Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

Coursera
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Python Programming, Data Security
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Enterprise Application Management, Cyber Attacks, Emerging Technologies, Financial Trading, Digital Assets, Cyber Security Assessment, FinTech, Payment Systems, Security Testing, Transaction Processing
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Cryptography, Application Security, Network Security, Data Security, Security Engineering, Secure Coding, Information Systems Security, Infrastructure Security, Encryption, Cybersecurity, Threat Modeling, Vulnerability Assessments
Advanced · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

École Polytechnique
Skills you'll gain: Emerging Technologies, Communication Systems, Telecommunications, Cryptography, Theoretical Computer Science, Simulation and Simulation Software, Physics, Computing Platforms, Algorithms, Mathematical Modeling
Mixed · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Python Programming, Mathematical Software, Programming Principles, Scripting, Algorithms, Debugging, Data Structures, File Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Object Oriented Programming (OOP), Encryption, Application Development, Data Structures, Software Development, Automation, Machine Learning Algorithms, Data Processing, Public Key Cryptography Standards (PKCS), Databases, Python Programming, Natural Language Processing, Algorithms, Key Management, SQL, Machine Learning Methods, Software Installation, Programming Principles, Data Validation
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months