Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Quantum Cryptography Course Catalog
Duke University
Skills you'll gain: Financial Modeling, Blockchain, FinTech, Entrepreneurial Finance, Financial Market, Business Valuation, Risk Management, Excel Formulas, Market Data, Emerging Technologies, Cryptography, Risk Analysis, Fundraising and Crowdsourcing, Financial Analysis, Equities, Probability Distribution, Investments, Cryptographic Protocols, Private Equity, Financial Regulation
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Physics, Calculus, Mechanics, Physical Science, Advanced Mathematics, Energy and Utilities, Mathematical Modeling
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
Skills you'll gain: Cybersecurity, Cyber Attacks, Security Awareness, Hardening, Data Security, Computer Security Awareness Training, Network Security, Personally Identifiable Information, Information Systems Security, Security Controls, Threat Management, Malware Protection, Information Privacy, Encryption, Multi-Factor Authentication
Skills you'll gain: Mainframe Computing, z/OS, Virtualization, Virtualization and Virtual Machines, Operating Systems, IBM Cloud, Hardware Architecture, Infrastructure Architecture, Enterprise Security, Computer Security, Computer Systems, Computer Hardware, Cryptography, System Configuration
Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Cryptography, Digital Assets, Distributed Computing, Digital Transformation, Public Key Cryptography Standards (PKCS), Transaction Processing, Information Privacy, Governance, Network Security, Data Integrity, Financial Services
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
Infosec
Skills you'll gain: Authentications, Application Security, Serverless Computing, Secure Coding, Security Testing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Dependency Analysis
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems
Skills you'll gain: Identity and Access Management, IT Security Architecture, Authentications, Business Continuity Planning, Continuous Monitoring, Security Controls, Secure Coding, Security Testing, Cryptography, Disaster Recovery, Vulnerability Assessments, Cyber Security Assessment, Incident Response, Application Security, Incident Management, Security Engineering, Data Security, Network Security, OSI Models, Data Loss Prevention
Skills you'll gain: IBM Cloud, Cryptography, Algorithms, Python Programming, Linear Algebra, Programming Principles, Computer Science, Theoretical Computer Science, Emerging Technologies, Test Case, Jupyter, Physics, Simulations, Software Installation, Debugging, Development Environment
In summary, here are 10 of our most popular quantum cryptography courses
- Entrepreneurial Finance: Strategy and Innovation:Â Duke University
- Understanding Modern Physics I: Relativity and Cosmology:Â The Hong Kong University of Science and Technology
- Security Analyst Fundamentals:Â IBM
- Introduction to Cybersecurity Essentials:Â IBM
- Introduction to Enterprise Computing:Â IBM
- IT Fundamentals for Cybersecurity:Â IBM
- Introduction to Blockchain Technologies:Â INSEAD
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- JavaScript Security:Â Infosec
- Advanced System Security Design:Â University of Colorado System