
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Data Integrity
★ 4.5 (428) · Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity
★ 4.5 (607) · Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science
★ 4.6 (334) · Beginner · Course · 1 - 4 Weeks

Princeton University
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Process Analysis, Distributed Computing, Emerging Technologies, Scripting, Application Specific Integrated Circuits, Financial Policy, Financial Regulation
★ 4.6 (3.1K) · Mixed · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms
★ 4.8 (95) · Beginner · Course · 1 - 4 Weeks
LearnQuest
Skills you'll gain: Blockchain, Key Management, Public Key Infrastructure, Security Controls, Cryptography, Cybersecurity, Data Security, Application Security, Network Security, Security Architecture Review, IT Security Architecture, Vulnerability Assessments, Encryption, Secure Coding, Cryptographic Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Solution Design
★ 4.6 (20) · Intermediate · Specialization · 3 - 6 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, Data Security, Cryptography, Security Controls, Cryptographic Protocols
★ 4.9 (46) · Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness
★ 4.4 (11) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning
★ 4.6 (2.5K) · Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems
★ 4.5 (550) · Intermediate · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Cryptographic Protocols, Cryptography, Key Management, Encryption, Cybersecurity, Arithmetic, Algorithms, Algebra, Python Programming
★ 4.5 (609) · Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
★ 4.5 (658) · Beginner · Specialization · 3 - 6 Months