Quantum Cybersecurity Essentials
Designed for security-minded professionals, this course starts with a recap of qubits and hardware and then dives into quantum-specific threats and defences:
- Quantum computing and algorithms that break today’s crypto – Understand how Shor’s algorithm factors large integers and how Grover’s search speeds up symmetric-key attacks, explaining why RSA is at risk.
- Post-Quantum Cryptography (PQC) – Review NIST, and migration timelines.
- Quantum Key Distribution (QKD) – See how QKD establishes keys with information-theoretic security, when it is practical and how it integrates with existing networks.
- Transitioning to quantum-safe infrastructure – Learn first steps for crypto-inventory, hybrid deployments and building crypto-agility into future systems.
Content
- Qubits & Quantum hardware; Shor’s and Grover’s algorithms
- Post-Quantum Cryptography – standards, scheme families
- Quantum Key Distribution – working principles, use cases, integration
- Roadmap to quantum-safe infrastructure – risk assessment, hybrid roll-out, crypto-agility
Learning Outcomes
Upon completion of this course, learners will be able to:
- Summarize how Shor’s and Grover’s algorithms undermine today’s RSA certain symmetric-key schemes.
- Differentiate the main families of post-quantum cryptography and identify the NIST-standardized algorithms.
- Explain how quantum key distribution (QKD) establishes keys and recognize network scenarios where QKD offers a clear advantage.
- Assess which assets are vulnerable to “harvest-now, decrypt-later” attacks and other quantum-era threats.
- Outline a roadmap to quantum-safe infrastructure, including crypto inventory, hybrid deployments and steps toward long-term crypto-agility.
Training Method
Interactive lectures with visual aids, short hands-on exercises, small-group discussions, and a brief end recap to check understanding. Participants will also benefit from practical insights, advice, and real-world expertise shared by quantum technology specialists from LuxQuantum.
Certification
Certificate of ParticipationPrerequisites
There are no prerequisites.
Planning and location
09:00 - 12:30
Your trainer(s) for this course
Samira Chaychi
View all their courses.Samira Chaychi, co-founder and technical lead at LuxQuantum, holds a PhD in Computer Science from the University of Luxembourg, where she pioneered proactive computing for robotic systems.
With more than ten years in R&D, she has deep expertise in software development, high performance computing, cryptography and data science - and now applies her skills to advance secure quantum communication protocols that promise unbreakable encryption over global networks. Her blend of technical vision and strong project-management expertise drives LuxQuantum’s innovation forward.
Sharif Shahini
View all their courses.Sharif Shahini is a physicist and materials scientist with a solid foundation in academic research and entrepreneurship. He holds a PhD in Physics from the University of Luxembourg and two MSc degrees in Physics and Materials Science & Engineering from Sorbonne University and Sharif
University of Technology.
With expertise in condensed matter physics, optics, quantum materials, and nanotechnology, Sharif's diverse educational background fuels his innovative approach to science and technology.
As the co-founder of LuxQuantum, he leads efforts to advance quantum cryptography technologies, focusing on bridging gaps in quantum technology interoperability.