{"id":5771,"date":"2026-05-06T07:00:00","date_gmt":"2026-05-06T05:00:00","guid":{"rendered":"https:\/\/www.eadtrust.eu\/?p=5771"},"modified":"2026-05-18T09:42:25","modified_gmt":"2026-05-18T07:42:25","slug":"post-course-quantum-computing-post-quantum-cryptography-eadtrust","status":"publish","type":"post","link":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/","title":{"rendered":"Chronicle of the Quantum Computing and Post-Quantum Cryptography Course in Madrid, 22\u201323 April 2026"},"content":{"rendered":"\n<p>On <a href=\"https:\/\/www.youtube.com\/shorts\/QEAGxrJx9mY\">22 and 23 April 2026<\/a>, the Hotel Zenith Conde Orgaz in Madrid hosted the second edition of the Introduction to Quantum Computing and Post-Quantum Cryptography Course organized by <a href=\"https:\/\/www.eadtrust.eu\/en\/\">EADTrust<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eadtrust.eu\/curso-computacion-cuantica-criptografia-postcuantica\/\">I want to sign up for the 2027 edition.<\/a><\/div>\n<\/div>\n\n\n\n<p>During two intensive working days, a group of professionals \u2014 lawyers, economists, financial directors, compliance officers, and engineers \u2014 built a Bloch sphere with their own hands, executed real quantum circuits in IBM Composer, and understood why <a href=\"https:\/\/www.youtube.com\/shorts\/jMGzpLfWvPg\">RSA and ECC<\/a> are living on borrowed time. This is the chronicle of what happened.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why does EADTrust organize a course on quantum computing?<\/h2>\n\n\n\n<p>The answer is straightforward: because quantum computing is not an abstract future threat. It is a <strong>threat with timelines<\/strong>, approved standards, and regulations that are already in force.<\/p>\n\n\n\n<p>What we call the <strong>\u201ccryptocalypse\u201d <\/strong>\u2014 the moment when a quantum computer becomes capable of breaking the asymmetric cryptography algorithms that currently protect payments, contracts, certificates, and communications \u2014 is, according to every technical and regulatory indicator, a question of <em>when<\/em>, not <em>if<\/em>.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.nist.gov\/\">NIST<\/a> has already published the first post-quantum cryptography standards. <a href=\"https:\/\/www.enisa.europa.eu\/\">ENISA<\/a> is actively promoting adoption initiatives. <a href=\"https:\/\/www.cni.es\/centro-criptologico-nacional\">Spain\u2019s CCN<\/a> has issued guidance so that essential and critical entities can achieve a state of <em>Quantum Readiness<\/em>. And organizations such as ETSI are actively working on standardization.<\/p>\n\n\n\n<p>As a Qualified Trust Service Provider (QTSP), EADTrust has the responsibility to bring this technical and regulatory reality to the teams that need to make decisions now. That is the origin of this course.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The International Year of Quantum Science and Technology<\/h2>\n\n\n\n<p>This second edition arrives at a particularly relevant moment. The year 2025 was declared the<strong> International Year of Quantum Science and Technology<\/strong> by the United Nations through <a href=\"https:\/\/inza.blog\/wp-content\/uploads\/2025\/09\/introduccion-a-la-computacion-cuantica-y-a-la-criptografia-postcuantica-noviembre-2025.pdf\">Resolution 78\/287, adopted on 7 June 2024<\/a>, to commemorate the centenary of quantum mechanics. The initiative was supported by nearly 300 organizations.<\/p>\n\n\n\n<p>At the same time, 2025 brought concrete advances: Microsoft announced the first commercial quantum computer with 24 logical qubits operating in the cloud, IBM and AMD formalized a partnership to integrate quantum computing with classical supercomputing, and Gartner projected a 9% increase in global technology investment focused on disruptive technologies such as quantum computing.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.eadtrust.eu\/en\/\">EADTrust <\/a>had already organized the first edition of this course on 12 and 13 November 2025, marking the beginning of a series of activities that will include quantum programming workshops and methodologies for assessing the use of cryptography within organizations. The April 2026 edition consolidates that journey.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The speakers: who was in the room<\/h2>\n\n\n\n<p>The course featured four speakers with complementary profiles, covering the full spectrum of the quantum challenge: from physical fundamentals to regulatory implications and market applications.