote Access Systems, Disaster Recovery, OSI Models, General Networking, Network Administration, Network Troubleshooting, Computer Networking, Network Architecture, Network Infrastructure, Networking Hardware, Network Monitoring, TCP/IP, Virtual Private Networks (VPN), Network Protocols, Cybersecurity, Computer Security, Data Centers, Virtualization, Authentications
Intermediate · Specialization · 1 - 3 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Modeling, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Data Security, Identity and Access Management, Infrastructure Security, Hardening
Intermediate · Course · 1 - 4 Weeks

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, FinTech, Payment Systems, Cryptography, Digital Assets, Emerging Technologies, Distributed Computing, Cryptographic Protocols, E-Commerce, Transaction Processing, Algorithms, Fundraising
Beginner · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Cloud Services, Identity and Access Management, Multi-Factor Authentication, Security Testing, Cryptography, Web Services, Server Side
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Endpoint Security, Network Security, Cyber Attacks, Encryption, Information Systems Security, Application Security, Cyber Security Policies, Penetration Testing, Data Security, Computer Security Awareness Training, Firewall, Cryptography, Security Controls, Threat Modeling, Intrusion Detection and Prevention, Security Awareness, Mobile Security, Malware Protection, Authentications
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: JUnit, File I/O, Unit Testing, Program Development, Debugging, Java, Maintainability, Software Development, Secure Coding, Software Testing, Test Case, Authentications, Application Security, Cryptography, Object Oriented Programming (OOP), Eclipse (Software), Integrated Development Environments, Encryption, Data Structures
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Cloud Platform, Authentications, Cloud Security, Key Management, Application Deployment, Encryption, Cryptography, User Accounts
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Threat Modeling, Encryption, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Secure Coding, File Management, Cryptography, Python Programming, Programming Principles, Debugging, Scripting, Software Testing, Data Structures
Mixed · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Payment Systems, Distributed Computing, Network Model, Transaction Processing, Emerging Technologies, Virtual Machines, Verification And Validation
Beginner · Course · 1 - 4 Weeks
INSEAD
Skills you'll gain: Blockchain, Digital Assets, FinTech, Financial Systems, Emerging Technologies, Transaction Processing, Empowerment, Financial Services, Cryptography, Distributed Computing, Identity and Access Management, Contract Management
Intermediate · Course · 1 - 4 Weeks

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Programming Principles, Encryption, Data Structures, Virtualization and Virtual Machines, Network Protocols, Distributed Computing, Network Architecture, Algorithms
Intermediate · Course · 1 - 3 Months