Quantum Safe Crypto / English
computer Online: Online 25 feb. 2026Toon rooster event 25 februari 2026, 09:00-16:30, Online, Quantumveilige cryptografie Essentials |
You want to delve into quantum-safe cryptography, including Post Quantum Cryptography (PQC)
You want to learn what the effects of the quantum computer are on cryptography and in your situation, and how you can respond to them. You are responsible for making and keeping applications and systems in your organization quantum safe
Various parties worldwide are working on the development of quantum computers . These quantum computers work in a different way than regular computers and can therefore solve certain problems much more efficiently. Contemporary cryptography is resistant to ordinary computers, but can be cracked with a sufficiently strong quantum computer . To protect your applications …
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
You want to delve into quantum-safe cryptography, including Post Quantum Cryptography (PQC)
You want to learn what the effects of the quantum computer are on cryptography and in your situation, and how you can respond to them. You are responsible for making and keeping applications and systems in your organization quantum safe
Various parties worldwide are working on the development of
quantum computers . These quantum computers work in a different way
than regular computers and can therefore solve certain problems
much more efficiently. Contemporary cryptography is resistant to
ordinary computers, but can be cracked with a sufficiently strong
quantum computer . To protect your applications and systems against
this, you will have to migrate to quantum-safe cryptography in a
timely manner.
In this course you will be introduced to the technical
cryptographic backgrounds in an accessible way to understand the
impact of the quantum computer on cryptography. You will be
informed about the latest developments and insights. After
following this course, you will know how to determine the impact in
your situation and what steps you need to take to be prepared for
the arrival of the quantum computer .
1 Course Day
Module 1 – Cryptography and the quantum computer
* The different types of cryptography and what you use them for
* The effect of the quantum computer on contemporary
cryptography
* Quantum-safe cryptography, including Post Quantum Cryptography
(PQC)
Module 2 – Migrating to quantum-safe cryptography
* Analyzing the current situation: cryptography use, dependencies
and threats
* Preparing and executing the migration to quantum-safe
cryptography
* Quantum-safe initiatives and resources
Module 3 – Quantum-safe cryptography in practice
* A brief exploration of the different cryptographic techniques
* Quantum-safe cryptographic standards : NIST SP 800-208 LMS + DSA/
Falcon
* Practical impact of the application of quantum-safe
cryptography
* Quantum-safe encryption in practice
* Quantum-safe digital signatures in practice
* Quantum-safe Public Key Infrastructure (PKI) and certificates
(X.509) in practice
* Quantum-safe Transport Layer Security (TLS) in practice
You will receive the course material via our portal at the start
of the course. The course material is in English and the language
of instruction during the course is English.
There is no exam in this course. After completing the course, you
will receive a certificate of participation from the Security
Academy.
During the course ‘Quantum-safe Cryptography’ the basics of quantum-safe cryptography and the impact of the quantum computer on cryptography are discussed. It is recommended that you are broadly familiar with a number of basic IT concepts, such as application, server or network. Furthermore, no prior knowledge is required to participate in this course at foundation level.
For follow-up steps, please visit our [website](https://www.securityacademyonline.com/).
This course is suitable for any professional who works with
information systems and is involved with cryptography. For
example:
* Functional and technical managers
* Information managers
* Information security officers
* Information security auditors
* Program, project and line managers
Praktisch toepasbare kennis, overgedragen door praktijkdocenten
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

