Fundamentals of Quantum Information
About this Course
Quantum information is the foundation of the second quantum revolution. With classical computers and the classical internet, we are always manipulating classical information, made of bits. On the other hand, quantum computing and quantum communication consist in the processing of quantum information, made of qubits. Take away the hardware, and all quantum computers work the same way, through the clever manipulation of quantum information and entanglement. This course provides a deeper understanding of some of the topics covered in our Quantum 101 program, namely, the representation and manipulation of quantum information at the level of abstract quantum circuits. Specifically, single and multi-qubit gates and circuits are introduced, and basic algorithms and protocols such as quantum state teleportation, superdense coding, and entanglement swapping are discussed. The course also presents quantum gate sets, their universality, and compilations between different gate expressions. These concepts are then made concrete with the Quantum Inspire simulator (a cloud-based quantum computing platform, created and maintained by QuTech at TU Delft), and the physics and operations with spin qubits will be detailed. The course concludes with an examination of quantum supremacy and near-term quantum devices, also known as “noisy-intermediate scale” (NISQ) quantum computing. The course is a journey of discovery, so we encourage you to bring your own experiences, insights and thoughts to discuss on the forum! This course is authored by experts from the QuTech research center at Delft University of Technology. In the center, scientists and engineers work together to drive research and development in quantum technology. QuTech Academy’s aim is to inspire, share and disseminate knowledge about the latest developments in quantum technology.Created by: Delft University of Technology
Level: Advanced

Related Online Courses
This course will provide you with technical hands-on knowledge of NoSQL databases and Database-as-a-Service (DaaS) offerings. With the advent of Big Data and agile development methodologies, NoSQL... more
How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk. In this course, part of the... more
En un mundo virtual en el que hay cientos de millones de páginas disponibles con información de todo tipo, buscar en Internet de forma eficaz es una habilidad cada día más necesaria. Aprende con... more
Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? Gain an understanding of the basic engineering tools used and tradeoffs encountered in the design of... more
Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect... more