Security of quantum systems
Satisfaction rate
4.5
Success rate
4.9
Anticipating cyber-risks and post-quantum changes
The target audience for training
- CISOs, security architects, technical or innovation managers.
- Cybersecurity consultants, technical auditors.
- Cryptography experts or critical infrastructure administrators.
What you will learn
- Understanding fundamental principles of quantum computing and their impact on information systems.
- Identify emerging cyber risks linked to quantum computing power.
- Understand the implications for asymmetric and symmetric cryptography.
- Knowing the post-quantum protocols and algorithms in the process of being standardised (NIST, ANSSI, ETSI).
- Develop a roadmap for the transition to post-quantum security.
Training programme
- Duration: 1 day
- Introduction Quantum computing, state of the art, technological breakthroughs
- Module 1 Quantum impact on classical cryptography (RSA, ECC, AES)
- Module 2 Post-quantum algorithms (lattice, hash-based, code-based, etc.)
- Module 3 Standards and industry issues: NIST PQC, ETSI, ANSSI
- Module 4 : Planning a migration: risk analysis and roadmap
- Final workshop Case study of a company facing a PQC transition
- Debriefing, MCQs and closing
Assessment procedures
- MCQ to validate prior learning (20 questions).
- Collective case study with feedback on the proposed areas for change.
Teaching methods
- Training led by a cybersecurity and quantum expert.
- Detailed course support with diagrams, technical references, standards watch.
- Collaborative case study based on a realistic scenario (migration of a banking infrastructure).
- Technical bibliography and strategic intelligence provided.
Training objectives
At the end of the day, participants will be able to :
- Explain the basics of quantum computing and the threats it poses to current cryptography.
- Identify the types of data and systems vulnerable to quantum attacks.
- Analyse the challenges of migrating to post-quantum solutions.
- Evaluate the main families of post-quantum algorithms proposed by NIST.
- Design a monitoring and anticipation strategy tailored to their technical environment.
Training prerequisites
- Good general knowledge of cybersecurity and cryptography.
- Sensitivity to the challenges of standardisation and technological anticipation.
Tarif
- 2440 €
- Language : French
- Level : Fundamental
- Certification body : ACG CYBERACADEMY
- Certification: No
- Accessibility : Yes
- Duration: 1 day
Important information:
Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).