Introduction to Quantum Computing Express Course

Preparing for the Quantum Era
This course offers a practical introduction to quantum computing—how it works, where the technology is headed, and the steps organizations should take today to prepare for the opportunities and security challenges of the quantum era.
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | CPE CREDITS: 0.5 | FOCUS AREA: CYBERSECURITY LEADERSHIP | PROFICIENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Product Details
Quantum computing is rapidly advancing and has the potential to revolutionize problem-solving by processing complex, interconnected data in ways classical computers cannot. This emerging technology also poses novel risks to today’s cryptographic systems. This course provides a clear, practical overview of how quantum computing works, where it is headed and what steps organizations should take to prepare for quantum-era threats.
Learning Experience:
- Audio and text-based content
- Check your understanding questions
- Validation of completion
- 24/7/365 technical support
Who Will Benefit
This course is designed for cybersecurity professionals interested in expanding their knowledge of emerging technologies and strategic security considerations for program development and implementation. No prerequisite knowledge is required.
Key Topics
- Quantum computing
- Emerging technologies and risk
- Cybersecurity leadership
- Secure operations
Learning Outcomes
- Explain the fundamental principles of quantum computing
- Identify the potential applications and challenges of quantum computing
- Assess the implications of quantum computing for cybersecurity and organizational readiness
Benefits
- Learn to make informed, future-ready decisions by understanding both the opportunities and security risks of quantum computing—before they become urgent
- Gain expertise in emerging cybersecurity topics
- Participate in activities centered on real-world applications
- Earn CPE credits
Program Completion
Learners have 60 days from the date of purchase to complete the entire course. Those who successfully complete this course will receive a digital Validation of Completion and earn continuing professional education (CPE) credits. We recommend that you download and retain the Validation of Completion for your personal records.
To receive a Validation of Completion and earn CPE credits, learners must:- Complete the learning experience
- Complete the learning experience evaluation
Credit Info
| CPE Credits | Group A | 0.5 |
| Field of Study | Cybersecurity Leadership | |
| Level | Foundational | |
| Prerequisites | No prerequisite knowledge is required. | |
| Access | Online | This is a digital product. The content will be available up to 60 days after purchase date. |
For more information, please refer to the ISC2 Certification Maintenance Handbook for additional CPE requirement details.
CPE Credit Reporting
CPE credits earned from this learning experience will automatically be reported for ISC2 credentials on the first day of every month. Please allow up to 10 business days for processing.
CPE credits earned for this learning experience may also be eligible for continuing professional education credits for non-ISC2 certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.
For questions related to ISC2 CPE credits or the CPE portal not covered in the handbook, please contact us via our online form.
Group Ordering for Your Team
To purchase this course for someone or inquire about team discounts, please contact your regional office:
| Americas +1.866.331.4722 teamtraining@isc2.org |
EMEA +44.203.960.7800 teamtraining@isc2.org |
Asia-Pacific +852.5803.5662 teamtraining@isc2.org |
Delivery
A stable internet connection is required. To record your completion of the online learning experience, please ensure you are connected to the internet at all times.
Cancellation Policy
Refunds are not provided for ISC2 learning experiences.
Related Content

Building a Digital Forensics and Incident Response (DFIR) Program
Learn More
Building a Strong Culture of Security: Implementing and Reviewing SETA Programs
Learn More
Cloud Security for Business Leaders
Learn More
Gaining Support for your Security Program
Learn More
Translating Cyber Risk into Business Language for Effective Leadership
Learn More