<\/p>\n\n\n\n<p><strong>Jorge Christen<\/strong> is a quantum computing expert with extensive international experience designing solutions for the financial industry. He is the creator of the <a href=\"https:\/\/inza.blog\/2026\/01\/19\/evento-formativo-sobre-computacion-cuantica-y-criptografia-postcuantiva-en-abril-de-2026-con-la-metodologia-ensar\/\">ENSAR methodology<\/a> \u2014 the pedagogical framework structuring the entire first day \u2014 and a professor at the University of Monterrey, where he has delivered quantum computing training in Mexico, the United States, and Spain.<\/p>\n\n\n\n<p><strong>Antonio Peris<\/strong> is co-founder of <a href=\"https:\/\/qcentroid.xyz\/\">QCentroid<\/a>, a company specializing in quantum computing applications for sectors such as healthcare, energy, finance, and industry. His background combines computer science, marketing, and management, with a focus on building collaborative environments that accelerate quantum innovation.<\/p>\n\n\n\n<p><strong>Ainhoa Inza<\/strong> is Director of Professional Services and Compliance at EADTrust. She has led the TCAB (<em>Trust Conformity Assessment Body<\/em>), is an expert in eIDAS auditing, cybersecurity, digital identity management, cryptography, blockchain, and GRC, and holds the CISA (<em>Certified Information Systems Auditor<\/em>) certification.<\/p>\n\n\n\n<p><strong>Juli\u00e1n Inza<\/strong> is President of EADTrust and a specialist in cryptography and cybersecurity. He has collaborated with several Trust Service Providers and served as an evaluator for providers within TCAB. During the course, he led the module on international initiatives for the standardization of post-quantum algorithms and adoption strategies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Day 1 \u2014 From Planck to IBM Composer: building a qubit with your own hands<\/h2>\n\n\n\n<p>The first day, led by <strong>Jorge Christen<\/strong>, started from an unusual point for a technical course: the history of physics.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-1024x681.jpg\" alt=\"Curso postcu\u00e1ntica madrid\" class=\"wp-image-5709\" srcset=\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-1024x681.jpg 1024w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-300x199.jpg 300w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-768x511.jpg 768w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-1536x1021.jpg 1536w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-2048x1362.jpg 2048w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-320x213.jpg 320w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-480x319.jpg 480w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/jorge-chisten-curso-computacion-800x532.jpg 800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">From the predictable universe to the quantum universe<\/h3>\n\n\n\n<p>At the end of the nineteenth century, physics seemed almost complete. Newton\u2019s laws and Maxwell\u2019s electromagnetism described a predictable and orderly universe. But a group of visionary minds \u2014 Max Planck, Albert Einstein, Niels Bohr, Werner Heisenberg, and Erwin Schr\u00f6dinger \u2014 dared to challenge the established view. Quantum physics was born: a science where light can behave as both particle and wave at the same time, where particles may exist in several places simultaneously, and where randomness governs the core of matter.<\/p>\n\n\n\n<p>Jorge Christen used this historical journey not as decoration, but as a pedagogical framework. Before speaking about qubits, attendees needed to understand why quantum reality is counterintuitive \u2014 and why that matters for cryptography.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The ENSAR methodology: when physics becomes tangible<\/h3>\n\n\n\n<p>The distinctive element of the first day was the application of the <strong>ENSAR methodology <\/strong>(<em>Experience, Name, Speak, Apply and Repeat<\/em>), created by Jorge Christen himself to enable people with no prior knowledge of quantum physics to understand and operate quantum computing systems.<\/p>\n\n\n\n<p>The method is not theoretical. Participants worked with the <strong>IQC Kit <\/strong>(<em>Introduction to Quantum Computing<\/em>), a set of physical materials through which they progressively built mechanical representations of highly complex concepts. Superposition, entanglement, and the Bloch sphere \u2014 concepts that appear abstract on paper \u2014 became physically manipulable in the hands of every attendee.<\/p>\n\n\n\n<p>The technical path of the first day covered the foundations of quantum computing (qubits, superposition, entanglement, the Bloch sphere, quantum gates, and circuits), the use of a real quantum computer through <strong>IBM\u00ae Composer<\/strong>, and a review of the current state of the art in quantum technologies and platforms. Attendees used Dirac notation and incorporated quantum gates such as the Hadamard gate into their own circuits.