Post-Quantum Cryptography (PQC)
This course covers the essentials of Quantum Computing and Post-Quantum Cryptography (PQC). The course enables organizational leaders, security officers, and IT professionals to plan for the fast approaching quantum computing reality. At present, adversaries of organizations and nation states are harvesting data at rest and in transit that may be secure by present cryptography standards but will be decrypted when quantum computing is available at scale. These adversaries and nation states are investing significant money and resources in developing quantum computing and artificial intelligence capabilities specifically for this purpose. To mitigate this threat, organizations must plan and act now to secure their information assets and communications.
From the NIST Computer Security Resource Center (CSRC):
“In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. Large-scale quantum computers will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks.”
Audience
Organizational Leaders, Security Officers, and IT Professionals.
Prerequisites
One year or more of enterprise IT experience with software and systems. Cybersecurity experience or certifications equivalent to CompTIA Security+ or ISC2 CISSP.
Lesson 1: Quantum Computing Background
- topic 1A: Brief History of Network Computing
- topic 1B: Early Cyber Security Solutions
- topic 1C: Brief Intro to Quantum Mechanics
- topic 1D: Counter-intuitive aspects of Quantum that led to Quantum Computing (superposition, entanglement, quantum states)
Lesson 2: Quantum Computing Fundamentals
- topic 2A: What is a Quantum Computer?
- topic 2B: Opportunities / Applications & Use Cases for Quantum Computing
- topic 2C: Current State, Limitations, Forecast
- topic 2D: Quantum in the Cloud
- topic 2E: AI and Quantum
- topic 2F: Limitations of Conventional Cybersecurity Technologies and Protocols
- topic 2G: Quantum Impact on Cybersecurity
- topic 2H: Current and Future Risks
Lesson 3: Quantum Cybersecurity:
- topic 3A: Harvest Attack Threat
- topic 3B: Information Theoretic Security Implementation Requirements
- topic 3C: Post-Quantum Cryptography (PQC) Systems
- topic 3D: Architecture of a PQC Implementation
- topic 3E: PQC Standardization (NIST, FIPS)
- topic 3F: Compliance: (NSA) Commercial National Security Algorithm Suite 2.0 (CNSA 2.0)
- topic 3G: State of Current Solutions & Products (Hype vs. Truth)
- Is there a discount available for current students?UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Asynchronous courses are excluded from this offer.
- What is the cancellation and refund policy?Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.
- What is Live Online training?Classes marked Live Online have the same content and expert instructors as our classroom training, but are delivered entirely online through our virtual classroom environment. Each class session is live, and led by an Instructor.