
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, AI Security, Network Monitoring, Cyber Security Policies, Cloud Management
Advanced · Specialization · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of London
Skills you'll gain: Cryptography, Cryptographic Protocols, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Key Management, Infrastructure Security, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, Cryptography, Application Security, Security Testing, IT Security Architecture, Cyber Threat Intelligence, Cyber Risk, Encryption, Network Security, AI Integrations, DevOps, Cybersecurity, CI/CD, Security Awareness, Cloud Security, Software Development, Security Controls, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Model Evaluation, Exploratory Data Analysis, Event-Driven Programming, Encryption, Cryptographic Protocols, Server Side, Web Development, Regression Analysis, Apache, Model Training, Web Services, Machine Learning Algorithms, Classification Algorithms, Data Preprocessing, Secure Coding, Public Key Cryptography Standards (PKCS), Web Scraping, Natural Language Processing, Python Programming
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Data Integrity
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Data Security, Security Testing, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Cyber Risk, Cyber Security Strategy, AI Integrations, Intrusion Detection and Prevention, Cyber Threat Hunting, Data Management, Cybersecurity, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Awareness, Security Strategy, AI Product Strategy, Security Software, Generative AI
Beginner · Specialization · 3 - 6 Months