
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Theoretical Computer Science, Data Security, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
★ 4.6 (918) · Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
★ 4.6 (1K) · Beginner · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Operations, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Cryptographic Protocols, Threat Detection, Security Strategy, Network Model, Mobile Security, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning
★ 4.6 (49) · Beginner · Specialization · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms
★ 4.8 (95) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development
★ 4.9 (14) · Beginner · Specialization · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
★ 4.6 (1.3K) · Mixed · Course · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability
★ 4.8 (4.5K) · Mixed · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity
★ 5 (46) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Open Shortest Path First (OSPF), Network Routers, Communication Systems, Telecommunications, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Switches, General Networking, Network Performance Management, Computer Networking, Network Architecture, Network Infrastructure
★ 4.6 (3.4K) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
★ 4.7 (59) · Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Cryptography, Cryptographic Protocols, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Mobile Security, Data Integrity
★ 4.6 (76) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity Planning, Cryptography, Encryption, Business Continuity, Disaster Recovery, Data Management, Security Engineering, Digital Assets, Threat Modeling, Vulnerability Assessments, Security Architecture Review, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Asset Protection, Vulnerability Management, Data Security
★ 5 (10) · Beginner · Specialization · 1 - 3 Months