<\/p>\n\n\n\n<p>The level of feedback was exceptional. Lawyers, economists, engineers, and professionals from public administrations, banking, and insurance sectors \u2014 without a single previous hour of quantum physics training \u2014 finished the first day having executed their own circuits on a real quantum computing platform.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Day 2 \u2014 From the quantum market to the cryptocalypse: what can no longer wait<\/h2>\n\n\n\n<p>The second day was denser, more regulatory, and for many attendees, the most urgent. The order was: first Antonio Peris, then Ainhoa Inza, and finally Juli\u00e1n Inza. The day ended with certificate delivery and a long conversation that was never part of the official program.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Antonio Peris (QCentroid): what is already happening in the quantum market<\/h3>\n\n\n\n<p>The opening session of the second day was delivered by <strong>Antonio Peris<\/strong>, co-founder of QCentroid, who placed quantum computing within its real market dimension. Far removed from science-fiction narratives, Peris offered a practical perspective: which sectoral applications quantum computing already has, in which industries it is first taking root \u2014 healthcare, energy, finance, and industry \u2014 and why this is no longer merely a laboratory conversation but a matter of investment and strategic decision-making.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"1024\" src=\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-681x1024.jpg\" alt=\"Antonio Peris curso computaci\u00f3n cu\u00e1ntica madrid\" class=\"wp-image-5711\" srcset=\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-681x1024.jpg 681w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-199x300.jpg 199w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-768x1155.jpg 768w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-1021x1536.jpg 1021w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-1361x2048.jpg 1361w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-320x481.jpg 320w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-480x722.jpg 480w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-800x1203.jpg 800w, https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/antonio-peris-curso-computacion-madrid-scaled.jpg 1702w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/figure>\n\n\n\n<p>QCentroid operates precisely in that space: applying quantum computing to sectors where computational performance has direct consequences for business outcomes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ainhoa Inza: the complete technical and regulatory map<\/h3>\n\n\n\n<p><strong>Ainhoa Inza<\/strong> led the module connecting the quantum threat with the technical and regulatory response. Attendees received the complete picture: from the quantum algorithms with the greatest impact on cryptography \u2014 especially Shor\u2019s algorithm, capable of factoring integers in polynomial time, and Grover\u2019s algorithm \u2014 to the first approved standards and regulations already in force.<\/p>\n\n\n\n<p>On the technical side, Ainhoa presented the post-quantum standards already published by National Institute of Standards and Technology (NIST):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ML-KEM (FIPS 203):<\/strong> a key encapsulation mechanism based on Module-Lattice cryptography. <\/li>\n\n\n\n<li><strong>ML-DSA (FIPS 204):<\/strong> a digital signature scheme based on Module-Lattice cryptography (previously known as Dilithium). <\/li>\n\n\n\n<li><strong>SLH-DSA (FIPS 205):<\/strong> a stateless hash-based digital signature scheme (previously known as SPHINCS+).<\/li>\n<\/ul>\n\n\n\n<p>Google and Microsoft have already implemented these algorithms in Chrome, Azure, and BoringSSL. ETSI has published European technical specifications aligned with them. Spain\u2019s Centro Criptol\u00f3gico Nacional (CCN) has issued guidance for the ENS. The transition is not a theoretical roadmap: it is a process already underway.<\/p>\n\n\n\n<p>On the regulatory side, Ainhoa Inza developed the framework of obligations directly affecting the organizations present:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DORA (Digital Operational Resilience Act):<\/strong> in force since January 2025, it requires the senior management of financial entities to manage ICT risks, conduct resilience testing, and report incidents within 24\u201372 hours. Fines can reach up to 2% of global annual turnover. <\/li>\n\n\n\n<li><strong>NIS2:<\/strong> expanded to essential and important entities (energy, healthcare, transport, digital services), and transposed into national law since October 2024. Penalties can reach up to \u20ac10 million or 2% of turnover for essential entities. <\/li>\n\n\n\n<li><strong>eIDAS 2:<\/strong> establishes the framework for European Digital Identity Wallets (EUDI Wallet) and qualified trust services. It requires certification, breach notification within 24 hours, and annual audits. <\/li>\n\n\n\n<li><strong>Cyber Resilience Act (CRA):<\/strong> requires manufacturers, importers, and distributors of products with digital elements to report vulnerabilities within 24 hours and guarantee updates for five years. It enters into force in 2027, with penalties of up to \u20ac15 million or 2.5% of turnover.