
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Exploit development, Cryptography, Encryption, Exploitation techniques, Technical Design, Emerging Technologies, System Design and Implementation
Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Field-Programmable Gate Array (FPGA), Hardware Design, Verification And Validation, Electronic Systems, Embedded Systems, Electronics Engineering, Application Specific Integrated Circuits, Electronic Hardware, Electronics, Systems Design, Software Design, Program Development, Integrated Development Environments, System Design and Implementation, Computer Architecture, Eclipse (Software), Computational Logic, Hardware Architecture, Software Development, Computer Engineering
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Security Engineering, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months