Quantum cryptography courses can help you learn the principles of quantum mechanics, key cryptographic protocols, and secure communication techniques. You can build skills in implementing quantum key distribution, understanding entanglement, and analyzing security proofs. Many courses introduce tools like Qiskit for quantum programming and various simulation software that allow you to experiment with quantum algorithms and cryptographic systems.

LearnQuest
Skills you'll gain: Blockchain, Cryptography, Data Storage, Data Storage Technologies, Network Architecture, FinTech, Information Technology Architecture, Distributed Computing, Security Controls, Other Programming Languages, Programming Principles, Emerging Technologies, Scalability, Data Integrity, Transaction Processing, Interoperability
Intermediate · Course · 1 - 3 Months
University of Illinois Urbana-Champaign
Skills you'll gain: Responsible AI, Automation, Artificial Intelligence, Cloud Infrastructure, Infrastructure As A Service (IaaS)
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

University of California San Diego
Skills you'll gain: Big Data, Cybersecurity, Pedagogy, Data Security, Cryptography, Information Privacy, Encryption, Responsible AI, AI Personalization, Computer Science, Information Technology, Web Applications, Web Servers, Machine Learning, Supervised Learning
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Authentications, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Security Controls
Intermediate · Specialization · 1 - 3 Months

LearnKartS
Skills you'll gain: Vulnerability Management, Cyber Threat Intelligence, Human Factors (Security)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Regulatory Compliance, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking
Beginner · Specialization · 1 - 4 Weeks
Dartmouth College
Skills you'll gain: Neurology, Creativity, Anatomy, Critical Thinking, Culture, Mindfulness, Liberal Arts, Physiology, Research, Psychology, Social Sciences, Ethical Standards And Conduct, Human Learning, Anthropology, Biology, Sociology, Systems Thinking, Experimentation, Governance, Science and Research
Beginner · Specialization · 1 - 3 Months

Infosec
Skills you'll gain: Authentications, Cryptography, Application Security, Web Applications, Javascript, Identity and Access Management, Node.JS, Browser Compatibility
Intermediate · Course · 1 - 4 Weeks

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, FinTech, Payment Systems, Cryptography, Digital Assets, Emerging Technologies, Distributed Computing, Cryptographic Protocols, E-Commerce, Transaction Processing, Algorithms, Fundraising
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration
Intermediate · Specialization · 3 - 6 Months