The rapid development of quantum computers threatens many of today's established IT security procedures. In the near future, these powerful computers could be capable of breaking through common encryption methods, which would pose a massive threat to the confidentiality and integrity of digital information. In particular, attackers could gain virtually unrestricted access to networked systems and manipulate data at will.
To proactively address these potential threats, attend the “Post-Quantum Security” course. This training will give you an in-depth understanding of how quantum computers work and their impact on IT security. A central component of the training is an introduction to post-quantum cryptography. These new cryptographic methods are designed to withstand attacks by quantum computers. Participants will learn how to implement these methods to future-proof their IT infrastructures. This is particularly relevant for areas with long deployment cycles, such as critical infrastructures or government systems, where early protection against future threats is essential.
The training places great emphasis on practical relevance. In addition to teaching theoretical basics, practical exercises are carried out that enable participants to directly apply the knowledge they have acquired.
In addition, you will benefit from exchanges with subject matter experts and gain insights into current research topics in the field of post-quantum security. This specialized knowledge is currently only available to a small circle of experts and thus offers a valuable advantage for anyone who wants to prepare early for the coming changes in IT security.
Overall, the training offers a unique opportunity to take an in-depth look at the challenges and solutions in the context of the quantum computer era and to equip your own organization accordingly.
After the training, you will be able to:
- understand how quantum computers work and how they differ from classical computers.
- program quantum gates and gain initial experience with simple quantum algorithms.
- assess the impact of Shor's and Grover's algorithms on modern cryptography and apply post-quantum cryptography to secure IT systems against future threats.