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Juli\u00e1n Inza: \u201cThere is urgency!\u201d<\/h3>\n\n\n\n<p><strong>Juli\u00e1n Inza<\/strong> closed the day with the session that, according to attendee feedback, stayed with them the most after leaving the room. His central message was precise: without a <strong>cryptographic inventory<\/strong> of what each organization currently has deployed, any migration plan toward post-quantum cryptography starts from the wrong premise. There is no <em>crypto-agility<\/em> without that starting point.<\/p>\n\n\n\n<p>Juli\u00e1n developed the concept of <strong>\u201cHarvest Now, Decrypt Later\u201d<\/strong> (HNDL): adversaries capable of intercepting and storing encrypted traffic today in order to decrypt it once quantum computers become powerful enough. This turns the quantum threat into a present problem, not a future one: the data circulating today is already being harvested.<\/p>\n\n\n\n<p>The European Commission published the document \u201cEU coordinated approach to post-quantum cryptography: Implementation roadmap\u201d, which establishes a phased and structured approach for adopting post-quantum cryptography across Member States, aligned with NIS2:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phase 1 (2023\u20132024):<\/strong> awareness and risk assessment. <\/li>\n\n\n\n<li><strong>Phase 2 (2024\u20132025):<\/strong> planning and capability development. <\/li>\n\n\n\n<li><strong>Phase 3 (2025\u20132027):<\/strong> implementation and testing. <\/li>\n\n\n\n<li><strong>Phase 4 (2027 onwards):<\/strong> full adoption and monitoring.<\/li>\n<\/ul>\n\n\n\n<p>Juli\u00e1n insisted on one point that remained etched in the room: \u201cIn 2026, 2030, and 2035, regulatory deadlines will arrive that technological reality could accelerate. There is urgency.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The closing: discussion with attendees, debate, group photo<\/h2>\n\n\n\n<p>The second day ended in a way that was never part of the official agenda. After the certificate ceremony \u2014 accreditations documenting the 12 hours of training, the covered content, and the applied methodology \u2014 and the group photo, the conversation continued. The attendees did not want to stop.<\/p>\n\n\n\n<p>The questions that emerged were no longer about qubits or Shor\u2019s algorithm. They were about budgets, realistic timelines, and how to bring what had been learned into the board meeting the following Monday.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What the attendees said<\/h2>\n\n\n\n<p>Feedback from previous editions illustrates the impact of the format:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u00abUna formaci\u00f3n fant\u00e1stica, muy \u00fatil y aterrizada de la mejor manera para generar conocimiento sin una base s\u00f3lida en el tema. Totalmente recomendable.\u00bb<\/em><strong> Juan Miguel<\/strong><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u00abOportuna y desafiante formaci\u00f3n. EADTrust ha hecho un gran esfuerzo para facilitar una comprensi\u00f3n a grandes rasgos del mundo cu\u00e1ntico y su impacto sobre la criptograf\u00eda, de forma que se comprendan los desaf\u00edos t\u00e9cnicos, las exigencias regulatorias, y las opciones y roadmaps para que las organizaciones se preparen a tiempo. En 2026, 2030 y 2035 se cumplir\u00e1n plazos regulatorios que la realidad tecnol\u00f3gica podr\u00eda acelerar. Como insiste Juli\u00e1n Inza: &#8220;\u00a1Hay prisa!&#8221;\u00bb<\/em><strong> Santiago Portela<\/strong><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u00abTen\u00eda mis dudas por no tener conocimientos previos de computaci\u00f3n cu\u00e1ntica, pero esta formaci\u00f3n ha superado con creces mis expectativas. La primera parte con Jorge nos ha dado el contexto de la parte m\u00e1s t\u00e9cnica de manera s\u00faper amena y divertida. La segunda parte de Juli\u00e1n ha puesto de manifiesto la necesidad de empezar a planificar acciones para prevenir la criptocalipsis, ofreciendo una versi\u00f3n m\u00e1s pr\u00e1ctica de c\u00f3mo aplicarla.