Skip to main content
Registration
Coming soon
 - 
Event dates
 - 
Location
The Americas
,

San José
Costa Rica

Training topics
Cybersecurity
Training type
Face to Face
Languages
Spanish
Coordinators
  • Daniel Nunes
Course level

Intermediate

Duration
40 hours
Event email contact
danielnunes@inatel.br
Price
$0

Event Organizer(s)

Description

This 40‑hour theoretical with case studies course will introduce the fundamental concepts of quantum communications, focusing on how quantum computing poses a serious risk to current cryptographic systems such as RSA and ECC. Participants will explore practical solutions for the post-quantum era, including Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). They will also learn how to develop a roadmap for the transition to post-quantum cybersecurity, based on best practices from global standards and agencies like NIST. By the end of the course, participants will be prepared to make informed decisions about securing critical systems in the face of quantum threats and developing policies to foster a thriving quantum ecosystem.

This training will be held in San Jose, Costa Rica on 29 June 2026 - 03 July 2026. The first edition of this training (Group 1) is also scheduled on 22 June 2026 to 26 June 2026. We request that you apply to one as duplicate applications will not be considered.

This course is intended for:

  • Cybersecurity professionals;
  • Cryptography and PKI engineers;
  • Telecom and network engineers;
  • Technology leaders and enterprise architects;
  • Technical staff from operators, vendors, and system integrators.

Participants should have:

  • Foundational knowledge of cryptography;
  • Basic understanding of networking or communications systems;
  • General cybersecurity literacy;
  • No prior quantum computing background required.
     

The number of available places is limited to 30 in this course (15 for each group).

22/06/2026 – 26/06/2026 (Group 1)
29/06/2026 – 03/07/2026 (Group 2)

Upon completion of this course, participants will be able to:

  • Outline the concept of quantum computing and its potential impact on current cryptographic systems;
  • Identify the key differences between traditional cryptography and quantum-safe cryptography;
  • Explain the principles of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD);
  • Describe the challenges and opportunities of building quantum communication networks for critical infrastructures;
  • Apply best practices and recommendations from NIST and other global agencies for developing a national roadmap for post-quantum cybersecurity;
  • Examine the key policies needed to foster a quantum ecosystem, including research, talent development, and international collaboration.

The course will be delivered in a Face-to-Face (F2F) format, combining instructor-led presentations with interactive discussions to foster an engaging learning environment. The instructor will introduce each topic through structured sessions, using real-world examples and case studies to enhance learning. Throughout the sessions, participants will be encouraged to actively participate by asking questions and engaging in open discussion. Also, debates will be facilitated to promote collaborative learning, allowing participants to explore the implications of the concepts shown during the course in their daily professional activities.

The assessment and grading methodology will include: 

  • 5 multiple-choice quizzes;
  • 1 Final test;
  • Active participation in the live lectures.
     

At the end of each day, participants will have approximately 30 minutes to complete a quiz with ten multiple-choice questions, each with five options, on the topics discussed that day. Participants will also take a final test with 20 questions to provide a more comprehensive assessment. The questions are evenly distributed across the four module topics, with five questions dedicated to each topic, ensuring thorough coverage. To enhance the variety and challenge, the quiz includes both Multiple Choice, Single Answer (MC-SA) and Multiple Choice, Multiple Answer (MC-MA) formats. Specifically, at least five out of the 20 questions are MC-MA, requiring the selection of multiple correct answers. Additionally, the order of the questions is randomized to prevent predictability and encourage a more robust evaluation of the students' understanding. The final test will be administered asynchronously with a deadline of seven days after the end of the training.
 

The grades will be distributed based on the following grading scale:

  • Quizzes (total of 50 questions) 40%
  • Final Test 40%
  • Active participation in the live lectures 20%


A total score of 70% or higher is required to obtain the ITU certificate.

Session 1 Introduction to the Quantum Threat

Focus: This session introduces the concept of quantum computing, its principles, and how it threatens the security of current public-key cryptography systems like RSA and ECC. It provides a foundational understanding of quantum computing for professionals with no background on the area. 

Key Topics:

  • What is quantum computing?
  • Key differences between classical and quantum computing
  • How quantum computing poses a risk to RSA and ECC encryption
  • The need for quantum-safe cryptographic systems

Session 2 Solutions for the post-Quantum Era

Focus: This session explores the two main approaches to post-quantum cybersecurity: Post-Quantum Cryptography (PQC), based on algorithms, and Quantum Key Distribution (QKD. Participants will gain an understanding of both methods' advantages and challenges.

Key Topics:

  • Introduction to Post-Quantum Cryptography (PQC)
  • Key algorithms for post-quantum cryptography
  • Overview of Quantum Key Distribution (QKD)
  • Comparison between PQC and QKD: strengths and limitations

Session 3 Building Quantum Communication Networks (QKD)

Focus: This session focuses on Quantum Key Distribution (QKD) as a critical element in building secure quantum communication networks. Participants will learn how QKD can be used to protect critical infrastructures like power grids, financial systems, and government communications, while addressing challenges and costs.

Key Topics:

  • What is Quantum Key Distribution (QKD)?
  • Use cases for QKD in protecting critical infrastructures
  • Technical and financial challenges of implementing QKD
  • Future scalability and integration with current systems

Session 4 Developing a National Transition Roadmap

Focus: This session discusses the steps necessary for governments to develop a national roadmap for the transition to post-quantum cybersecurity. It includes best practices and recommendations from NIST and other global agencies, along with strategies for migration planning and standardization. 

Key Topics:

  • National and international efforts to prepare for post-quantum cybersecurity
  • Steps recommended by NIST and other agencies for developing a transition roadmap
  • Inventory of critical systems and planning for migration
  • Standardization and policy coordination for post-quantum cybersecurity

Session 5 Policies to Foster a Quantum Ecosystem

Focus: This session examines the policies needed to foster a national quantum ecosystem. It covers incentives for research, talent development, and international collaboration to drive innovation in quantum communications and post-quantum cybersecurity. 

Key Topics:

  • The role of government policies in supporting quantum research and development
  • Incentives for talent development and workforce training in quantum technologies
  • International collaboration and global standards in quantum cybersecurity
  • Building a national quantum strategy

Registration information

Unless specified otherwise, all ITU Academy training courses are open to all interested professionals, irrespective of their race, ethnicity, age, gender, religion, economic status and other diverse backgrounds. We strongly encourage registrations from female participants, and participants from developing countries. This includes least developed countries, small island developing states and landlocked developing countries.

Related documentation and links
Share in