
University of Michigan
Skills you'll gain: Blockchain, Emerging Technologies, FinTech, Market Dynamics, Digital Assets, Cryptography, Technical Analysis, Business Solutions, Business Analysis, Payment Systems, Algorithms, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Blockchain, Loans, Lending and Underwriting, FinTech, Cyber Risk, Operational Risk, Scalability, Regulatory Compliance, Interoperability, Commercial Lending, Payment Systems, Risk Management, Financial Inclusion, Exploit development, Derivatives, Key Management, Cryptography, Finance, Entrepreneurial Finance, Entrepreneurship
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Authentications, Application Security, Network Security, Exploitation techniques, File Systems
Mixed · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Financial Modeling, Blockchain, FinTech, Portfolio Risk, Entrepreneurial Finance, Financial Market, Business Valuation, Risk Management, Excel Formulas, Emerging Technologies, Cryptography, Risk Analysis, Fundraising and Crowdsourcing, Financial Trading, Probability Distribution, R (Software), Financial Analysis, Entrepreneurship, Finance, Microsoft Excel
Intermediate · Specialization · 3 - 6 Months
Multiple educators
Skills you'll gain: Unit Testing, Data Structures, Event-Driven Programming, File I/O, Interactive Data Visualization, Java, Java Programming, User Interface (UI), Object Oriented Programming (OOP), JUnit, Debugging, Object Oriented Design, Computer Programming, Cryptography, Software Engineering, Performance Tuning, Algorithms, Data Analysis, Software Design, Problem Solving
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: Cryptography, Algorithms, Theoretical Computer Science, Mathematical Theory & Analysis, Arithmetic, Computational Thinking, Public Key Cryptography Standards (PKCS), Data Structures, Applied Mathematics, Logical Reasoning, Deductive Reasoning
Beginner · Course · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Security Engineering, Threat Modeling, Threat Management, Data Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Strategy, Threat Detection, Information Systems Security, Application Security, Security Testing, Key Management, Encryption, Regulatory Compliance, Network Protocols, Financial Regulation, Scalability, Scripting
Intermediate · Specialization · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Security Management, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, AI Security
Beginner · Specialization · 3 - 6 Months

New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Application Security, Threat Detection, Cyber Security Policies
Beginner · Specialization · 3 - 6 Months