Quantum cryptography courses can help you learn the principles of quantum mechanics, key cryptographic protocols, and secure communication techniques. You can build skills in implementing quantum key distribution, understanding entanglement, and analyzing security proofs. Many courses introduce tools like Qiskit for quantum programming and various simulation software that allow you to experiment with quantum algorithms and cryptographic systems.

University of Manchester
Skills you'll gain: Chemistry, Physical Science, Physics, Laboratory Experience, Experimentation, Mechanics, Applied Mathematics
★ 4.7 (755) · Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Semiconductors, Electrical Engineering, Materials science, Electrical and Computer Engineering, Physics, Electronics Engineering, Electronics
★ 4.4 (301) · Advanced · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Systems Thinking, Materials science, Quantum computing, Biology, Science and Research, Scientific Methods, Mathematical Modeling, Physics, Applied Mathematics, Neurology, Cell Biology
★ 4.4 (168) · Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Security Engineering, Information Systems Security, Wireless Networks, Infrastructure Security, General Networking, Network Security, Cybersecurity, Security Controls, IBM Cloud, Computing Platforms, Cloud Platforms, Cryptography, Advanced Encryption Standard (AES), Network Protocols, Market Opportunities, Automation, Emerging Technologies, Endpoint Security
★ 4.7 (626) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Object Oriented Design, Object Oriented Programming (OOP), File I/O, Encryption, Cryptographic Protocols, Data Structures, Program Development, Software Development, Model Evaluation, Automation, Model Training, Machine Learning Algorithms, Database Application, Plot (Graphics), Python Programming, Algorithms, Software Installation, Code Reusability, Functional Design
★ 4.7 (105) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Vulnerability Assessments, Application Security, Vulnerability Management, Security Controls, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design
★ 4.4 (75) · Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Cryptographic Protocols, Exploitation techniques, Security Testing, Encryption, Technical Writing, Test Tools, Human Factors (Security), Technical Communication
★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

Duke University
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Cryptography, Law, Regulation, and Compliance, Financial Regulations, Cryptographic Protocols, Financial Regulation, Regulatory Requirements, Regulatory Compliance, Encryption, Technology Strategies, Payment Systems, Data Integrity, Digital Assets, Financial Services, Feasibility Studies, Transaction Processing, Innovation, Distributed Computing
★ 4.7 (395) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration
★ 4.8 (92) · Beginner · Specialization · 3 - 6 Months
University of California, Irvine
Skills you'll gain: Blockchain, FinTech, Cryptography, Distributed Computing, Transaction Processing, Payment Systems, Cryptographic Protocols, Emerging Technologies, Digital Assets, Digital Transformation, Software Architecture, Data Integrity, Network Analysis
★ 4.2 (179) · Beginner · Course · 1 - 4 Weeks

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Continuous Monitoring, Computer Security, Cryptography
★ 4.3 (168) · Beginner · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Continuous Monitoring, Secure Coding, System Monitoring, Patch Management, Identity and Access Management, Multi-Factor Authentication, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Incident Response
★ 4.5 (125) · Intermediate · Specialization · 3 - 6 Months