Description:

Quantum computers are no longer a distant theoretical concept—they represent an existential threat to our current global security infrastructure. Cryptographic systems like RSA and ECC, which protect everything from financial transactions to government secrets, are vulnerable to being broken by sufficiently powerful quantum machines through algorithms like Shor's.

The time to prepare is now. With nation-states actively engaging in "Harvest Now, Decrypt Later" (HNDL) tactics, data captured today could be exposed years from now.

This training course is designed to equip IT professionals, network engineers, CISOs, policymakers, and technical decision-makers with the practical knowledge needed to navigate this critical transition and secure their organization's future.

 

Why register for this course:

By the end of this comprehensive training, you will be able to:

  • Understand the imminent threat horizon posed by quantum computing and differentiate between "quantum-safe," "post-quantum," and "quantum-resistant" solutions;
  • Evaluate and compare mitigation options, including the pros and cons of Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and hybrid approaches;
  • Identify actionable steps your organization can take today, such as conducting a crypto inventory, classifying sensitive data, and starting proofs-of-concept (PoCs) with PQC-capable systems;
  • Navigate the complex landscape of standardization and regulation, understanding key timelines from bodies like NIST, ETSI, and regulatory pressures such as NIS2 and US Executive Orders;
  • Develop a clear, risk-based migration strategy for integrating new security protocols into existing infrastructure (TLS, IPsec, SSH) and managing vendor discussions (Cisco, Juniper, Fortinet).

 

Who should participate:

This course is ideally suited for:

  • IT security professionals looking to future-proof their networks;
  • Network engineers responsible for infrastructure design and maintenance;
  • CISOs and technical decision-makers setting security policy and strategy;
  • Policymakers and compliance officers needing to understand upcoming regulatory requirements.

Basic prior knowledge of cryptography or cybersecurity concepts is recommended.

 

Course outline:

  1. Introduction to Quantum-Safe Security
  2. The Quantum Threat Landscape
  3. Cryptography Primer
  4. Mitigation Options
  5. Integration with Existing Infrastructure
  6. Implementation Timeline
  7. What You Can Do Today
  8. Wrap-up & Resources

 

F.A.Q

Frequently Asked Questions

  • All of our training courses begin at 9:30 and end around 17:30.

    The detailed agenda is as follows:

    09:00 - 09:30: Arrival and welcome coffee
    09:30 - 11:00: First Session
    11:00 - 11:30: Coffee Break
    11:30 - 13:00: Second Session
    13:00 - 14:00: Lunch
    14:00 - 15:30: Third Session
    15:30 - 16:00: Coffee Break
    16:00 - 17:30: Fourth Session
    17:30: End

    The schedule might change slightly to accommodate prayer times or other local needs.

  • You need a laptop capable of connecting to the Internet, and a web browser. The laptop is needed for the lab exercises.

    An iPad or tablet would also work, but it's not recommended.

  • Lunch is included, and it is usually a buffet lunch. The time allocated is one hour (13:00 to 14:00), so there is also time in the break to check your e-mail or make a few phone calls.

    If you have special dietary requirements, you can let us know when you register.

    There are also two coffee breaks of 30 minutes each. One in the morning and one in the afternoon.

  • It is required to individually register on the website and register for the specified course. It is however possible to request one single invoice by e-mailing us at support@glevia.ch and explaining which registrations would need to go under a single invoice.

  • Our preference is for face to face courses. This is because with physical preference, learning capacity is boosted, and there is more focus on the course itself. Online courses are possible, and we propose them from time to time. If you'd like to have a specific course delivered online, please let us know, and we will be happy to discuss how to accommodate it.

  • Yes, this is possible. Send us an e-mail at info@glevia.ch and we will be happy to assist you with this.

  • If you have any additional question, feel free to write to info@glevia.ch and we will be happy to answer them.