Quantum cryptography courses can help you learn the principles of quantum mechanics, key cryptographic protocols, and secure communication techniques. You can build skills in implementing quantum key distribution, understanding entanglement, and analyzing security proofs. Many courses introduce tools like Qiskit for quantum programming and various simulation software that allow you to experiment with quantum algorithms and cryptographic systems.

University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Intrusion Detection and Prevention, Data Integrity, Algorithms, User Provisioning, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks
University of Colorado Boulder
Skills you'll gain: Electrical Engineering, Linear Algebra, Physics, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Differential Equations, Physical Science
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Network Security, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cyber Risk, Data Integrity, Transaction Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Key Management, Network Security, Digital Communications
Beginner · Course · 1 - 4 Weeks

Simplilearn
Skills you'll gain: Cybersecurity, Data Security, Cryptography, AI Security, Data Storage, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Cryptography, Network Security, Secure Coding, Cryptographic Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Key Management, Vulnerability Assessments, Authorization (Computing), Code Review, Dependency Analysis
Advanced · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
Intermediate · Course · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: Quantum computing, Physics, Chemistry, Experimentation, Advanced Mathematics, Informatics, Mechanics, Linear Algebra, Physical Science, Theoretical Computer Science, Differential Equations, Mathematical Modeling
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Security Controls, Cybersecurity, Data Security, Network Security, Security Architecture Review, Cryptography, IT Security Architecture, Vulnerability Assessments, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Graph Theory, Data Structures, Operations Research, Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Computational Thinking, Design Strategies, Cryptographic Protocols, Tree Maps, Encryption, Network Model, Combinatorics, Data Science, Computer Science, Mathematical Modeling, Mathematical Software, Python Programming
Build toward a degree
Advanced · Specialization · 3 - 6 Months

Skills you'll gain: Public Key Infrastructure, Cryptography, Key Management, Encryption, Windows Servers, Cryptographic Protocols, Infrastructure Security, Web Servers, Active Directory, Digital Communications, Microsoft Servers, Network Infrastructure, Authentications, Server Administration, System Configuration, Data Integrity, Data Migration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
Beginner · Course · 1 - 3 Months