Training
Cybersecurity

Protect corporate infrastructures by learning the techniques of SOC Analysts and Hackers in a 40-hour part-time or full-time program.

header cybersecurity training jedha bootcamp

Why do this Cybersecurity training?

nyan cat

Become autonomous in Cybersecurity

We will cover all the main vulnerabilities that an organisation may be exposed to so that you can best respond to them.

Learn by doing

The best way to learn about cybersecurity is to try to penetrate systems! From operating systems to malware exploitation, you will learn all the hackers' techniques to better protect your organisation. 

Cyber security training CPF

Our training is delivered in part-time and full-time so that you can follow it regardless of your schedule.
Take advantage of this CPF-eligible training, you will also benefit from numerous financing possibilities

Cybersecurity training curriculum

The class wakes up! In this first module, we will introduce the first important concepts to know in cybersecurity. You will learn how to use the CIA Triad model , the Defense-in-Depth and OWASP to shape your mind around security. We will then attack the Networking part where you will understand how a network of machines works and how to use it via shell commands and Vim .
The first step in protecting your company is to assess the risks it faces. We will therefore see how a cybersecurity team is organised in SOCs (Security Operations Centers), how it can assess the risk and prevent possible threats. You will also see how to gather information on a potential target using Nmap and how to protect them via VPNs and Proxies.
Now that you know how to gather information about a target, you can exploit it! In this module, you will see how to perform Penetration Testings via msfconsole. You will learn how to exploit vulnerabilities in a system by exploiting known vulnerabilities like Bluekeep. You will see how to take advantage of human vulnerabilities through Social Engineering techniques and how backdoors are installed allowing hackers to exploit a system without being detected. Finally, you will see how to defend yourself against these attacks with URL recognition, encryption and patching.
A website is a common tool for any organisation that wants to make itself known. It has therefore become a source of potential attacks. That is why in this module we will cover everything related to the exploitation of vulnerabilities in a website. We will see the injection of SQL commands and Javascript code to take control of or extract information from a server and how to protect against it. We will also see how to hack Wifi networks to carry out Man in the Middle attacks and recover sensitive information. 
From this module, you will have a solid knowledge of the potential vulnerabilities of a system and how to protect yourself against them. Therefore, you will now learn how to set up a monitoring system to detect flaws according to the level of compliance that your organisation wishes to maintain. We will therefore look at the use of tools such as splunk, the organisation of CSIRTs and the different levels of compliance such as NIST, ISO/IEC 27000 or GDPR.
To complete your training, you will use all your knowledge of cybersecurity to assess the infrastructure of a company of your choice or a Jedha partner. You will attempt to detect potential vulnerabilities and present a report to the rest of your class.
Cybersecurity & networking
Module 1
plus sign
Risk management
Module 2
plus sign
Exploitation of vulnerabilities
Module 3
plus sign
Website penetration
Module 4
plus sign
Risk monitoring
Module 5
plus sign
Cybersecurity Project
Module 6
plus sign
Download the complete syllabus

Next sessions

Whatever your schedule, you will be able to find a suitable full or part-time training session.

Week End
25
Sep
13
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
7
available places
Only 2 places left!
Last place available !
Apply at
Full time
11
Oct
22
Oct
Monday to Friday 10am - 4pm
Monday to Friday 10am - 4pm
6
available places
Only 2 places left!
Last place available !
Apply at
Week End
25
Sep
13
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
7
available places
Only 2 places left!
Last place available !
Apply at
Full time
11
Oct
22
Oct
Monday to Friday 10am - 4pm
Monday to Friday 10am - 4pm
6
available places
Only 2 places left!
Last place available !
Apply at

The opportunities of the Cybersecurity training

Entrepreneurs, managers, employees, freelancers, the objective is to build professional opportunities for you.

Make an appointment with the team
Chef de projet Cybersécurité

Les connaissances métiers et compétences de gestion sont de mise pour le chef de projet Cybersécurité. Son rôle sera de synchroniser les actions des équipes techniques, mais surtout d’avoir une vision d’ensemble sur l’architecture Data de l’entreprise.

Cybersecurity Consultant

It assists companies to take the first steps in building a secure infrastructure. It will therefore assess the existing situation and develop recommendations for improvement.

Analyste Cybersécurité Junior

L'analyste cybersécurité a pour rôle détecter les failles d'un système afin de garantir que les données de l'entreprise soient protégées. En tant que Junior, il aura surtout pour objectif de monter en compétences sur les sujets plus techniques.

