Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cryptography Course Catalog
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Information Systems Security, Cybersecurity, Computer Security, Theoretical Computer Science
University of Colorado Boulder
Skills you'll gain: Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Computational Thinking, Computer Programming, Linear Algebra, Emerging Technologies, Python Programming
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Computer Security, Infrastructure Security, Information Systems Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Other Programming Languages, Algorithms
Skills you'll gain: Network Security, Cybersecurity, Encryption, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Computer Security Awareness Training, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications, Identity and Access Management, Authorization (Computing), Technical Support, Generative AI
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Security Testing, Software Design, Vulnerability Management, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Security Awareness, Cloud Platforms, Network Protocols
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Algorithms
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Network Security, Malware Protection, Cybersecurity, Cloud Computing, Mobile Security, Application Security, Cyber Attacks, Cyber Security Assessment, Security Testing, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Virtualization, Firewall, Vulnerability Assessments, Threat Modeling
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Duke University
Skills you'll gain: Object Oriented Programming (OOP), Java, Hypertext Markup Language (HTML), Software Design, Data Structures, Debugging, Software Engineering, Cryptography, Cascading Style Sheets (CSS), Web Development, Programming Principles, Javascript, Encryption, Algorithms, Program Development, Web Design, Front-End Web Development, Statistical Analysis, Data Import/Export, Computer Programming
In summary, here are 10 of our most popular cryptography courses
- Cryptography and Information Theory:Â University of Colorado System
- Advanced Data Structures, RSA and Quantum Algorithms:Â University of Colorado Boulder
- Blockchain Security:Â Infosec
- IT Security: Defense against the digital dark arts :Â Google
- Secure Coding Practices:Â University of California, Davis
- IT Fundamentals for Cybersecurity:Â IBM
- IBM and ISC2 Cybersecurity Specialist:Â ISC2
- Advanced System Security Design:Â University of Colorado System
- Symmetric Cryptography:Â University of Colorado System
- Certified Ethical Hacking (v12):Â LearnKartS