\u00bb<\/em><strong> Mar\u00eda Reina<\/strong><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u00abMe ha parecido estupenda la formaci\u00f3n; me fascin\u00f3 c\u00f3mo temas tan complejos los han sabido explicar en un lenguaje llano para que nos llevemos los conceptos importantes y, sobre todo, el camino a recorrer para estar preparados para &#8220;sobrevivir&#8221; a la computaci\u00f3n cu\u00e1ntica. Recomiendo participar en esta formaci\u00f3n.\u00bb<\/em><strong> Esley S\u00e1nchez<\/strong><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions about the course<\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1777540269639\"><strong class=\"schema-faq-question\"><strong>Is prior knowledge of physics or cryptography required?<\/strong><\/strong> <p class=\"schema-faq-answer\">No. The course is specifically designed for professionals without any previous background in physics, quantum computing, or cryptography. Jorge Christen\u2019s ENSAR methodology starts from zero and builds understanding progressively.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1777540283945\"><strong class=\"schema-faq-question\"><strong>Who is the course aimed at?<\/strong><\/strong> <p class=\"schema-faq-answer\">It is intended for lawyers specializing in new technologies, security officers in public administrations, employees of financial, banking, and insurance entities, ICT executives, innovation and security managers, technical teams involved in payment systems and cybersecurity, technology strategy leaders, and technology service providers working with critical sectors.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1777540294567\"><strong class=\"schema-faq-question\"><strong>Why is the course in-person instead of online?<\/strong><\/strong> <p class=\"schema-faq-answer\">Because the exercises using the IQC Kit \u2014 the physical material through which attendees build representations of qubits and Bloch spheres \u2014 are the pedagogical core of the first day. Without that hands-on component, quantum concepts are not internalized in the same way.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1777540304368\"><strong class=\"schema-faq-question\"><strong>What is included in the price?<\/strong><\/strong> <p class=\"schema-faq-answer\">The course costs \u20ac900 for the two days (plus 21% VAT) and includes the training materials with the IQC Kit, the certificate of attendance, meals, and coffee breaks. For discounts and updated pricing information, it is best to <a href=\"https:\/\/www.eadtrust.eu\/en\/contact\/\">ask here<\/a> directly.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1777540346114\"><strong class=\"schema-faq-question\"><strong>What does the certificate of attendance certify?<\/strong><\/strong> <p class=\"schema-faq-answer\">The certificate confirms completion of the course, specifies its duration and content, and serves as a professional achievement record. The authenticity of the document can be verified through EADTrust\u2019s electronic verification service.<\/p> <\/div> <\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Next edition: April 2027<\/h2>\n\n\n\n<p>This was the second edition of the course. The next in-person edition is scheduled for <strong>April 2027<\/strong> in Madrid.<\/p>\n\n\n\n<p>If you cannot wait until 2027 \u2014 or if you need to assess the impact of quantum computing on your organization before then \u2014 the<a href=\"https:\/\/www.eadtrust.eu\/en\/contact\/\"> EADTrust team<\/a> is available for a preliminary diagnostic session or to prepare an in-company training proposal.<\/p>\n\n\n\n<p>The regulatory roadmap will not wait for the next course.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 22 and 23 April 2026, the Hotel Zenith Conde Orgaz in Madrid hosted the second edition of the Introduction to Quantum Computing and Post-Quantum Cryptography Course organized by EADTrust During two intensive working days, a group of professionals \u2014 lawyers, economists, financial directors, compliance officers, and engineers \u2014 built a Bloch sphere with their [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":5704,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[52],"class_list":["post-5771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria","tag-cryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u25b7 Post-course: Quantum Computing and Cryptography - EADTrust<\/title>\n<meta name=\"description\" content=\"One week ago, we held the Quantum Computing and Post-Quantum Cryptography course in Madrid. See how it went and sign up for 2027. The risk will not wait.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Post-course: Quantum Computing and Cryptography - EADTrust\" \/>\n<meta property=\"og:description\" content=\"One week ago, we held the Quantum Computing and Post-Quantum Cryptography course in Madrid. See how it went and sign up for 2027. The risk will not wait.