Where do our alumni work after the training

After the Essentials Cybersecurity course, our alumni work in various sectors as Cybersecurity Consultants, Cybersecurity Analysts or Security Administrators

portrait emilien nory
portrait lucas brossierportrait delphine jean
portrait augustin lauvencourt
portrait marine gubler
portrait mouna bensouda
portrait wolfgang fernandez
portrait camille destombes
portrait marine barrier director of the Lyon campus
portrait bonnie naccacheportrait antoine guerrini

Cybersecurity news

In our blog, our alumni tell you how they were recruited, how they set up their project. We also provide resources to learn more about the field of Cybersecurity, the possibilities of financing the training as well as the opinions of our professors and teaching teams.

Go to the blog
Data theme

Data and Cybersecurity: two complementary sectors

Découvrez les grands enjeux de la Cybersécurité, les liens entre la Data et la Cybersécurité, le marché du recrutement en cybersécurité.
Career

Cybersecurity professions

Protecting data has become a key issue for any company. But who are the people behind all these missions? Find out here about the various cybersecurity professions.
Increase your skills

What is Cybersecurity?

Why is cybersecurity essential to any organisation? What are the challenges? What are the jobs related to cybersecurity? Answer in this full article.

A typical day of training

10:00
Course Review
We start the day by reviewing the previous day's concepts to make sure everything is in place before we start working on new content.
10:15
Course Content
Let's start the concept of the day with the teaching team who will take you step by step. You will be able to ask all your questions and progress at your own pace. 
12:00
Practice
Apply the concepts you have just seen to simple exercises. This will allow you to see the direct application cases and to grasp the technical mechanisms.
13:30
Challenges
Once you have been able to practice the theoretical concepts on simple exercises, it's time for the Cybersecurity challenges! Most of the time, you will try to hack a system or protect it against potential attacks as if you were really on the field.
16:00
Office Hours
Two additional hours are allocated each day with the teaching assistants to review concepts or move forward on your project. This is a good opportunity to ask questions and review some of the theoretical concepts. 
18:00
Events
We offer immersive Cybersecurity training and what better way to end your day than with a Tech talk. Many topics are covered around different tech themes by companies that have very interesting cases such as Doctolib, Payfit or Spendesk.
10:00
12:30
6:30
9:00
Sunday
D
Tuesday
M
Monday
L
Wednesday
M
Thursday
J
Friday
V
Saturday
S
Presential
Revision of the theoretical courses seen the previous week and introduction of the new concepts
Presential
Deepening of the courses and practice on exercises and projects
At home
Recommended review of the lessons seen during the week and further study of the exercises
😴
🏫 Presential - Work in class with your teacher to see the theoretical concepts and work together on the exercises.
🏠 At home - It is advisable to work at home to deepen the lessons and go over the exercises to best prepare for the week.
10:00
4:00
6:00
Sunday
D
Tuesday
M
Monday
L
Wednesday
M
Thursday
J
Friday
V
Saturday
S
At home
Recommended review of the lessons seen during the week and further study of the exercises
Presential
Revision of the contents seen last week and we attack the new concepts of the day
😴
🏫 Presential - Work in class with your teacher to see the theoretical concepts and work together on the exercises.
🏠 At home - It is advisable to work at home to deepen the lessons and go over the exercises to best prepare for the week.

Training costs

  • Payment up to 7 times without charge
  • Possibility of financing via the CPF
  • Possibility of catching up on courses
  • Access to our online platform JULIE
  • Access to our content for life
  • Career Coaching & Mentoring Sessions
  • Access to our events for life
See funding opportunities
Cyber Essentials
1 295 €
Data Essentials
1 295 €
Cyber & Data Essentials
2 290 €
Cyber Essentials
1 295 €
Data Essentials
1 295 €
Cyber & Data Essentials
2 290 €
sunny pattern

The most recognized data training

Avec une note moyenne de 4.97/5, Jedha se place en première place au classement des formations Data en France. Au-delà de la note, ceci est le reflet de notre volonté d'apporter un savoir en phase avec les besoins des étudiants et des entreprises.

C'est une vraie fierté de pouvoir accompagner nos étudiants dans la réalisation de leurs projets professionnels, de les rendre autonomes en Data et les voir apporter de la valeur aux entreprises dans lesquelles ils travaillent.

Leur formation a pu les ouvrir à de nouveaux horizons, que ce soit pour monter leur startup dans l'IA ou pour lancer leur carrière dans la Data.

jedha campus lyon
4.97/5
#1 France
Overall
data trainingdata trainingdata trainingdata trainingdata training
Curriculum
data trainingdata trainingdata trainingdata trainingdata training
Job Support
data trainingdata trainingdata trainingdata trainingdata training

Ready to start your Cybersecurity bootcamp?

I'm starting in
Cybersecurity

I want to get my first skills
in Data Science.

I apply and talk with the admissions team
to ask my questions !

Professor Jedha in his classroom