Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Quantum Cryptography Course Catalog
University of Colorado Boulder
Skills you'll gain: Quantitative Research, Mechanics, Mathematical Software, Engineering Analysis, Numerical Analysis, Chemistry, Physics, Mathematical Modeling, Differential Equations
Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance
University of Colorado Boulder
Skills you'll gain: Linear Algebra, Physics, Mechanics, Probability, Advanced Mathematics, Mathematical Modeling, Mathematical Theory & Analysis, Engineering Analysis, Differential Equations, Physical Science
École Polytechnique
Skills you'll gain: Physics, Experimentation, Quantitative Research, Cryptography, Mathematical Modeling, Applied Mathematics, Engineering, Scientific, and Technical Instruments, Emerging Technologies
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Physics, Calculus, Mechanics, Physical Science, Advanced Mathematics, Energy and Utilities, Mathematical Modeling
Skills you'll gain: IBM Cloud, Cryptography, Algorithms, Python Programming, Linear Algebra, Programming Principles, Computer Science, Theoretical Computer Science, Emerging Technologies, Test Case, Jupyter, Physics, Simulations, Software Installation, Debugging, Development Environment
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Key Management, Computational Thinking, Encryption, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Python Programming, Data Structures, Cybersecurity, Arithmetic, Computer Programming, Mathematical Modeling
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Network Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Information Privacy, Multi-Factor Authentication, System Configuration
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Business Continuity Planning, Continuous Monitoring, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Incident Response, Application Security, Incident Management, Security Engineering, Data Security, Network Security, OSI Models, Data Loss Prevention
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Public Key Infrastructure, Continuous Monitoring, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Encryption, Cyber Attacks, Security Awareness, Data Security, Threat Modeling, Security Management, Security Strategy, Computer Security Awareness Training, Information Assurance, Wireless Networks, Firewall, Malware Protection, Authentications, Authorization (Computing), Technical Support
Quantum Cryptography learners also search
In summary, here are 10 of our most popular quantum cryptography courses
- Quantum Mechanics:Â University of Colorado Boulder
- IT Fundamentals for Cybersecurity:Â IBM
- Foundations of Quantum Mechanics:Â University of Colorado Boulder
- Quantum Optics 1 : Single Photons: École Polytechnique
- Understanding Modern Physics I: Relativity and Cosmology:Â The Hong Kong University of Science and Technology
- Practical Quantum Computing with IBM Qiskit for Beginners:Â Packt
- Assets, Threats, and Vulnerabilities:Â Google
- Introduction to Discrete Mathematics for Computer Science:Â University of California San Diego
- Introduction to Cybersecurity Essentials:Â IBM
- CISSP Certified Information Systems Security Professional:Â Packt