Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cryptography Course Catalog
University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Information Systems Security, Computer Security Awareness Training, Security Awareness, Vulnerability, Political Sciences, Policy Analysis, Public Policies, Public Safety and National Security, Safety and Security, Human Factors, Human Computer Interaction, Usability
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Risk, Encryption, Authorization (Computing), Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Security Awareness, Safety and Security, Identity and Access Management, Incident Management
University of Colorado Boulder
Skills you'll gain: Algorithms, Data Structures, Graph Theory, Operations Research, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Computational Thinking, Cryptography, Computer Science, Programming Principles, Pseudocode, Applied Mathematics, Encryption, Network Model, Linear Algebra, Combinatorics, Advanced Mathematics, Analysis, Mathematical Modeling, Tree Maps
- Status: New
Skills you'll gain: Penetration Testing, Incident Response, Network Security, Intrusion Detection and Prevention, Cybersecurity, Computer Security Incident Management, Application Security, Open Web Application Security Project (OWASP), Information Systems Security, Identity and Access Management, Vulnerability Assessments, Security Strategy, Cryptography, Security Testing, Secure Coding, Encryption, Risk Management Framework, Command-Line Interface, Virtual Private Networks (VPN), Threat Management
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Business Continuity Planning, Continuous Monitoring, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Incident Response, Application Security, Incident Management, Security Engineering, Data Security, Network Security, OSI Models, Data Loss Prevention
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Vulnerability Assessments, Encryption, Incident Management, Threat Management, Threat Detection
University of Pennsylvania
Skills you'll gain: FinTech, Portfolio Management, Consumer Lending, Return On Investment, Blockchain, Cryptography, Credit/Debit Card Processing, Digital Assets, Financial Services, Payment Processing, Investments, Lending and Underwriting, Investment Management, Technology Strategies, Emerging Technologies, Risk Analysis, Fundraising and Crowdsourcing, Financial Market, Market Analysis, Artificial Intelligence and Machine Learning (AI/ML)
INSEAD
Skills you'll gain: Blockchain, Digital Assets, Peer Review, FinTech, Intellectual Property, Business Transformation, Business Leadership, Governance, Market Opportunities, Business Planning, Technology Strategies, Corporate Sustainability, Business Analysis, Business, Competitive Analysis, Strategic Thinking, Business Modeling, Emerging Technologies, Cryptography, Identity and Access Management
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
In summary, here are 10 of our most popular cryptography courses
- Securing Digital Democracy: University of Michigan
- Cybersecurity and Its Ten Domains: Kennesaw State University
- Foundations of Data Structures and Algorithms: University of Colorado Boulder
- CompTIA Security+ Certification (SY0-701): The Total Course: Packt
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- CISSP Certified Information Systems Security Professional: Packt
- Cybersecurity Operations Fundamentals: Cisco Learning and Certifications
- Fintech: Foundations & Applications of Financial Technology: University of Pennsylvania
- Blockchain Revolution: INSEAD
- Security Analyst Fundamentals: IBM