Training
Cybersecurity

Protect corporate infrastructures by learning the techniques of SOC Analysts and Hackers in a 40-hour part-time or full-time program.

header cybersecurity training jedha bootcamp

Why do this Cybersecurity training?

nyan cat

Become autonomous in Cybersecurity

We will cover all the main vulnerabilities that an organisation may be exposed to so that you can best respond to them.

Cybersecurity Fundamentals Training

Learn all the hacker techniques to protect your infrastructure from cyber-attacks in a 40-hour programme

Cyber security training CPF

Our training is delivered in part-time and full-time so that you can follow it regardless of your schedule.
Take advantage of this CPF-eligible training, you will also benefit from numerous financing possibilities

Cybersecurity training curriculum

The class wakes up! In this first module, we will introduce the first important concepts to know in cybersecurity. You will learn how to use the CIA Triad model , the Defense-in-Depth and OWASP to shape your mind around security. We will then attack the Networking part where you will understand how a network of machines works and how to use it via shell commands and Vim .
The class wakes up! In this first module, we will introduce the first important concepts to know in cybersecurity. You will learn how to use the CIA Triad model , the Defense-in-Depth and OWASP to shape your mind around security. We will then attack the Networking part where you will understand how a network of machines works and how to use it via shell commands and Vim .
The first step in protecting your company is to assess the risks it faces. We will therefore see how a cybersecurity team is organised in SOCs (Security Operations Centers), how it can assess the risk and prevent possible threats. You will also see how to gather information on a potential target using Nmap and how to protect them via VPNs and Proxies.
Now that you know how to gather information about a target, you can exploit it! In this module, you will see how to perform Penetration Testings via msfconsole. You will learn how to exploit vulnerabilities in a system by exploiting known vulnerabilities like Bluekeep. You will see how to take advantage of human vulnerabilities through Social Engineering techniques and how backdoors are installed allowing hackers to exploit a system without being detected. Finally, you will see how to defend yourself against these attacks with URL recognition, encryption and patching.
A website is a common tool for any organisation that wants to make itself known. It has therefore become a source of potential attacks. That is why in this module we will cover everything related to the exploitation of vulnerabilities in a website. We will see the injection of SQL commands and Javascript code to take control of or extract information from a server and how to protect against it. We will also see how to hack Wifi networks to carry out Man in the Middle attacks and recover sensitive information. 
From this module, you will have a solid knowledge of the potential vulnerabilities of a system and how to protect yourself against them. Therefore, you will now learn how to set up a monitoring system to detect flaws according to the level of compliance that your organisation wishes to maintain. We will therefore look at the use of tools such as splunk, the organisation of CSIRTs and the different levels of compliance such as NIST, ISO/IEC 27000 or GDPR.
To complete your training, you will use all your knowledge of cybersecurity to assess the infrastructure of a company of your choice or a Jedha partner. You will attempt to detect potential vulnerabilities and present a report to the rest of your class.
Module 1
plus sign
Risk management
Module 2
plus sign
Exploitation of vulnerabilities
Module 3
plus sign
Website penetration
Module 4
plus sign
Risk monitoring
Module 5
plus sign
Cybersecurity Project
Module 6
plus sign
Download the complete syllabus

Next sessions

Whatever your schedule, you will be able to find a suitable full or part-time training session.

Week End
25
Sep
13
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
7
available places
Only 2 places left!
Last place available !
Apply at
Full time
11
Oct
22
Oct
Monday to Friday 10am - 4pm
Monday to Friday 10am - 4pm
6
available places
Only 2 places left!
Last place available !
Apply at
Week End
25
Sep
13
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
7
available places
Only 2 places left!
Last place available !
Apply at
Full time
11
Oct
22
Oct
Monday to Friday 10am - 4pm
Monday to Friday 10am - 4pm
6
available places
Only 2 places left!
Last place available !
Apply at
sunny pattern

A free training course in
registering before June 25th!

If you register before 25 June and your application is selected, you will receive free training! Cybersecurity is a major issue for companies. They support Jedha in its efforts to democratise cybersecurity and its skills, and will sponsor this training for you.

Find out more about scholarships
qonto logo
mailinblack logo

The opportunities of the Cybersecurity training

Entrepreneurs, managers, employees, freelancers, the objective is to build professional opportunities for you.

Make an appointment with the team
Cybersecurity Consultant

It assists companies to take the first steps in building a secure infrastructure. It will therefore assess the existing situation and develop recommendations for improvement.

Cybersecurity Analyst

Cybersecurity analysis aims to detect vulnerabilities in a system to ensure that a company's data is protected.

Ethical Hacker

The Ethical Hacker, also called Pentester, is there to discover the flaws of a system by trying to hack it. The philosophy followed is: "the best defence is the attack".

