400+ friendly #QSECDEF community members
400+ friendly #QSECDEF community members
Get Certified In Quantum Cyber Security (QCS)
Certificated Training Course & Lectures
Quantum Cyber Security Certificated Training Course
Quantum Cyber Security Certificated Training Course
Achieve Certified Quantum Cybersecurity Expertise Online.
Accessible Now with Community Membership..
No Prior Quantum Knowledge Needed.
Quality non AI In Person Lectures.
Active questions and comments.
100% Online Learning.
Certificated Quantum Cyber Security Training Available online now, includes community access. No prior knowledge of Quantum Technology Required.
Completion in 1 to 2 days Online
Certificated Quantum Cyber Security Training Available online now, includes community access. No prior knowledge of Quantum
Technology Required. 100% online.
Completion in 1 to 2 days Online
Our community platform is located on the domain https://www.qsecdef.com
Certificated Quantum Cyber Security Training Available online now, includes community access. No prior knowledge of Quantum Technology Required.
Completion in 1 to 2 days Online
Certificated Quantum Cyber Security Training Available online now, includes community access. No prior knowledge of Quantum
Technology Required. 100% online.
Completion in 1 to 2 days Online
Quantum Key Distribution Vulnerabilities
Potential weaknesses in quantum key distribution systems that could be exploited, leading to compromised communication channels.
Relatively Easy DoS Attack on QKD
The susceptibility of quantum key distribution systems to denial-of-service attacks, which can disrupt secure communications relatively easily.
Secure Implementation Issues
Ensuring the secure implementation of quantum communication systems within existing classical infrastructures.
Apply Quantum Hacking Mitigation
Developing robust strategies to mitigate all known and emerging quantum hacking methods.
Total Breaking of Asymmetric Encryption
Quantum computers pose a significant threat to asymmetric encryption methods like RSA and ECC, potentially rendering them completely insecure.
Breaking Symmetric Encryption
Quantum computers have the potential to break symmetric encryption methods like AES faster than classical computers, especially when a short key is used.
Quantum Sensing for Eavesdropping
The use of quantum sensing devices to eavesdrop on classical communication systems, intercepting sensitive data undetected.
New Quantum Algorithm Threats
The constant risk of new classical or quantum algorithms emerging that could compromise existing classical encryption and even post-quantum cryptography.
Post-Quantum Cryptography
Correctly implementing post-quantum cryptographic algorithms to safeguard against side-channel attacks.
Upgrading Encryption Standards:
Replacing all outdated and vulnerable encryption protocols with quantum-resistant alternatives to maintain security integrity.
Interoperability Challenges
Addressing the interoperability challenges between quantum and classical systems to ensure seamless integration and communication.
Cost and Resource Allocation
Managing the cost and resource allocation for upgrading systems to quantum-safe standards, which can be substantial.
Become A Community Member
Learn how to address all of these issues in a working group of professional peers in the Quantum Defence and Security Sector. Become a member.
What Will You Learn
What Will You Learn
As quantum computing approaches mainstream reality, traditional encryption methods may soon become obsolete, there are also new quantum technologies being deployed for secure communications that it is essential to understand as a cyber security expert.
Grasp the basics of quantum cryptography and quantum key distribution (QKD) and the Quantum technologies that are impacting Cyber Security.
Recognise the threats quantum computing poses to current encryption methods.
Learn about post-quantum cryptography (PQC), and its importance.
Understand the urgency of addressing quantum security threats today.
This is a certificated course with certificates issued by QSECDEF.
As quantum computing approaches mainstream reality, traditional encryption methods may soon become obsolete, there are also new quantum technologies being deployed for secure communications that it is essential to understand as a cyber security expert.
Grasp the basics of quantum cryptography and quantum key distribution (QKD) and the Quantum technologies that are impacting Cyber Security.
Recognise the threats quantum computing poses to current encryption methods.
Learn about post-quantum cryptography (PQC), and its importance.
Understand the urgency of addressing quantum security threats today.
This is a certificated course with certificates issued by QSECDEF.
