+254 721 331 808    training@upskilldevelopment.com

Quantum-Safe Cryptography and Post-Quantum Security Course

NOTE: To view the training dates and registration button clearly put your mobile phone, tablet on landscape layout. Thank you

Online Training Registration

Training Mode Platform Fee Enroll
Online Training Zoom/ Google Meet 1,740USD Register

Classroom/On-site Training Schedule

Course Date Location Fee Enroll
08/06/2026 to 19/06/2026 Nairobi 2,900 USD Register
13/07/2026 to 24/07/2026 Nairobi 2,900 USD Register
13/07/2026 to 24/07/2026 Mombasa 3,400 USD Register
10/08/2026 to 21/08/2026 Nairobi 2,900 USD Register
10/08/2026 to 21/08/2026 Mombasa 3,400 USD Register
14/09/2026 to 25/09/2026 Nairobi 2,900 USD Register
14/09/2026 to 25/09/2026 Mombasa 3,400 USD Register
12/10/2026 to 23/10/2026 Nairobi 2,900 USD Register
09/11/2026 to 20/11/2026 Nairobi 2,900 USD Register
09/11/2026 to 20/11/2026 Mombasa 3,400 USD Register
07/12/2026 to 18/12/2026 Nairobi 2,900 USD Register
14/12/2026 to 25/12/2026 Mombasa 3,400 USD Register

Course Introduction

The rapid advancement of quantum computing presents both revolutionary opportunities and unprecedented risks to current digital security frameworks. Traditional encryption methods, once considered unbreakable, are now vulnerable to quantum algorithms, creating urgent demand for new protective measures.

Quantum-safe cryptography, also known as post-quantum cryptography, represents the next frontier in securing sensitive data against future quantum-enabled attacks. This course equips participants with both theoretical foundations and hands-on applications to understand, evaluate, and implement quantum-resistant solutions.

The training explores the principles of quantum computing and how algorithms like Shor’s and Grover’s threaten existing RSA, ECC, and symmetric cryptography. Learners will study emerging post-quantum cryptographic algorithms and international initiatives for secure standardization.

Participants will gain practical exposure to cryptographic migration strategies, risk assessments, and the deployment of hybrid systems that combine classical and post-quantum methods. Industry-driven case studies will illustrate practical implementation challenges and futureproofing techniques.

Emerging topics, such as quantum key distribution (QKD), homomorphic encryption, and blockchain security in the post-quantum era, will also be covered to ensure learners understand cutting-edge security applications.

By completing this course, participants will be prepared to address the complex challenges of the quantum era, ensuring resilience and compliance with global standards in digital security and data protection.

Who Should Attend

  • Cybersecurity professionals safeguarding sensitive networks and data.
  • IT managers overseeing enterprise digital security infrastructures.
  • Government security agencies protecting classified and critical data.
  • Banking and financial sector professionals responsible for transaction security.
  • Telecommunication experts securing communication channels.
  • Cryptography researchers exploring emerging quantum-safe methods.
  • Software developers integrating cryptographic functions in systems.
  • Risk management and compliance officers in data-sensitive industries.
  • Academia and educators teaching cryptography and security.
  • Military and defense personnel responsible for strategic information security.
  • Blockchain and fintech innovators building futureproof systems.
  • Cloud service providers and architects designing secure environments.

Duration

10 days

Course Objectives

  • Understand the fundamentals of quantum computing and its implications on cryptographic security.
  • Analyze vulnerabilities in current cryptographic systems against quantum algorithms like Shor’s and Grover’s.
  • Explore the principles, strengths, and limitations of post-quantum cryptographic algorithms.
  • Gain practical skills in implementing lattice-based, hash-based, code-based, and multivariate cryptography.
  • Learn strategies for cryptographic migration and hybrid deployment models to ensure continuity.
  • Assess risk frameworks for quantum threats and their impact on critical infrastructure systems.
  • Examine global standardization efforts, such as NIST’s Post-Quantum Cryptography project.
  • Understand applications of quantum key distribution (QKD) in secure communications.
  • Explore post-quantum security considerations for blockchain, fintech, and IoT systems.
  • Apply homomorphic encryption and advanced methods for securing sensitive computations.
  • Develop policies for compliance and governance in post-quantum cryptographic adoption.
  • Build practical readiness to implement and scale quantum-safe security solutions in organizations.

Comprehensive Course Outline

Module 1: Introduction to Quantum Computing and Security

  • Principles of quantum mechanics in computing.
  • Quantum algorithms relevant to cryptography.
  • Threat landscape of quantum-enabled attacks.
  • Importance of quantum-safe strategies.

Module 2: Current Cryptographic Systems Under Threat

  • RSA and ECC vulnerabilities.
  • Symmetric key cryptography risks.
  • Case studies of potential quantum breaches.
  • Limitations of traditional approaches.

Module 3: Fundamentals of Post-Quantum Cryptography

  • Definition and principles of PQC.
  • NIST PQC standardization process.
  • Overview of candidate algorithms.
  • Comparative analysis of approaches.

