Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cryptography Course Catalog
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Big Data, Authorization (Computing), Identity and Access Management
Infosec
Skills you'll gain: Authentications, Application Security, Serverless Computing, Secure Coding, Security Testing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Dependency Analysis
Duke University
Skills you'll gain: Blockchain, Loans, Lending and Underwriting, FinTech, Cyber Risk, Operational Risk, Scalability, Security Testing, Regulatory Compliance, Interoperability, Commercial Lending, Payment Systems, General Lending, Risk Management, Derivatives, Key Management, Cryptography, Emerging Technologies, Cryptographic Protocols, Financial Regulations
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Security Controls, Authentications, Vulnerability Management, Web Applications, Javascript
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, Network Performance Management, Computer Networking, Network Model, Network Infrastructure, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms, System Programming
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Mobile Security, Enterprise Security, Computer Security, Cyber Risk, Cyber Security Policies, Network Architecture, Security Controls
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Authentications, Security Strategy, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
University of Michigan
Skills you'll gain: Blockchain, Emerging Technologies, FinTech, Market Dynamics, Digital Assets, Cryptography, Technical Analysis, Business Solutions, Business Analysis, Payment Systems, Algorithms, Distributed Computing
University of California, Irvine
Skills you'll gain: Blockchain, FinTech, Cryptography, Distributed Computing, Transaction Processing, Payment Systems, Emerging Technologies, Digital Assets, Software Systems, Computer Systems, Software Architecture, Data Integrity, Network Analysis, Peer Review
- Status: New
Skills you'll gain: Hardening, Public Key Infrastructure, Security Engineering, Application Security, Information Systems Security, Infrastructure Security, Network Security, Cybersecurity, Cloud Security, System Configuration, Cryptography, Encryption, Key Management, Mobile Security, Authentications
In summary, here are 10 of our most popular cryptography courses
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- JavaScript Security:Â Infosec
- Decentralized Finance (DeFi): The Future of Finance:Â Duke University
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cyber Security – Technology and Governance: University of London
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Computer Communications:Â University of Colorado System
- Introduction to Cyber Security:Â New York University
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Blockchain and Cryptocurrency Explained:Â University of Michigan