Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cryptography Course Catalog
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Encryption, Cyber Attacks, Security Awareness, Data Security, Threat Modeling, Security Management, Security Strategy, Computer Security Awareness Training, Information Assurance, Wireless Networks, Firewall, Malware Protection, Authentications, Authorization (Computing), Technical Support
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Theoretical Computer Science
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Business Continuity Planning, Continuous Monitoring, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Incident Response, Application Security, Incident Management, Security Engineering, Data Security, Network Security, OSI Models, Data Loss Prevention
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Security Controls, Vulnerability Assessments, Software Design, Vulnerability Management, C and C++, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Security Engineering
University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Network Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Information Privacy, Multi-Factor Authentication, System Configuration
University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Algorithms
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems
University of Colorado Boulder
Skills you'll gain: Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Computational Thinking, Linear Algebra, Emerging Technologies, Python Programming
University of California San Diego
Skills you'll gain: Cryptography, Key Management, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Arithmetic, Algorithms, Theoretical Computer Science, Computational Thinking, Algebra, Applied Mathematics, Python Programming
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Key Management, Computational Thinking, Encryption, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Python Programming, Data Structures, Cybersecurity, Arithmetic, Computer Programming, Mathematical Modeling
Skills you'll gain: Blockchain, FinTech, Cryptography, Design, Emerging Technologies, Stakeholder Management, Distributed Computing, Data Integrity, Financial Services, Public Key Cryptography Standards (PKCS), Innovation, Governance
In summary, here are 10 of our most popular cryptography courses
- IT Security: Defense against the digital dark arts :Â Google
- Cryptography and Information Theory:Â University of Colorado System
- CISSP Certified Information Systems Security Professional:Â Packt
- Secure Coding Practices:Â University of California, Davis
- An Introduction to Cryptography:Â University of Leeds
- Introduction to Cybersecurity Essentials:Â IBM
- Symmetric Cryptography:Â University of Colorado System
- Advanced System Security Design:Â University of Colorado System
- Advanced Data Structures, RSA and Quantum Algorithms:Â University of Colorado Boulder
- Number Theory and Cryptography:Â University of California San Diego