Quantum cryptography courses can help you learn the principles of quantum mechanics, key cryptographic protocols, and secure communication techniques. You can build skills in implementing quantum key distribution, understanding entanglement, and analyzing security proofs. Many courses introduce tools like Qiskit for quantum programming and various simulation software that allow you to experiment with quantum algorithms and cryptographic systems.

LearnKartS
Skills you'll gain: Penetration Testing, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Threat Detection, Cyber Attacks, Cyber Security Strategy, Exploit development, Information Systems Security, Firewall, Malware Protection, Cyber Threat Intelligence, Cloud Computing, Cryptography, Cyber Threat Hunting, Security Controls, Security Awareness, Security Strategy, Cyber Risk
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months

University at Buffalo
Skills you'll gain: Blockchain, Emerging Technologies, Distributed Computing, Microsoft Azure, FinTech, Cloud Computing Architecture, Interoperability, Cryptography, Scalability, Data Storage, Information Privacy
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Infrastructure Security, Network Security, Vulnerability Assessments, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Security Controls, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Awareness, Cloud Computing Architecture, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Digital Assets, Blockchain, Emerging Technologies, Business Transformation, Digital Transformation, Interoperability, Distributed Computing, Cryptography, Scalability, Business Strategy, Governance
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Chemical Engineering, Quantitative Research, Chemistry, Thermal Management, Mechanical Engineering, Engineering Calculations, Process Engineering, Numerical Analysis, Engineering Analysis, Statistical Methods, Differential Equations, Physics, Engineering, Simulation and Simulation Software, Probability Distribution, Mathematical Modeling, Applied Mathematics, Materials science, Open Source Technology, Simulations
Advanced · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

28DIGITAL
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Internet Of Things, Security Requirements Analysis, Network Architecture, Network Security, Operating Systems, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), System Programming, Simple Object Access Protocol (SOAP), Application Development, System Requirements, C (Programming Language), System Design and Implementation, Software Development
Intermediate · Specialization · 3 - 6 Months