Prepare for the Quantum Threats of Tomorrow
Quantum technologies have the potential to revolutionise industries—but with great power comes unprecedented risk. As quantum computers develop the ability to solve complex problems at unprecedented speeds, the very encryption techniques that safeguard today's data could be vulnerable tomorrow. The transition to a quantum-secure future isn’t a matter of "if" but "when." Equip yourself with the knowledge and skills to stay ahead of these challenges through our course.
Prepare for the Quantum Threats of Tomorrow
Quantum technologies have the potential to revolutionise industries—but with great power comes unprecedented risk. As quantum computers develop the ability to solve complex problems at unprecedented speeds, the very encryption techniques that safeguard today's data could be vulnerable tomorrow. The transition to a quantum-secure future isn’t a matter of "if" but "when." Equip yourself with the knowledge and skills to stay ahead of these challenges through our course.
Prepare for the Quantum Threats of Tomorrow
Quantum technologies have the potential to revolutionise industries—but with great power comes unprecedented risk. As quantum computers develop the ability to solve complex problems at unprecedented speeds, the very encryption techniques that safeguard today's data could be vulnerable tomorrow. The transition to a quantum-secure future isn’t a matter of "if" but "when." Equip yourself with the knowledge and skills to stay ahead of these challenges through our course.
Your Essential Training in Quantum Defence
Our course is meticulously designed for everyone—from tech enthusiasts eager to learn about the quantum future, to cybersecurity professionals tasked with defending against it. We believe that understanding quantum risks and knowing how to counter them is crucial for everyone involved in cybersecurity. With accessible certification and hands-on training, you’ll be prepared to identify, understand, and defend against the imminent quantum threats.
Your Essential Training in Quantum Defence
Our course is meticulously designed for everyone—from tech enthusiasts eager to learn about the quantum future, to cybersecurity professionals tasked with defending against it. We believe that understanding quantum risks and knowing how to counter them is crucial for everyone involved in cybersecurity. With accessible certification and hands-on training, you’ll be prepared to identify, understand, and defend against the imminent quantum threats.
Your Essential Training in Quantum Defence
Our course is meticulously designed for everyone—from tech enthusiasts eager to learn about the quantum future, to cybersecurity professionals tasked with defending against it. We believe that understanding quantum risks and knowing how to counter them is crucial for everyone involved in cybersecurity. With accessible certification and hands-on training, you’ll be prepared to identify, understand, and defend against the imminent quantum threats.
What You'll Gain from This Course
Foundational Knowledge: You’ll gain an understanding of quantum security and defence fundamentals and their potential impact on cybersecurity. We break down complex concepts into easy-to-digest modules, ensuring you grasp the core principles of quantum technology. Real-World Applications: Our course delves into how quantum technologies can be both a boon and a threat to data security. Learn to differentiate between the opportunities quantum computing offers and the risks it introduces. Hands-On Skills: We focus on practical skills that enable you to mitigate quantum risks. Through guided exercises and real-world scenarios, you’ll learn to apply quantum-resistant encryption techniques and other defensive strategies effectively and have the ability to engage with experts in this field. Certification: Upon completing the course, you’ll earn a certification that proves your readiness to tackle quantum cyber threats. This credential will not only bolster your resume but also position you as a forward-thinking cybersecurity professional in the eyes of employers and peers.
What You'll Gain from This Course
Foundational Knowledge: You’ll gain an understanding of quantum security and defence fundamentals and their potential impact on cybersecurity. We break down complex concepts into easy-to-digest modules, ensuring you grasp the core principles of quantum technology. Real-World Applications: Our course delves into how quantum technologies can be both a boon and a threat to data security. Learn to differentiate between the opportunities quantum computing offers and the risks it introduces. Hands-On Skills: We focus on practical skills that enable you to mitigate quantum risks. Through guided exercises and real-world scenarios, you’ll learn to apply quantum-resistant encryption techniques and other defensive strategies effectively and have the ability to engage with experts in this field. Certification: Upon completing the course, you’ll earn a certification that proves your readiness to tackle quantum cyber threats. This credential will not only bolster your resume but also position you as a forward-thinking cybersecurity professional in the eyes of employers and peers.
