
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Blockchain, Financial Inclusion, FinTech, Emerging Technologies, Cryptography, Payment Systems, Digital Assets, Stakeholder Analysis, Cryptographic Protocols, Distributed Computing, Public Key Cryptography Standards (PKCS), Information Privacy, Governance, Network Security, Data Integrity, Financial Services, Innovation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Secure Coding, Application Security, Threat Modeling, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Python Programming, Data Security
Intermediate · Guided Project · Less Than 2 Hours

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
Intermediate · Course · 1 - 4 Weeks

Institut Mines-Télécom
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, FinTech, Distributed Computing, Transaction Processing, Emerging Technologies, Data Structures, Data Integrity, Algorithms, Verification And Validation
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

Simplilearn
Skills you'll gain: Cybersecurity, Application Security, Data Security, Cryptography, Authentications, Data Structures, Data Integrity, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Detection, Cryptography, Data Security, Continuous Monitoring, Security Management, Compliance Management, Zero Trust Network Access, Information Assurance, Vulnerability Management, Governance Risk Management and Compliance, Data Encryption Standard, Blockchain, Data Integrity
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Cybersecurity, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Distributed Computing
Intermediate · Course · 1 - 3 Months

Duke University
Skills you'll gain: Rust (Programming Language), Command-Line Interface, Encryption, Package and Software Management, Application Development, Cryptography, Software Engineering
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Information Privacy
Beginner · Course · 1 - 4 Weeks