Where do our alumni work after the training

After the Essentials Cybersecurity course, our alumni work in various sectors as Cybersecurity Consultants, Cybersecurity Analysts or Security Administrators

portrait emilien nory
portrait lucas brossierportrait delphine jean
portrait augustin lauvencourt
portrait marine gubler
portrait mouna bensouda
portrait wolfgang fernandez
portrait camille destombes
portrait marine barrier director of the Lyon campus
portrait bonnie naccacheportrait antoine guerrini

Cybersecurity news

In our blog, our alumni tell you how they were recruited, how they set up their project. We also provide resources to learn more about the field of Cybersecurity, the possibilities of financing the training as well as the opinions of our professors and teaching teams.

Go to the blog
Data theme

Data and Cybersecurity: two complementary sectors

David, cybersecurity analyst at CybelAngel! Here he explains the main issues of cybersecurity, the links between data and cybersecurity and cybersecurity training.
Career

Cybersecurity professions

Protecting data has become a key issue for any company. But who are the people behind all these missions? Find out here about the various cybersecurity professions.
Data theme

Increase your skills

What is Cybersecurity?

Why is cybersecurity essential to any organisation? What are the challenges? What are the jobs related to cybersecurity? Answer in this full article.

Part-time - Weekend
10:00
Course Review
We start the day by reviewing the previous day's concepts to make sure everything is in place before we start working on new content.
10:15
Course Content
Let's start the concept of the day with the teaching team who will take you step by step. You will be able to ask all your questions and progress at your own pace. 
12:00
Practice
Apply the concepts you have just seen to simple exercises. This will allow you to see the direct application cases and to grasp the technical mechanisms.
13:30
Challenges
Once you have been able to practice the theoretical concepts on simple exercises, it's time for the Cybersecurity challenges! Most of the time, you will try to hack a system or protect it against potential attacks as if you were really on the field.
16:00
Office Hours
Two additional hours are allocated each day with the teaching assistants to review concepts or move forward on your project. This is a good opportunity to ask questions and review some of the theoretical concepts. 
18:00
Part-time - Weekend
Events
We offer immersive Cybersecurity training and what better way to end your day than with a Tech talk. Many topics are covered around different tech themes by companies that have very interesting cases such as Doctolib, Payfit or Spendesk.
12:30
6:30
9:00
Sunday
D
Tuesday
M
Monday
L
Tuesday
Wednesday
Thursday
J
Friday
V
Saturday
S
Presential
S
Revision of the theoretical courses seen the previous week and introduction of the new concepts
Deepening of the courses and practice on exercises and projects
At home
Recommended review of the lessons seen during the week and further study of the exercises
😴
🏫 Presential - Work in class with your teacher to see the theoretical concepts and work together on the exercises.
Part-time - Weekend
🏠 At home - It is advisable to work at home to deepen the lessons and go over the exercises to best prepare for the week.
4:00
9:00
Sunday
D
Tuesday
M
Monday
L
Tuesday
Wednesday
Thursday
J
Friday
V
Saturday
Deepening of the courses and practice on exercises and projects
At home
S
6:00
Recommended review of the lessons seen during the week and further study of the exercises
😴
🏫 Presential - Work in class with your teacher to see the theoretical concepts and work together on the exercises.

Revision of the contents seen last week and we attack the new concepts of the day

  • Training costs
  • Payment up to 7 times without charge
  • Possibility of financing via the CPF
  • Possibility of catching up on courses
  • Access to our online platform JULIE
  • Access to our content for life
  • Career Coaching & Mentoring Sessions
Access to our events for life
Lyon
Cyber Essentials
Data Essentials
Cyber Essentials
1 295 €
Cyber & Data Essentials
Lyon
Cyber Essentials
Data Essentials
Cyber Essentials
1 295 €
Cyber & Data Essentials
sunny pattern

There's no better way to get an insight into the business than by listening to experts present their views. As a Jedha alumni, you'll have free access to all our events for life.

The most recognized data training

jedha campus lyon
With an average score of 4.95/5, Jedha is ranked first in the French data training ranking. Beyond the score, this is a reflection of our desire to provide knowledge in line with the needs of students and companies.

It isa real pride to be able to accompany our students in therealization of their professional projects, to make them autonomous in Data and to see them bring value to the companies in which they work.

Their training has been able to open up new horizons,
whether it is to set up their startup in AI or to launch their career in Data.
4.95/5
#1 France
data trainingdata trainingdata trainingdata trainingdata training
Overall
data trainingdata trainingdata trainingdata trainingdata training
Curriculum
data trainingdata trainingdata trainingdata trainingdata training

Job Support

Ready to start your Cybersecurity bootcamp?

I'm starting in
Cybersecurity

I want to get my first skills
in Data Science.

Professor Jedha in his classroom