What You'll Gain from This Course
Foundational Knowledge: You’ll gain an understanding of quantum security and defence fundamentals and their potential impact on cybersecurity. We break down complex concepts into easy-to-digest modules, ensuring you grasp the core principles of quantum technology. Real-World Applications: Our course delves into how quantum technologies can be both a boon and a threat to data security. Learn to differentiate between the opportunities quantum computing offers and the risks it introduces. Hands-On Skills: We focus on practical skills that enable you to mitigate quantum risks. Through guided exercises and real-world scenarios, you’ll learn to apply quantum-resistant encryption techniques and other defensive strategies effectively and have the ability to engage with experts in this field. Certification: Upon completing the course, you’ll earn a certification that proves your readiness to tackle quantum cyber threats. This credential will not only bolster your resume but also position you as a forward-thinking cybersecurity professional in the eyes of employers and peers.
Joining QSECDEF Community
Join the QSECDEF Community Enrolling in our course means more than just learning—it’s about becoming part of a global community dedicated to quantum cybersecurity. With an "Essentials" membership at QSECDEF.com, you’ll gain ongoing access to a wealth of resources, expert insights, and continuous support. Our community is built to keep you at the forefront of cybersecurity, ensuring that you’re always prepared for the challenges of tomorrow.
Joining QSECDEF Community
Join the QSECDEF Community Enrolling in our course means more than just learning—it’s about becoming part of a global community dedicated to quantum cybersecurity. With an "Essentials" membership at QSECDEF.com, you’ll gain ongoing access to a wealth of resources, expert insights, and continuous support. Our community is built to keep you at the forefront of cybersecurity, ensuring that you’re always prepared for the challenges of tomorrow.
Joining QSECDEF Community
Join the QSECDEF Community Enrolling in our course means more than just learning—it’s about becoming part of a global community dedicated to quantum cybersecurity. With an "Essentials" membership at QSECDEF.com, you’ll gain ongoing access to a wealth of resources, expert insights, and continuous support. Our community is built to keep you at the forefront of cybersecurity, ensuring that you’re always prepared for the challenges of tomorrow.
The Quantum Era is Imminent
The quantum era is not some distant future—it's already on the horizon. To stay relevant and secure in this rapidly changing landscape, immediate action is required. Quantum advancements are progressing quickly, and being caught unprepared could leave your data and your organisation exposed. By enrolling in "Introduction to the Fundamentals of Quantum Cyber Security and Defence" today, you're not just securing your future; you're also gaining a strategic advantage in the evolving field of cybersecurity.
The Quantum Era is Imminent
The quantum era is not some distant future—it's already on the horizon. To stay relevant and secure in this rapidly changing landscape, immediate action is required. Quantum advancements are progressing quickly, and being caught unprepared could leave your data and your organisation exposed. By enrolling in "Introduction to the Fundamentals of Quantum Cyber Security and Defence" today, you're not just securing your future; you're also gaining a strategic advantage in the evolving field of cybersecurity.
The Quantum Era is Imminent
The quantum era is not some distant future—it's already on the horizon. To stay relevant and secure in this rapidly changing landscape, immediate action is required. Quantum advancements are progressing quickly, and being caught unprepared could leave your data and your organisation exposed. By enrolling in "Introduction to the Fundamentals of Quantum Cyber Security and Defence" today, you're not just securing your future; you're also gaining a strategic advantage in the evolving field of cybersecurity.
Course Materials Written
Prepared and Presented By
Course Materials Written
Prepared and Presented By
Dr. Michal Krelina is a specialist in quantum security, working as a consultant, analyst, and strategist with a focus on security and defence applications of quantum technology.
He is the Co-Founder and CTO of QuDef, a quantum security company, a key member of the Quantum Security and Defence Working Group, and he also conducts research at the Czech Technical University in Prague, exploring military applications of quantum technology and assessing risks and threats.
In addition, Michal has experience consulting for organizations like NATO, the European Union Agency Space Programme (EUSPA), and various defence, law enforcement and governmental organisations.
He holds a PhD in experimental nuclear physics and has postdoctoral experience from UTFSM in Chile and Heidelberg University in Germany.
His work is dedicated to understanding the impact of quantum technology on global security, making significant contributions to this rapidly evolving field.
Dr. Michal Krelina is a specialist in quantum security, working as a consultant, analyst, and strategist with a focus on security and defence applications of quantum technology.
