Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Skills you'll gain: Encryption, Secure Coding, File Management, Cryptography, Python Programming, Programming Principles, Debugging, Scripting, Software Testing, Data Structures
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Remote Access Systems, Disaster Recovery, OSI Models, General Networking, Network Administration, Network Troubleshooting, Computer Networking, Network Architecture, Network Infrastructure, Networking Hardware, Network Monitoring, TCP/IP, Virtual Private Networks (VPN), Network Protocols, Cybersecurity, Computer Security, Data Centers, Virtualization, Authentications
Intermediate · Specialization · 1 - 3 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Application Development, Cloud Applications, Payment Systems, Investment Banking, Cryptography, Investments, FinTech, Digital Assets, Open Source Technology, Distributed Computing, Microservices, Transaction Processing, Algorithms, Governance
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Structures, Blockchain, Programming Principles, Data Management, Secure Coding, Object Oriented Programming (OOP), Cryptography, Debugging
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Web Applications, Computational Logic, Software Development Tools, Business Logic, Other Programming Languages, Program Development, Scalability
Intermediate · Specialization · 1 - 3 Months

University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Payment Systems, Distributed Computing, Network Model, Transaction Processing, Data Integrity, Emerging Technologies, Virtual Machines, Verification And Validation
Beginner · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Blockchain, User Interface and User Experience (UI/UX) Design, Cryptography, Secure Coding, Application Security, Web Development Tools, React Redux, Encryption, User Experience Design, Key Management, Application Design, Cryptographic Protocols, Application Development, Web Applications, Software Development Tools, Legal Technology, Vulnerability Assessments, Frontend Integration, Data Security, Program Development
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Brute-force attacks, Cybersecurity, Vulnerability Assessments, Linux, Command-Line Interface, Cryptography, File Management, Microsoft Windows, Scripting, Virtual Machines
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Wireless Networks, Authentications, Identity and Access Management, Encryption, Internet Of Things
Beginner · Course · 1 - 3 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Programming Principles, Encryption, Data Structures, Virtualization and Virtual Machines, Network Protocols, Distributed Computing, Network Architecture, Algorithms
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Java Programming, Development Environment, Java, Integrated Development Environments, Encryption, Cryptography, Virtualization and Virtual Machines, Performance Tuning, Application Programming Interface (API), Object Oriented Programming (OOP), Scalability
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Encryption, Data Access, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Role-Based Access Control (RBAC), System Monitoring, Virtual Machines, Cryptography, Key Management, Authentications, Cloud Applications, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months