Overview

As the field of quantum computing continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents.

This comprehensive course is designed to provide participants with a thorough understanding of the fundamental principles and practical applications of quantum computing. Through a blend of theoretical and hands-on learning, participants will gain a deep appreciation for the potential of this cutting-edge technology and be equipped with the skills needed to make a real impact in the field.

Whether you are a researcher, security practitioner, engineer, or simply interested in this exciting and rapidly evolving field, this course offers a unique and valuable opportunity to gain the knowledge and skills needed to succeed in the quantum era.

Topics covered in the course;

  • Introduction to quantum computing
  • Postulates of Quantum Mechanics
  • Bloch sphere
  • IBM Quantum Entanglement
  • Quantum Gates
  • No Cloning Theorem
  • Quantum algorithms
  • Programming in Qiskit
Read more +

Prerequisites

Learners should be familiar with matrix multiplication, vectors, and complex numbers.

Read more +

Delegates will learn how to

You will;

  • Gain the skills to accurately calculate the probabilities of quantum states
  • Obtain the knowledge and tools necessary to effectively illustrate quantum bits
  • Have the ability to write quantum circuits using the Qiskit language
  • Become proficient in utilising the Quantum Computer of IBM
Read more +

Outline

Day 1

Introduction to Quantum Computing

  • Introduction of the course
  • Motivations behind quantum computing
  • Description of a Quantum Phenomenon

The Postulates of Quantum Mechanics

  • Four postulates
  • Quantum bits (qubits)
  • Quantum registers (quregisters)
  • Quantum gates
  • Extracting information from quantum registers (Measurements)

IBM Quantum

  • Entanglement
  • Implementation examples for qubits

Elements of classical digital technology

  • Logical gates and circuits
  • Synchronous Sequential circuits

Day 2

Quantum Gates

  • One Qubit Gates
  • Two (or more) Qubits Gates

Quantum Circuit Model

  • Quantum Circuit: Overview
  • The beam-splitter experiment

How to prepare a superposition?

  • Preparing an arbitrary quantum state

No cloning theorem

  • No Cloning Theorem - Proof

Quantum Algorithms

  • Receipt of quantum algorithm design
  • Initialization
  • Quantum parallelism
  • Amplitude amplification
  • Measurement
  • Classical post-processing
  • Algorithms with polynomial speedup
  • Grover's algorithm

Day 3

Quantum Algorithms

  • Algorithms with superpolynomial speedup
  • The Deutsch-Jozsa Algorithms
  • Quantum Fourier Transform
  • Phase estimation
  • Deutsch-Jozsa algorithm and phase estimation
  • Quantum Counting
  • Shor's Algorithms
  • Quantum optimization

Programming Quantum Computers

  • The main approaches
  • Qiskit
  • Q#
  • IBM Quantum
  • Xanadu Quantum Computer

Summary and outlook

  • Post quantum cryptography
  • Quantum communications
Read more +

Scademy

In partnership with our Secure Coding partner Scademy.

Click here to view all our Scademy courses.

Why choose QA

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing