
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Data Security, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, File Management, Python Programming, Programming Principles, Computational Logic, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Engineering Calculations, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Calculus, Differential Equations, Physical Science
Build toward a degree
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science
Beginner · Course · 1 - 4 Weeks
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks