Skip to main content
Registration
Opened
 - 
Event dates
 - 
Location
Global or multi-regional
Training topics
Cybersecurity
Training type
Online instructor led
Languages
English
Tutors
  • Pedro Lopes
Coordinators
  • Daniel Nunes
  • Ghazi Mabrouk
Course level

Intermediate

Duration
20 hours
Event email contact
danielnunes@inatel.br
Price
$0.00

Event organizer(s)

Description

This 20-hour instructor-led online course is designed to equip government cybersecurity leaders, National Cybersecurity Bodies, and Critical Information Infrastructure Protection Managers with the knowledge needed to understand the quantum threat and transition to post-quantum cybersecurity.  

 The course will introduce the fundamental concepts of quantum communications, focusing on how quantum computing poses a serious risk to current cryptographic systems such as RSA and ECC. Participants will explore practical solutions for the post-quantum era, including Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). They will also learn how to develop a national roadmap for the transition to post-quantum cybersecurity, based on best practices from global standards and agencies like NIST.  

 By the end of the course, participants will be prepared to make informed decisions about securing critical systems in the face of quantum threats and developing policies to foster a thriving quantum ecosystem. 

 With the generous support of the Global Gateway initiative of the European Union, this course is offered for free for selected participants.  

This course is open for:  

  • Policymakers and government officials 
  • Regulators and other ICT professionals  
  • Critical Information Infrastructure Protection Managers. 

Members of the above-mentioned target population are invited to apply for the training if they meet the following criteria:  

  • Hold an undergraduate degree in a relevant field or have a minimum of three years of experience in the field if they do not hold a university degree.  
  • Possess a fluent level of English.  
  • Complete the application questionnaire and attach an up-to-date CV, a recommendation letter from their employer, or a motivation letter.  

Members of the above-mentioned target population from developing countries, particularly women, are encouraged to apply. Selection will be conducted by the course organizers, who will consider the above entry requirements along with an analysis of the application questionnaire and the recommendation/motivation letter of each applicant.  

Number of available places for the cohort: 30  

Upon completion of this course, participants will be able to:  

  1. Outline the concept of quantum computing and its potential impact on current cryptographic systems. 
  1. Identify the key differences between traditional cryptography and quantum-safe cryptography. 
  1. Explain the principles of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD).
  1. Describe the challenges and opportunities of building quantum communication networks for critical infrastructures. 
  1. Apply best practices and recommendations from NIST and other global agencies for developing a national roadmap for post-quantum cybersecurity.
  1. Examine the key policies needed to foster a quantum ecosystem, including research, talent development, and international collaboration. 

To achieve the training objectives described, the course content will be delivered using the online instructor-led methodology. Participants will be able to access the course online, offering flexibility and convenience. Live sessions will be conducted through the Zoom platform, facilitating direct interaction between instructors and participants as well as among the participants themselves.  

As part of the course methodology, mandatory pre-reading materials for each topic will be made available and must be completed before the course. 

The course consists of five live sessions, each structured into: 

  • 1h45 of live interactive session led by subject-matter experts 
  • 15-minute coffee break 
  • 1 hour of guided group discussion (in breakout rooms with moderator prompts) 

Each session combines lectures, visual case studies, real-world examples, and collaborative group work to stimulate critical thinking and practical application of concepts. 

This approach promotes real-time discussions, group work, and instant feedback, maintaining a dynamic and interactive learning environment.  

The live lecture will take place as per the schedule below:   

  • Live session one: March 30, 2026, 1:00 PM CEST  
  • Live session two: April 1, 2026, 1:00 PM CEST 
  • Live session three: April 3, 2026, 1:00 PM CEST 
  • Live session four: April 6, 2026, 1:00 PM CEST 
  • Live session five: April 8, 2026, 1:00 PM CEST 

The assessment and grading methodology will include:   

  • An individual assignment submission: 40%
  • A final multiple-choice quiz of 20 questions: 40%
  • Active participation in the live lectures: 20%

A total score of 70% or higher is required to obtain the ITU certificate.  

Session 1: Introduction to the Quantum Threat 

Key Topics: 

  • What is quantum computing? 
  • Key differences between classical and quantum computing 
  • How quantum computing poses a risk to RSA and ECC encryption 
  • The need for quantum-safe cryptographic systems 

Learning Outcomes: 

  • Outline the basic principles of quantum computing and its impact on classical cryptographic systems. 
  • Identify the cryptographic systems vulnerable to quantum computing, including RSA and ECC. 
  • Explain why quantum computing represents a significant threat to current cybersecurity infrastructure. 
Session 2: Solutions for the post-Quantum Era 

Key Topics: 

  • Introduction to Post-Quantum Cryptography (PQC) 
  • Key algorithms for post-quantum cryptography 
  • Overview of Quantum Key Distribution (QKD) 
  • Comparison between PQC and QKD: strengths and limitations 

Learning Outcomes: 

  • Explain the principles of PQC and QKD. 
  • Describe the key algorithms used in PQC and how they differ from current cryptographic systems. 
  • Compare the advantages and limitations of PQC and QKD in post-quantum cybersecurity. 
Session 3: Building Quantum Communication Networks (QKD) 

Key Topics: 

  • What is Quantum Key Distribution (QKD)? 
  • Use cases for QKD in protecting critical infrastructures 
  • Technical and financial challenges of implementing QKD 
  • Future scalability and integration with current systems 

Learning Outcomes: 

  • Examine the concept and applications of QKD for securing communications. 
  • Analyze the challenges and costs associated with implementing QKD in critical infrastructures. 
  • Describe real-world use cases where QKD can enhance cybersecurity in sectors such as energy, finance, and government. 
Session 4: Developing a National Transition Roadmap 

Key Topics: 

  • National and international efforts to prepare for post-quantum cybersecurity 
  • Steps recommended by NIST and other agencies for developing a transition roadmap 
  • Inventory of critical systems and planning for migration 
  • Standardization and policy coordination for post-quantum cybersecurity 

Learning Outcomes: 

  • Apply best practices from NIST and other agencies to develop a transition roadmap for post-quantum cybersecurity. 
  • Evaluate the steps involved in identifying and securing critical systems. 
  • Create a basic framework for planning and executing the migration to post-quantum cybersecurity standards. 
Session 5: Policies to Foster a Quantum Ecosystem 

Key Topics: 

  • The role of government policies in supporting quantum research and development 
  • Incentives for talent development and workforce training in quantum technologies 
  • International collaboration and global standards in quantum cybersecurity 
  • Building a national quantum strategy 

Learning Outcomes: 

  • Summarize the importance of policy in developing a quantum ecosystem. 
  • Analyze the key elements of a national quantum strategy, including research, talent development, and collaboration. 
  • Propose policies that can foster a thriving quantum ecosystem, supporting national and international cybersecurity efforts. 

Course end: Project and knowledge assessment

  • End course individual assignment 
  • Final course test  

Tutors

Pedro Lopes

Registration information

Unless specified otherwise, all ITU Academy training courses are open to all interested professionals, irrespective of their race, ethnicity, age, gender, religion, economic status and other diverse backgrounds. We strongly encourage registrations from female participants, and participants from developing countries. This includes least developed countries, small island developing states and landlocked developing countries.

Related documentation and links
Share in