Cryptography courses can help you learn encryption techniques, hashing algorithms, digital signatures, and secure communication protocols. You can build skills in threat modeling, cryptanalysis, and implementing security measures to protect sensitive data. Many courses introduce tools like OpenSSL, GnuPG, and various programming libraries that facilitate secure coding practices and help you apply cryptographic principles in real-world applications.

Coursera
Skills you'll gain: Cryptography, Encryption, Application Development, Security Engineering, Application Security, C++ (Programming Language)
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Security Controls, Cybersecurity, Security Engineering, Network Security, Cryptography, Vulnerability Assessments, Encryption, Transaction Processing, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Vulnerability Assessments, Enterprise Security, Regulation and Legal Compliance, Data Security, Application Frameworks, Cybersecurity, Emerging Technologies, Distributed Computing, Transaction Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Virtual Machines, Blockchain, Identity and Access Management, Transaction Processing, Google Cloud Platform, Cryptography, Cloud Security
Advanced · Project · Less Than 2 Hours

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, FinTech, Market Trend, Cryptography, Digital Assets, Payment Systems, Financial Market, Financial Systems, Financial Services, Investments, Market Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Network Security, Virtual Networking, Software-Defined Networking, Network Infrastructure, Network Architecture, Computer Networking, Virtualization, Program Development, Hardware Architecture, Open Source Technology, Performance Tuning, Unit Testing
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Authentications, Identity and Access Management, Web Development, Application Security, Web Applications, Multi-Factor Authentication, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Digital Assets, Financial Inclusion, FinTech, Emerging Technologies, E-Commerce, Cryptography, Distributed Computing, Payment Systems, Financial Services, Cryptographic Protocols, Network Security, Process Design, Data Integrity, Computer Security, Transaction Processing, Scalability, Contract Management, Governance
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months