Training

Cybersecurity

00
days
00
hours
00
minutes
coding person

Take advantage of free training through our company scolarships by registering before 25 June*

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Selection of a file by our admissions team

Training

Cybersecurity

00
days
00
hours
00
minutes
coding person

Benefit from our company scholarships: take advantage of free training by registering before 25 June

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Comprehensive cyber security training

+605% of cyber attacks

In 2021 compared to early 2020.
With the advent of teleworking and the decentralisation of IT systems, more and more companies and individuals are falling victim to cyber attacks: learn how to preventthem and acquire the best practices to protect your infrastructures.

Raising awareness & democratising

Cybersecurity? Technical skills accessible to all! Enter this universe to understand its functioning and all the good reflexes of an ethical hacker. Thanks to this complete training, you will be able to understand the flaws of a system to better resolve them.

Cybersecurity training curriculum

The class wakes up! In this first module, we will introduce the first important concepts to know in cybersecurity. You will learn how to use the CIA Triad model , the Defense-in-Depth and OWASP to shape your mind around security. We will then attack the Networking part where you will understand how a network of machines works and how to use it via shell commands and Vim .
The first step in protecting your company is to assess the risks it faces. We will therefore see how a cybersecurity team is organised in SOCs (Security Operations Centers), how it can assess the risk and prevent possible threats. You will also see how to gather information on a potential target using Nmap and how to protect them via VPNs and Proxies.
Now that you know how to gather information about a target, you can exploit it! In this module, you will see how to perform Penetration Testings via msfconsole. You will learn how to exploit vulnerabilities in a system by exploiting known vulnerabilities like Bluekeep. You will see how to take advantage of human vulnerabilities through Social Engineering techniques and how backdoors are installed allowing hackers to exploit a system without being detected. Finally, you will see how to defend yourself against these attacks with URL recognition, encryption and patching.
A website is a common tool for any organisation that wants to make itself known. It has therefore become a source of potential attacks. That is why in this module we will cover everything related to the exploitation of vulnerabilities in a website. We will see the injection of SQL commands and Javascript code to take control of or extract information from a server and how to protect against it. We will also see how to hack Wifi networks to carry out Man in the Middle attacks and recover sensitive information. 
From this module, you will have a solid knowledge of the potential vulnerabilities of a system and how to protect yourself against them. Therefore, you will now learn how to set up a monitoring system to detect flaws according to the level of compliance that your organisation wishes to maintain. We will therefore look at the use of tools such as splunk, the organisation of CSIRTs and the different levels of compliance such as NIST, ISO/IEC 27000 or GDPR.
To complete your training, you will use all your knowledge of cybersecurity to assess the infrastructure of a company of your choice or a Jedha partner. You will attempt to detect potential vulnerabilities and present a report to the rest of your class.
Cybersecurity & networking
Module 1
plus sign
Risk management
Module 2
plus sign
Exploitation of vulnerabilities
Module 3
plus sign
Website penetration
Module 4
plus sign
Risk monitoring
Module 5
plus sign
Cybersecurity Project
Module 6
plus sign
Download the complete syllabus

Free cybersecurity training with our scholarships

company consulting cybersecurity

Advanced cybersecurity skills

We will cover all the main vulnerabilities that an organisation can be exposed to so that you can respond to them in the best possible way.
If youregister before 25 June and your application is selected, you will be able to benefit from free training!

bank sme cybersecurity

CPF Cybersecurity Training

Our training is delivered in part-time and full-time, face-to-face or remote, so you can follow it whenever you want: enjoy a unique learning experience.
Jedha's Cybersecurity Essentials training is also CPF-financed.

cybel angel logo

Recognition of specialised companies

The best way to learn about cybersecurity is to try to penetrate systems! From operating systems to malware exploitation, you will learn all the hackers' techniques to better protect your organisation.

Join our
Cybersecurity training!

By applying before 25 June and if your application is selected by our admissions team, you will be able to benefit from free training sponsored by our partner companies. You will discuss your professional project and the advanced skills you will obtain in this training. Career, financing, project, you will receive the best advice from our admissions team.

Discuss with the admissions team
cybersecurity training

Cybersecurity: a key issue for companies

More and more, companies and individuals are realising the importance of protecting their infrastructure. Discover on our blog complete articles on cybersecurity, its professions and its tools.

Career
Cybersecurity professions
Protecting data has become a key issue for any company. But who are the people behind all these missions? Find out here about the various cybersecurity professions.
Increase your skills
What is Cybersecurity?
Why is cybersecurity essential to any organisation? What are the challenges? What are the jobs related to cybersecurity? Answer in this full article.