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/\" \/>\n<meta property=\"og:site_name\" content=\"EADTrust\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-06T05:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-18T07:42:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Iria Benito\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Iria Benito\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/\"},\"author\":{\"name\":\"Iria Benito\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#\/schema\/person\/a3734067aec82e51658e0148f12b57c2\"},\"headline\":\"Chronicle of the Quantum Computing and Post-Quantum Cryptography Course in Madrid, 22\u201323 April 2026\",\"datePublished\":\"2026-05-06T05:00:00+00:00\",\"dateModified\":\"2026-05-18T07:42:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/\"},\"wordCount\":2304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg\",\"keywords\":[\"Cryptography\"],\"articleSection\":[\"Sin categor\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#respond\"]}]},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/\",\"url\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/\",\"name\":\"\u25b7 Post-course: Quantum Computing and Cryptography - EADTrust\",\"isPartOf\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg\",\"datePublished\":\"2026-05-06T05:00:00+00:00\",\"dateModified\":\"2026-05-18T07:42:25+00:00\",\"description\":\"One week ago, we held the Quantum Computing and Post-Quantum Cryptography course in Madrid. See how it went and sign up for 2027. The risk will not wait.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540269639\"},{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540283945\"},{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540294567\"},{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540304368\"},{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540346114\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage\",\"url\":\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg\",\"contentUrl\":\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"foto grupo curso computaci\u00f3n cu\u00e1ntica EADTrust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/www.eadtrust.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad cu\u00e1ntica\",\"item\":\"https:\/\/www.eadtrust.eu\/blog\/category\/seguridad-cuantica\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Chronicle of the Quantum Computing and Post-Quantum Cryptography Course in Madrid, 22\u201323 April 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#website\",\"url\":\"https:\/\/www.eadtrust.eu\/en\/\",\"name\":\"EADTrust\",\"description\":\"Prestador de Servicios Cualificados\",\"publisher\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eadtrust.eu\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#organization\",\"name\":\"EADTrust\",\"url\":\"https:\/\/www.eadtrust.eu\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2025\/02\/LOGO-POSITIVO-EAD-VERTICAL.png\",\"contentUrl\":\"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2025\/02\/LOGO-POSITIVO-EAD-VERTICAL.png\",\"width\":838,\"height\":806,\"caption\":\"EADTrust\"},\"image\":{\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#\/schema\/person\/a3734067aec82e51658e0148f12b57c2\",\"name\":\"Iria Benito\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2c5644780e757c7bc6dc451181852e22a42d1cfa51811bbf9a590295ea97b544?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2c5644780e757c7bc6dc451181852e22a42d1cfa51811bbf9a590295ea97b544?s=96&d=mm&r=g\",\"caption\":\"Iria Benito\"},\"url\":\"https:\/\/www.eadtrust.eu\/en\/blog\/author\/iria-benito\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540269639\",\"position\":1,\"url\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540269639\",\"name\":\"Is prior knowledge of physics or cryptography required?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"No. The course is specifically designed for professionals without any previous background in physics, quantum computing, or cryptography. Jorge Christen\u2019s ENSAR methodology starts from zero and builds understanding progressively.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540283945\",\"position\":2,\"url\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540283945\",\"name\":\"Who is the course aimed at?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It is intended for lawyers specializing in new technologies, security officers in public administrations, employees of financial, banking, and insurance entities, ICT executives, innovation and security managers, technical teams involved in payment systems and cybersecurity, technology strategy leaders, and technology service providers working with critical sectors.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540294567\",\"position\":3,\"url\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540294567\",\"name\":\"Why is the course in-person instead of online?