Illinois Tech
Skills you'll gain: Operating System Administration, Linux Administration, Microsoft Windows, Command-Line Interface, Operating Systems, System Configuration, Event Monitoring, Authorization (Computing), Desktop Support, OS Process Management, Network Security, Package and Software Management, Information Technology, IT Automation, Network Administration, General Networking, Software Installation
★ 4.6 (166) · Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
★ 4.6 (1K) · Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
★ 4.6 (918) · Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
★ 4 (600) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development
★ 4.9 (14) · Beginner · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Field-Programmable Gate Array (FPGA), Hardware Design, Laboratory Experience, Laboratory Reports, Application Specific Integrated Circuits, System Design and Implementation, Embedded Software, Embedded Systems, Electronic Hardware, Electronic Systems, Electrical and Computer Engineering, Eclipse (Software), Electronics Engineering, Test Case, Laboratory Testing, Test Script Development, Verification And Validation, Microarchitecture, Computer Architecture, Software Development
★ 4.5 (1.7K) · Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, Cryptography, Application Security, Security Testing, IT Security Architecture, Cyber Threat Intelligence, Cyber Risk, Encryption, Network Security, AI Integrations, DevOps, Cybersecurity, CI/CD, Security Awareness, Cloud Security, Software Development, Security Controls, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture
★ 4.7 (27) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity
★ 5 (46) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Security Engineering, Threat Modeling, Threat Management, Cyber Security Assessment, Security Controls, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Regulatory Compliance, Network Protocols, Financial Regulation, Scalability, Scripting
Intermediate · Specialization · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability
★ 4.8 (4.5K) · Mixed · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Cybersecurity, Key Management, Security Engineering, Network Protocols, Federated Learning, Data Integrity, Security Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning
★ 4.6 (2.5K) · Intermediate · Course · 1 - 3 Months