SC700: Cryptography 101 incl. Quantum Resilience

Training: Security - Industry 4.0

IT professionals receive a hands-on introduction to fundamentals and application of cryptographic methods. Symmetric and asymmetric algorithms, hash and signature procedures as well as protocols for secure communication are taught. Implementation aspects with crypto libraries, risks from software vulnerabilities as well as current challenges through necessary migrations to post-quantum resilience are covered.

Hybrid event Hybrid event

Start: 2026-06-29 | 10:00 am

End: 2026-06-30 | 05:00 pm

Location: Nürnberg

Price: 1.490,00 € plus VAT.

Hybrid event Hybrid event

Start: 2026-10-12 | 10:00 am

End: 2026-10-13 | 05:00 pm

Location: Nürnberg

Price: 1.490,00 € plus VAT.

Request prefered appointment period:

* All fields marked with an asterisk are mandatory fields.

Agenda:

  • Introduction to Cryptography
    • Why Cryptography?
    • Definition and Significance of Cryptography
    • Use Cases in Daily Operations

 

  • Cryptography Fundamentals
    • Confidentiality, Integrity, Authenticity
    • Non-repudiation
    • Keys
    • Key Exchange
    • Signatures
    • Hash Functions
    • Random Numbers
    • Zero-Knowledge

 

  • Symmetric Encryption
    • Functionality of Symmetric Encryption Algorithms
    • Current Algorithms
      • DES
      • AES
      • BlowFish
    • Modes of Various Methods
      • CTR
      • CBC
    • Strengths and Weaknesses of Various Algorithms
    • Use Cases and Examples
      • Key Lengths and Recommended Modes
      • Implementation and Configuration
      • Regulations and Compliance
    • Known Attacks on Symmetric Algorithms

 

  • Asymmetric Encryption
    • Functionality of Asymmetric Algorithms
    • Difference to Symmetric Encryption
    • Known Algorithms
      • RSA
      • Elliptic Curves
    • Use Cases and Examples
      • Key Lengths, Curves etc.
      • Implementation and Configuration
      • Regulations and Compliance
    • Known Attacks on Asymmetric Algorithms, Deprecated Versions

 

  • Key Exchange Methods
    • Functionality
    • Diffie-Hellman
    • Use Cases and Examples
      • Implementation and Configuration
      • Regulations and Compliance

 

  • Secure Signatures and Hashes
    • Functionality of Hash Function
    • Known Hash Functions
      • MDX Family
      • SHA Family
    • Message Authentication
      • CMAC
      • HMAC
    • Use Cases and Examples
      • Functionality of Digital Signature

 

  • Quantum Computing Fundamentals
    • Introduction to Quantum Bits (Qubits) and Quantum Gates
    • Quantum Algorithms and Their Impact on Cryptographic Methods
    • The Shor Algorithm
    • Current State of Quantum Computing
    • Outlook and Forecasts

 

  • Post-Quantum Cryptography
    • Fundamentals and Concepts
    • Categories of Post-Quantum Secure Algorithms
      • Lattice-based
      • Code-based
      • Multivariate Polynomials
    • Overview of Post-Quantum Algorithms
    • Current Implementation and Configuration
    • Standards and Norms
    • Migration of Current Methods

 

  • Summary, Outlook and Conclusion

 

 

Objectives:

The participants of the course SC700 Cryptography 101 incl. Quantum Resilience

  • learn current cryptographic methods and their secure implementation based on typical deployment scenarios;
  • can assess and evaluate current and potential future threats to existing algorithms;
  • receive an overview of quantum-resilient methods;
  • are enabled to develop a post-quantum strategy including concrete measures.

Target audience:

The training SC700 Cryptography 101 incl. Quantum Resilience is targeted at:

  • Software developers
  • Software architects
  • Administrators
  • Product managers

Prerequisites:

To be able to follow all learning content of the course SC700 Cryptography 101 incl. Quantum Resilience effectively, practical technical basic understanding is a prerequisite.

Description:

Cryptographic methods are an essential prerequisite for secure IT, whether on the internet, in the corporate data center, or privately at home. Ensuring data integrity, authenticity, and confidentiality is hardly possible without the deployment of cryptographic methods.

The workshop SC700 Cryptography 101 incl. Quantum Resilience provides a comprehensive overview of the theoretical foundations, practical use cases, and implementation paths of cryptographic measures and functions.

The course covers current algorithms for symmetric and asymmetric methods, hash and signature methods, as well as protocols built upon them for e.g. key exchange or secure communication.

Besides the algorithms, the topics of software implementation and the deployment of crypto libraries are addressed, as vulnerabilities exist in both of these layers that can make even secure algorithms attackable.

Current algorithms such as RSA (an asymmetric method) are considered potentially insecure due to progress in the quantum computing domain. Therefore, the threats posed by quantum computing are elaborated, the current threat potential is demonstrated, and preparation possibilities (crypto agility) are explored in depth, e.g. through introduction of so-called post-quantum cryptography.
Check Icon

Guaranteed implementation:

from 2 Attendees

Booking information:

Duration:

2 Days

Price:

1.490,00 € plus VAT.

(including lunch & drinks for in-person participation on-site)

Authorized training partner

NetApp Partner Authorized Learning
Commvault Training Partner
CQI | IRCA Approved Training Partner
Veeam Authorized Education Center
Acronis Authorized Training Center
AWS Partner Select Tier Training
ISACA Accredited Partner
iSAQB
CompTIA Authorized Partner
EC-Council Accredited Training Center

Memberships

Allianz für Cyber-Sicherheit
TeleTrust Pioneers in IT security
Bundesverband der IT-Sachverständigen und Gutachter e.V.
Bundesverband mittelständische Wirtschaft (BVMW)
Allianz für Sicherheit in der Wirtschaft
NIK - Netzwerk der Digitalwirtschaft
BVSW
Bayern Innovativ
KH-iT
CAST
IHK Nürnberg für Mittelfranken
eato e.V.
Sicherheitsnetzwerk München e.V.