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Because the exercises using the IQC Kit \u2014 the physical material through which attendees build representations of qubits and Bloch spheres \u2014 are the pedagogical core of the first day. Without that hands-on component, quantum concepts are not internalized in the same way.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540304368\",\"position\":4,\"url\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540304368\",\"name\":\"What is included in the price?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The course costs \u20ac900 for the two days (plus 21% VAT) and includes the training materials with the IQC Kit, the certificate of attendance, meals, and coffee breaks. For discounts and updated pricing information, it is best to <a href=\\\"https:\/\/www.eadtrust.eu\/en\/contact\/\\\">ask here<\/a> directly.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540346114\",\"position\":5,\"url\":\"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540346114\",\"name\":\"What does the certificate of attendance certify?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The certificate confirms completion of the course, specifies its duration and content, and serves as a professional achievement record. The authenticity of the document can be verified through EADTrust\u2019s electronic verification service.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Post-course: Quantum Computing and Cryptography - EADTrust","description":"One week ago, we held the Quantum Computing and Post-Quantum Cryptography course in Madrid. See how it went and sign up for 2027. The risk will not wait.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Post-course: Quantum Computing and Cryptography - EADTrust","og_description":"One week ago, we held the Quantum Computing and Post-Quantum Cryptography course in Madrid. See how it went and sign up for 2027. The risk will not wait.","og_url":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/","og_site_name":"EADTrust","article_published_time":"2026-05-06T05:00:00+00:00","article_modified_time":"2026-05-18T07:42:25+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg","type":"image\/jpeg"}],"author":"Iria Benito","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Iria Benito","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#article","isPartOf":{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/"},"author":{"name":"Iria Benito","@id":"https:\/\/www.eadtrust.eu\/en\/#\/schema\/person\/a3734067aec82e51658e0148f12b57c2"},"headline":"Chronicle of the Quantum Computing and Post-Quantum Cryptography Course in Madrid, 22\u201323 April 2026","datePublished":"2026-05-06T05:00:00+00:00","dateModified":"2026-05-18T07:42:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/"},"wordCount":2304,"commentCount":0,"publisher":{"@id":"https:\/\/www.eadtrust.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg","keywords":["Cryptography"],"articleSection":["Sin categor\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#respond"]}]},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/","url":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/","name":"\u25b7 Post-course: Quantum Computing and Cryptography - EADTrust","isPartOf":{"@id":"https:\/\/www.eadtrust.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage"},"image":{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg","datePublished":"2026-05-06T05:00:00+00:00","dateModified":"2026-05-18T07:42:25+00:00","description":"One week ago, we held the Quantum Computing and Post-Quantum Cryptography course in Madrid. See how it went and sign up for 2027. The risk will not wait.","breadcrumb":{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540269639"},{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540283945"},{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540294567"},{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540304368"},{"@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540346114"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#primaryimage","url":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg","contentUrl":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2026\/05\/foto-grupo-computacion-scaled.jpg","width":2560,"height":1707,"caption":"foto grupo curso computaci\u00f3n cu\u00e1ntica EADTrust"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.eadtrust.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Seguridad cu\u00e1ntica","item":"https:\/\/www.eadtrust.eu\/blog\/category\/seguridad-cuantica\/"},{"@type":"ListItem","position":3,"name":"Chronicle of the Quantum Computing and Post-Quantum Cryptography Course in Madrid, 22\u201323 April 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.eadtrust.eu\/en\/#website","url":"https:\/\/www.eadtrust.eu\/en\/","name":"EADTrust","description":"Prestador de Servicios Cualificados","publisher":{"@id":"https:\/\/www.eadtrust.