He is the Co-Founder and CTO of QuDef, a quantum security company, a key member of the Quantum Security and Defence Working Group, and he also conducts research at the Czech Technical University in Prague, exploring military applications of quantum technology and assessing risks and threats.
In addition, Michal has experience consulting for organizations like NATO, the European Union Agency Space Programme (EUSPA), and various defence, law enforcement and governmental organisations.
He holds a PhD in experimental nuclear physics and has postdoctoral experience from UTFSM in Chile and Heidelberg University in Germany.
His work is dedicated to understanding the impact of quantum technology on global security, making significant contributions to this rapidly evolving field.
Anna Beata Kalisz Hedegaard is a physicist with two Master of Science degrees. At Wright State University, Ohio, she fell deeply into electronics and nanotechnology, and the University of Southern Denmark fortified her expertise in quantum mechanics, and particle physics.
Anna is the CEO Founder of Quantum Prime, a company working on quantum entanglement of secure satellite communications, a key member of the Quantum Security and Defence Working Group, and she also is heavily engaged in the German Quantum Start up eco-system.
Anna has global perspective from her extensive international experience (Poland, Denmark, the United States, Malaysia, the Netherlands, and Germany) and intellectual property experience from the European Patent Office and from working as a patent engineer.
Anna Beata Kalisz Hedegaard is a physicist with two Master of Science degrees. At Wright State University, Ohio, she fell deeply into electronics and nanotechnology, and the University of Southern Denmark fortified her expertise in quantum mechanics, and particle physics.
Anna is the CEO Founder of Quantum Prime, a company working on quantum entanglement of secure satellite communications, a key member of the Quantum Security and Defence Working Group, and she also is heavily engaged in the German Quantum Start up eco-system.
Anna has global perspective from her extensive international experience (Poland, Denmark, the United States, Malaysia, the Netherlands, and Germany) and intellectual property experience from the European Patent Office and from working as a patent engineer.
Includes Lectures On From The World Leading Experts In Quantum Cyber Security
Community Membership Includes Expert Lectures From The Worlds Leading Academic and Industry Authorities on Quantum Cyber Security - No AI Is Used
Scroll Right To See Course Modules
Understanding Quantum Cyber Security
Introduction to Quantum Cyber Security Training is available online now and includes community lectures access. 100% online. No prior knowledge of Quantum Technology Required.
Completion in 1 to 2 days of online studyCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesModule 1.1 Lecture
Asymmetric Encryption Methods
Available online now - Certificated by QSECDEF
Certificated on 80% pass mark | Certifying Body QSECDEF | 100% Online
Foundational Introduction No Prior Knowledge Of Quantum Technology RequiredCertificated on 80% pass mark
Mins 2.42Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesThreats to Asymmetric Encryption
Module 1.1 Lecture 2
Mins 5.04
Certificated by QSECDEFCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesRisks - When will Quantum be a threat?
Training Module 1.1 Lecture 3
Mins 5.35Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCase Studies for Quantum Cyber Security
Course Module 1.1 Lecture 4:
Certificated
Mins 2.42Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesSymmetric Encyrption Overview
Lesson Module 1.3 Lecture 1:
Certificated By QSECDEF
Mins 6.03Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesQuantum Threats To Cyber Security
Module 1.2 Lecture 3
Certificated by QSECDEF
Mins 6.59Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesMitigation for Quantum Cybersecurity
Module 1.2 Lecture 4
Certificated by QSECDEF
Mins 5.15Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesUnderstanding Quantum Algorithms
Module 1.3 Lecture 1
Certificated by QSECDEF
Mins 5.39Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesQuantum Cyber Security Strategies
Module 1.4 Lecture 1
Certificated by QSECDEF
Mins 5.39Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesPQC Algorithms
Training Module 2.2 Lecture 1
Certificated by QSECDEF
Mins 9.22Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesHybrid Encryption
Training Module 2.3 Lecture 2
Certificated by QSECDEF
Mins 6.13Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCurrent Global Recommendations for PQC
Module 2.3 Lecture 3
Certificated by QSECDEF
Mins 9.22Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesThe future of PQC
Training Module 2.3 Lecture 4
Certificated by QSECDEF
