Leader in the cybersecurity training sector.

Security of quantum systems

Satisfaction rate
4.5
Success rate
4.9

Anticipating cyber-risks and post-quantum changes 

The target audience for training

  • CISOs, security architects, technical or innovation managers. 
  • Cybersecurity consultants, technical auditors. 
  • Cryptography experts or critical infrastructure administrators. 

What you will learn

  • Understanding fundamental principles of quantum computing and their impact on information systems. 
  • Identify emerging cyber risks linked to quantum computing power. 
  • Understand the implications for asymmetric and symmetric cryptography. 
  • Knowing the post-quantum protocols and algorithms in the process of being standardised (NIST, ANSSI, ETSI). 
  • Develop a roadmap for the transition to post-quantum security. 

Training programme

  • Introduction Quantum computing, state of the art, technological breakthroughs
    • Module 1 Quantum impact on classical cryptography (RSA, ECC, AES)
    • Module 2 Post-quantum algorithms (lattice, hash-based, code-based, etc.)
    • Module 3 Standards and industry issues: NIST PQC, ETSI, ANSSI
    • Module 4 : Planning a migration: risk analysis and roadmap
  • Final workshop Case study of a company facing a PQC transition
  • Debriefing, MCQs and closing

Assessment procedures

  • MCQ to validate prior learning (20 questions). 
  • Collective case study with feedback on the proposed areas for change. 

Teaching methods

  • Training led by a cybersecurity and quantum expert. 
  • Detailed course support with diagrams, technical references, standards watch. 
  • Collaborative case study based on a realistic scenario (migration of a banking infrastructure). 
  • Technical bibliography and strategic intelligence provided. 

Training objectives

At the end of the day, participants will be able to : 

  • Explain the basics of quantum computing and the threats it poses to current cryptography. 
  • Identify the types of data and systems vulnerable to quantum attacks. 
  • Analyse the challenges of migrating to post-quantum solutions. 
  • Evaluate the main families of post-quantum algorithms proposed by NIST. 
  • Design a monitoring and anticipation strategy tailored to their technical environment. 

Training prerequisites

  • Good general knowledge of cybersecurity and cryptography. 
  • Sensitivity to the challenges of standardisation and technological anticipation. 

Tarif

2440 €
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
2440 €
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.