
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Email Security, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Network Security, Cybersecurity, Data Security, Cryptographic Protocols, Cyber Attacks, Advanced Encryption Standard (AES), Application Security, Information Technology, Computer Security Awareness Training, Cyber Security Strategy, Authentications, Authorization (Computing), Security Controls, Personally Identifiable Information, Security Awareness, Cyber Security Policies, Computer Security Incident Management
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

Coursera
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Python Programming, Data Security
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Apple iOS, iOS Development, Secure Coding, Encryption, Network Security, Application Programming Interface (API), Swift Programming, Mobile Security, Application Security, Data Persistence, Key Management, Data Security, Data Storage
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Authentications, Application Security, Network Security, Exploitation techniques, File Systems
Mixed · Course · 1 - 4 Weeks