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eadtrust.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eadtrust.eu\/en\/#organization","name":"EADTrust","url":"https:\/\/www.eadtrust.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eadtrust.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2025\/02\/LOGO-POSITIVO-EAD-VERTICAL.png","contentUrl":"https:\/\/www.eadtrust.eu\/wp-content\/uploads\/2025\/02\/LOGO-POSITIVO-EAD-VERTICAL.png","width":838,"height":806,"caption":"EADTrust"},"image":{"@id":"https:\/\/www.eadtrust.eu\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eadtrust.eu\/en\/#\/schema\/person\/a3734067aec82e51658e0148f12b57c2","name":"Iria Benito","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eadtrust.eu\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2c5644780e757c7bc6dc451181852e22a42d1cfa51811bbf9a590295ea97b544?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c5644780e757c7bc6dc451181852e22a42d1cfa51811bbf9a590295ea97b544?s=96&d=mm&r=g","caption":"Iria Benito"},"url":"https:\/\/www.eadtrust.eu\/en\/blog\/author\/iria-benito\/"},{"@type":"Question","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540269639","position":1,"url":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540269639","name":"Is prior knowledge of physics or cryptography required?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. The course is specifically designed for professionals without any previous background in physics, quantum computing, or cryptography. Jorge Christen\u2019s ENSAR methodology starts from zero and builds understanding progressively.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540283945","position":2,"url":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540283945","name":"Who is the course aimed at?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It is intended for lawyers specializing in new technologies, security officers in public administrations, employees of financial, banking, and insurance entities, ICT executives, innovation and security managers, technical teams involved in payment systems and cybersecurity, technology strategy leaders, and technology service providers working with critical sectors.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540294567","position":3,"url":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540294567","name":"Why is the course in-person instead of online?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Because the exercises using the IQC Kit \u2014 the physical material through which attendees build representations of qubits and Bloch spheres \u2014 are the pedagogical core of the first day. Without that hands-on component, quantum concepts are not internalized in the same way.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540304368","position":4,"url":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540304368","name":"What is included in the price?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The course costs \u20ac900 for the two days (plus 21% VAT) and includes the training materials with the IQC Kit, the certificate of attendance, meals, and coffee breaks. For discounts and updated pricing information, it is best to <a href=\"https:\/\/www.eadtrust.eu\/en\/contact\/\">ask here<\/a> directly.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540346114","position":5,"url":"https:\/\/www.eadtrust.eu\/en\/blog\/post-course-quantum-computing-post-quantum-cryptography-eadtrust\/#faq-question-1777540346114","name":"What does the certificate of attendance certify?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The certificate confirms completion of the course, specifies its duration and content, and serves as a professional achievement record. The authenticity of the document can be verified through EADTrust\u2019s electronic verification service.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/posts\/5771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/comments?post=5771"}],"version-history":[{"count":2,"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/posts\/5771\/revisions"}],"predecessor-version":[{"id":5773,"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/posts\/5771\/revisions\/5773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/media\/5704"}],"wp:attachment":[{"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/media?parent=5771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/categories?post=5771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eadtrust.eu\/en\/wp-json\/wp\/v2\/tags?post=5771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}