Quantum cryptography courses can help you learn the principles of quantum mechanics, key cryptographic protocols, and secure communication techniques. You can build skills in implementing quantum key distribution, understanding entanglement, and analyzing security proofs. Many courses introduce tools like Qiskit for quantum programming and various simulation software that allow you to experiment with quantum algorithms and cryptographic systems.

John Wiley & Sons
Skills you'll gain: Incident Response, IT Security Architecture, DevSecOps, Vulnerability Scanning, Vulnerability Assessments, Cloud Security, Threat Management, Security Management, Computer Security Incident Management, Endpoint Security, Mobile Security, Security Strategy, Cloud Computing Architecture, Cyber Threat Intelligence, Cryptographic Protocols, Cybersecurity, Cyber Security Policies, Cyber Security Strategy, Cryptography, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication
Beginner · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
Intermediate · Course · 1 - 4 Weeks
Duke University
Skills you'll gain: File I/O, UI Components, Java Programming, Object Oriented Design, Software Design, Debugging, Web Design and Development, Software Engineering, Code Reusability, Hypertext Markup Language (HTML), Computer Programming, Program Development, Event-Driven Programming, Bioinformatics, Encryption, Computer Programming Tools, Javascript, Algorithms, Data Analysis, Cascading Style Sheets (CSS)
Beginner · Specialization · 3 - 6 Months

John Wiley & Sons
Skills you'll gain: Incident Response, Security Management, Computer Security Incident Management, Security Strategy, Cloud Security, Cryptographic Protocols, Cybersecurity, Cyber Governance, Cryptography, Public Key Infrastructure, Network Security, Digital Forensics, Risk Management
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment
Beginner · Specialization · 3 - 6 Months
Skills you'll gain: Blockchain, Ledgers (Accounting), Financial Inclusion, FinTech, Emerging Technologies, General Ledger, Public Key Infrastructure, Cryptography, Payment Systems, Digital Assets, Stakeholder Analysis, Cryptographic Protocols, Distributed Computing, Stakeholder Engagement, Public Key Cryptography Standards (PKCS), Transaction Processing, Information Privacy, Governance, Network Security, Data Integrity
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Security Assessment, Information Systems Security, Cyber Risk, Encryption, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Security Management, Cyber Security Policies, Infrastructure Security, Security Awareness, Cryptographic Protocols
Beginner · Course · 1 - 3 Months

John Wiley & Sons
Skills you'll gain: IT Security Architecture, DevSecOps, Cloud Security, Mobile Security, Cloud Computing Architecture, Application Security, Network Security, Infrastructure Security, Cloud Computing, Security Controls, Cloud Infrastructure, Zero Trust Network Access, Firewall, Cloud Solutions, Endpoint Security, Load Balancing, Continuous Monitoring, System Monitoring, System Configuration, Cryptography
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness
Beginner · Specialization · 3 - 6 Months

University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Development Testing, Test Script Development, Application Development, Transaction Processing, Emerging Technologies, Application Design, Application Frameworks, Cryptographic Protocols, Web Development Tools, Network Protocols, Program Development, Distributed Computing, Cloud Platforms, Computing Platforms, Development Environment, Integrated Development Environments, Programming Principles
Intermediate · Specialization · 3 - 6 Months

John Wiley & Sons
Skills you'll gain: Vulnerability Scanning, Incident Response, Vulnerability Assessments, Cloud Security, Threat Management, Endpoint Security, Cyber Threat Intelligence, Risk Management, Risk Management Framework, Incident Management, Vulnerability Management, Security Management, Cyber Security Assessment, Intrusion Detection and Prevention, Threat Detection, Cloud Computing, Security Strategy, Cyber Security Strategy, Network Security, Cryptography
Intermediate · Course · 1 - 4 Weeks