Module 4: Lattice-Based Cryptography

  • Principles and mathematics of lattices.
  • Key lattice-based algorithms.
  • Advantages and security considerations.
  • Practical demonstrations.

Module 5: Code-Based Cryptography

  • History and theoretical foundations.
  • McEliece cryptosystem.
  • Strengths and implementation challenges.
  • Use cases in secure applications.

Module 6: Hash-Based Cryptography

  • Merkle tree signatures.
  • Stateful vs stateless hash-based systems.
  • Security benefits of hash approaches.
  • Implementation techniques.

Module 7: Multivariate Cryptography

  • Principles of multivariate polynomials.
  • Signature schemes and encryption.
  • Performance trade-offs.
  • Real-world adoption prospects.

Module 8: Hybrid Cryptographic Systems

  • Combining classical and PQC approaches.
  • Practical deployment considerations.
  • Transition strategies for organizations.
  • Case studies of hybrid systems.

Module 9: Cryptographic Migration Strategies

  • Steps for organizational readiness.
  • Infrastructure assessment.
  • Migration roadmaps and best practices.
  • Risk mitigation strategies.

Module 10: Quantum Key Distribution (QKD)

  • Principles of QKD.
  • Protocols like BB84 and E91.
  • Hardware and network requirements.
  • Future adoption challenges.

Module 11: Blockchain and Post-Quantum Security

  • Threats to blockchain from quantum computing.
  • Quantum-safe consensus mechanisms.
  • PQC integration in cryptocurrencies.
  • Secure smart contracts.

Module 12: Homomorphic Encryption and Advanced Methods

  • Fully homomorphic encryption principles.
  • Secure computation on encrypted data.
  • Post-quantum homomorphic models.
  • Applications in finance and healthcare.

Module 13: Risk Management for Quantum Threats

  • Frameworks for risk assessment.
  • Identifying critical vulnerabilities.
  • Quantifying potential quantum risks.
  • Security incident planning.

Module 14: Governance, Policy, and Compliance

  • Global policy frameworks on PQC.
  • Legal implications of quantum threats.
  • Organizational governance strategies.
  • Ensuring compliance readiness.

Module 15: Emerging Trends in Post-Quantum Security

  • Cloud security in a quantum era.
  • AI-assisted quantum-safe cryptography.
  • IoT security with PQC integration.
  • Future research directions.

Module 16: Project – Designing Quantum-Safe Solutions

  • Develop organizational PQC roadmap.
  • Implement hybrid cryptographic systems.
  • Secure blockchain or IoT case study.
  • Presentation of capstone findings.

Training Approach

This course will be delivered by our skilled trainers who have vast knowledge and experience as expert professionals in the fields. The course is taught in English and through a mix of theory, practical activities, group discussion and case studies. Course manuals and additional training materials will be provided to the participants upon completion of the training

Tailor-Made Course

This course can also be tailor-made to meet organization requirement. For further inquiries, please contact us on: Email: training@upskilldevelopment.com Tel: +254 721 331 808

Training Venue

The training will be held at our Upskill Training Centre. We also offer training for a group at requested location all over the world. The course fee covers the course tuition, training materials, two break refreshments, and buffet lunch.

Visa application, travel expenses, airport transfers, dinners, accommodation, insurance, and other personal expenses are catered by the participant

Certification

Participants will be issued with Upskill certificate upon completion of this course.

Airport Pickup and Accommodation

Airport pickup and accommodation is arranged upon request. For booking contact our Training Coordinator through Email: training@upskilldevelopment.com, +254 721 331 808

Terms of Payment

Unless otherwise agreed between the two parties payment of the course fee should be done 3 working days before commencement of the training so as to enable us to prepare better.

Online Training Registration

Training Mode Platform Fee Enroll
Online Training Zoom/ Google Meet 1,740USD Register

Classroom/On-site Training Schedule

Course Date Location Fee Enroll
08/06/2026 to 19/06/2026 Nairobi 2,900 USD Register
13/07/2026 to 24/07/2026 Nairobi 2,900 USD Register
13/07/2026 to 24/07/2026 Mombasa 3,400 USD Register
10/08/2026 to 21/08/2026 Nairobi 2,900 USD Register
10/08/2026 to 21/08/2026 Mombasa 3,400 USD Register
14/09/2026 to 25/09/2026 Nairobi 2,900 USD Register
14/09/2026 to 25/09/2026 Mombasa 3,400 USD Register
12/10/2026 to 23/10/2026 Nairobi 2,900 USD Register
09/11/2026 to 20/11/2026 Nairobi 2,900 USD Register
09/11/2026 to 20/11/2026 Mombasa 3,400 USD Register
07/12/2026 to 18/12/2026 Nairobi 2,900 USD Register
14/12/2026 to 25/12/2026 Mombasa 3,400 USD Register

Some of Our Recent Clients

Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses
Professional capacity building short courses

Training that focuses on providing skills for work?

We support the development of a skilled and confident workforce to meet the changing demands of growing sectors by offering the best possible training to enable them to fulfil learning goals.

Make a Mark in You Day to Day work