
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity
Intermediate · Course · 1 - 4 Weeks
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Cryptography, Cryptographic Protocols, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Key Management, Infrastructure Security, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems
Intermediate · Course · 1 - 4 Weeks