Course

Quantum Computing

Quantum computing unlocks the strange power of quantum physics to solve problems classical computers can’t.
Although quantum computing may seem futuristic, it already impacts computing and security. In this course, you will learn the basics, understand Shor’s algorithm, and explore post-quantum cryptography. Are you ready to get started?
Write your awesome label here.
Timo Van Eetvelde
Teacher ‘Quantum Computing'

Minutes

Videos

Questions and answers

What will you learn?

Quantum computing harnesses the strange principles of quantum mechanics like superposition, entanglement, and interference to process information in ways classical computers cannot. In this course, you'll explore how qubits differ from traditional bits, and discover why quantum algorithms promise breakthroughs in cryptography, optimization, and material science. We'll demystify the mathematics behind shor's algorithm before exploring the families of algorithms being standardized today to safeguard data against future quantum attacks. By the end of the course, you’ll have a conceptual understanding of the rapidly evolving landscape of quantum computing and its security implications.

Quantum mechanics foundations

After a short introduction, you’ll learn the core quantum ideas that everything else builds on. Using the double-slit experiment, superposition, and entanglement, we develop the intuition you need to understand how quantum systems behave.

Shor’s algorithm

Once the basics are in place, we tackle one of the most important results in quantum computing. You’ll understand the main mechanism behind Shor’s algorithm and why it’s such a big deal for factoring.

Post-quantum cryptography

After seeing what quantum algorithms can break, we look at how cryptography adapts. You’ll learn what “post-quantum secure” means, explore the main families of post-quantum schemes, and understand the trade-offs involved in moving real systems to quantum-resistant methods.

Questions and final exam

Throughout the course, you’ll check your understanding with 20 questions that reinforce the key takeaways. To close off, you’ll complete a final exam designed to ensure you can connect the theory to practical implications and make sense of the full quantum-to-crypto story.
Meet the instructor
Write your awesome label here.

Timo Van Eetvelde

Cyber Security Expert - Trainer
Timo is a cybersecurity expert, specialized in architecting secure applications in complex landscapes. He is passionate about cybersecurity and cryptography. With a solid foundation in Mathematical Engineering and a dedicated focus on cryptography, he blends deep theoretical insights with real‑world security expertise.

Professional development

The Master Channel - Mastery Level Certificate

Complete all the content of a course and earn a score of 80% or higher on the exam to earn your Mastery Level Certificate.