Leader in the cybersecurity training sector.

Security of quantum systems

Satisfaction rate
4.5
Success rate
4.9

Anticipating cyber-risks and post-quantum changes 

The target audience for training

  • CISOs, security architects, technical or innovation managers. 
  • Cybersecurity consultants, technical auditors. 
  • Cryptography experts or critical infrastructure administrators. 

What you will learn

  • Understanding fundamental principles of quantum computing and their impact on information systems. 
  • Identify emerging cyber risks linked to quantum computing power. 
  • Understand the implications for asymmetric and symmetric cryptography. 
  • Knowing the post-quantum protocols and algorithms in the process of being standardised (NIST, ANSSI, ETSI). 
  • Develop a roadmap for the transition to post-quantum security. 

Training programme

  • Introduction Quantum computing, state of the art, technological breakthroughs
    • Module 1 Quantum impact on classical cryptography (RSA, ECC, AES)
    • Module 2 Post-quantum algorithms (lattice, hash-based, code-based, etc.)
    • Module 3 Standards and industry issues: NIST PQC, ETSI, ANSSI
    • Module 4 : Planning a migration: risk analysis and roadmap
  • Final workshop Case study of a company facing a PQC transition
  • Debriefing, MCQs and closing

Assessment procedures

  • MCQ to validate prior learning (20 questions). 
  • Collective case study with feedback on the proposed areas for change. 

Teaching methods

  • Training led by a cybersecurity and quantum expert. 
  • Detailed course support with diagrams, technical references, standards watch. 
  • Collaborative case study based on a realistic scenario (migration of a banking infrastructure). 
  • Technical bibliography and strategic intelligence provided. 

Training objectives

At the end of the day, participants will be able to : 

  • Explain the basics of quantum computing and the threats it poses to current cryptography. 
  • Identify the types of data and systems vulnerable to quantum attacks. 
  • Analyse the challenges of migrating to post-quantum solutions. 
  • Evaluate the main families of post-quantum algorithms proposed by NIST. 
  • Design a monitoring and anticipation strategy tailored to their technical environment. 

Training prerequisites

  • Good general knowledge of cybersecurity and cryptography. 
  • Sensitivity to the challenges of standardisation and technological anticipation. 

Tarif

2440 €
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
2440 €
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Demande d’information

Je souhaite obtenir plus d'informations sur vos formations.
ACG CyberAcademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.
* Pour en savoir plus et exercer vos droits, consultez notre Politique Vie privée.

Demande d’information

Je souhaite obtenir plus d'informations sur vos formations.
ACG CyberAcademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.
* Pour en savoir plus et exercer vos droits, consultez notre Politique Vie privée.