You are leaving our Website
Using an external Link:
You are now leaving our website. The following page is operated by a third party. We accept no responsibility for the content, data protection, or security of the linked page..
URL:
SC700: Cryptography 101 incl. Quantum Resilience
Training: Security - Industry 4.0
IT professionals receive a hands-on introduction to fundamentals and application of cryptographic methods. Symmetric and asymmetric algorithms, hash and signature procedures as well as protocols for secure communication are taught. Implementation aspects with crypto libraries, risks from software vulnerabilities as well as current challenges through necessary migrations to post-quantum resilience are covered.
Start: 2026-06-29 | 10:00 am
End: 2026-06-30 | 05:00 pm
Location: Nürnberg
Price: 1.490,00 € plus VAT.
Start: 2026-10-12 | 10:00 am
End: 2026-10-13 | 05:00 pm
Location: Nürnberg
Price: 1.490,00 € plus VAT.
Agenda:
- Introduction to Cryptography
- Why Cryptography?
- Definition and Significance of Cryptography
- Use Cases in Daily Operations
- Cryptography Fundamentals
- Confidentiality, Integrity, Authenticity
- Non-repudiation
- Keys
- Key Exchange
- Signatures
- Hash Functions
- Random Numbers
- Zero-Knowledge
- Symmetric Encryption
- Functionality of Symmetric Encryption Algorithms
- Current Algorithms
- DES
- AES
- BlowFish
- Modes of Various Methods
- CTR
- CBC
- Strengths and Weaknesses of Various Algorithms
- Use Cases and Examples
- Key Lengths and Recommended Modes
- Implementation and Configuration
- Regulations and Compliance
- Known Attacks on Symmetric Algorithms
- Asymmetric Encryption
- Functionality of Asymmetric Algorithms
- Difference to Symmetric Encryption
- Known Algorithms
- RSA
- Elliptic Curves
- Use Cases and Examples
- Key Lengths, Curves etc.
- Implementation and Configuration
- Regulations and Compliance
- Known Attacks on Asymmetric Algorithms, Deprecated Versions
- Key Exchange Methods
- Functionality
- Diffie-Hellman
- Use Cases and Examples
- Implementation and Configuration
- Regulations and Compliance
- Secure Signatures and Hashes
- Functionality of Hash Function
- Known Hash Functions
- MDX Family
- SHA Family
- Message Authentication
- CMAC
- HMAC
- Use Cases and Examples
- Functionality of Digital Signature
- Quantum Computing Fundamentals
- Introduction to Quantum Bits (Qubits) and Quantum Gates
- Quantum Algorithms and Their Impact on Cryptographic Methods
- The Shor Algorithm
- Current State of Quantum Computing
- Outlook and Forecasts
- Post-Quantum Cryptography
- Fundamentals and Concepts
- Categories of Post-Quantum Secure Algorithms
- Lattice-based
- Code-based
- Multivariate Polynomials
- Overview of Post-Quantum Algorithms
- Current Implementation and Configuration
- Standards and Norms
- Migration of Current Methods
- Summary, Outlook and Conclusion
Objectives:
The participants of the course SC700 Cryptography 101 incl. Quantum Resilience
- learn current cryptographic methods and their secure implementation based on typical deployment scenarios;
- can assess and evaluate current and potential future threats to existing algorithms;
- receive an overview of quantum-resilient methods;
- are enabled to develop a post-quantum strategy including concrete measures.
Target audience:
The training SC700 Cryptography 101 incl. Quantum Resilience is targeted at:
- Software developers
- Software architects
- Administrators
- Product managers
Prerequisites:
To be able to follow all learning content of the course SC700 Cryptography 101 incl. Quantum Resilience effectively, practical technical basic understanding is a prerequisite.Description:
Cryptographic methods are an essential prerequisite for secure IT, whether on the internet, in the corporate data center, or privately at home. Ensuring data integrity, authenticity, and confidentiality is hardly possible without the deployment of cryptographic methods.The workshop SC700 Cryptography 101 incl. Quantum Resilience provides a comprehensive overview of the theoretical foundations, practical use cases, and implementation paths of cryptographic measures and functions.
The course covers current algorithms for symmetric and asymmetric methods, hash and signature methods, as well as protocols built upon them for e.g. key exchange or secure communication.
Besides the algorithms, the topics of software implementation and the deployment of crypto libraries are addressed, as vulnerabilities exist in both of these layers that can make even secure algorithms attackable.
Current algorithms such as RSA (an asymmetric method) are considered potentially insecure due to progress in the quantum computing domain. Therefore, the threats posed by quantum computing are elaborated, the current threat potential is demonstrated, and preparation possibilities (crypto agility) are explored in depth, e.g. through introduction of so-called post-quantum cryptography.
Guaranteed implementation:
from 2 Attendees
Booking information:
Duration:
2 Days
Price:
1.490,00 € plus VAT.
(including lunch & drinks for in-person participation on-site)
Appointment selection:
Testimonials:
Authorized training partner
Memberships
Shopping cart
SC700: Cryptography 101 incl. Quantum Resilience
was added to the shopping cart.