Mins 3.17Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesImplementations of QKD
Module 3.1 Lecture 2
Certificated by QSECDEF
Mins 7.23
We look at current implementations of QKD.Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesBB84 Protocol
Module 3.1 Lecture 3
Certificated by QSECDEF
Mins 5.26
In this section we cover what the BB84 protocol is and where it is used.Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesPro's and Cons of QKD
Module 3.2 Lecture 1
Certificated by QSECDEF
Mins 13.11
In this section we cover the practicalities of implementing QKDCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesQKD Use Cases
Module 3.3 Lecture 1
Certificated by QSECDEF
Mins 13.11
In this section we cover where and how QKD is being used.Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesHavest Now Decrypt Later Attacks
Module 4.1 Lecture 1
Certificated by QSECDEF
Mins 4.38
We break down what an HDNL attack looks like.Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesHNDL Attack Examples
Module 4.1 Lecture 2
Certificated by QSECDEF
Mins 6.02
Some real life working examples of HDNL Attacks.Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesDeployment of QKD Vs PQC
Module 4.2 Lecture 1
Certificated by QSECDEF
Mins 6.02
A security and deployment comparison of QKD and PQC toolsCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesThe Future of Quantum Networks
Module 4.2 Lecture 2
Certificated by QSECDEF
Mins 6.00
A security and deployment comparison of QKD and PQC toolsCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesNational Security Agency Positions
Module 4.3 Lecture 1
Certificated by QSECDEF
Mins 7.15
A security and deployment comparison of QKD and PQC toolsCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesPositions of European Authorities
Module 4.3 Lecture 2
Certificated by QSECDEF
Mins 7.41
A security and deployment comparison of QKD and PQC toolsCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertification
On completion of the course and on paying your membership, you will be awarded a certificate by QSECDEF the leader in Quantum Cyber Security with a LinkedIn certificate and badge which will show whilst you maintain membership.
Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesBonus Material
Over 15 hours of lectures from industry experts on QKD, QRNG, PQC, QSAT, Policy and more
Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesUnderstanding Quantum Cyber Security
Introduction to Quantum Cyber Security Training is available online now and includes community lectures access. 100% online. No prior knowledge of Quantum Technology Required.
Completion in 1 to 2 days of online studyCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesModule 1.1 Lecture
Asymmetric Encryption Methods
Available online now - Certificated by QSECDEF
Certificated on 80% pass mark | Certifying Body QSECDEF | 100% Online
Foundational Introduction No Prior Knowledge Of Quantum Technology RequiredCertificated on 80% pass mark
Mins 2.42Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesThreats to Asymmetric Encryption
Module 1.1 Lecture 2
Mins 5.04
Certificated by QSECDEFCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesRisks - When will Quantum be a threat?
Training Module 1.1 Lecture 3
Mins 5.35Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCase Studies for Quantum Cyber Security
Course Module 1.1 Lecture 4:
Certificated
Mins 2.42Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesSymmetric Encyrption Overview
Lesson Module 1.3 Lecture 1:
Certificated By QSECDEF
Mins 6.03Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesQuantum Threats To Cyber Security
Module 1.2 Lecture 3
Certificated by QSECDEF
Mins 6.59Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesMitigation for Quantum Cybersecurity
Module 1.2 Lecture 4
Certificated by QSECDEF
Mins 5.15Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesUnderstanding Quantum Algorithms
Module 1.3 Lecture 1
Certificated by QSECDEF
Mins 5.39Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesQuantum Cyber Security Strategies
Module 1.4 Lecture 1
Certificated by QSECDEF
Mins 5.39Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesPQC Algorithms
Training Module 2.2 Lecture 1
Certificated by QSECDEF
Mins 9.22Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesHybrid Encryption
Training Module 2.3 Lecture 2
Certificated by QSECDEF
Mins 6.13Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCurrent Global Recommendations for PQC
Module 2.3 Lecture 3
Certificated by QSECDEF
Mins 9.22Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesThe future of PQC
Training Module 2.3 Lecture 4
Certificated by QSECDEF
Mins 3.17Certificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profilesCertificated by QSECDEF
Competence badge on Linked In
75% Pass Mark Required
Certificates and badges
Embed on LinkedIn profiles