Cyber Security
Essentials

Cyber Security Analyst Training

Protect enterprise infrastructures by learning Ethical Hacker and SOC Analysts techniques in a 70-hour full or part-time program. Discover and understand the major challenges of Cybersecurity. [Training in the process of certification by the RNCP].

Download our syllabus
Chat with our team
Build your future in data

Dive Into the World of Cyber Security

Put yourself in the shoes of an Ethical Hacker

The best way to understand Cyber Security is to see with your own eyes the potential vulnerabilities you need to protect your infrastructure against. This is why we have chosen a technical approach to training.

Understand the full range of cybersecurity issues

Cyber Security is not just a technical issue, as it affects all areas of the business. Learn how to assess the risks of human and technical vulnerabilities to make informed decisions about the protective measures to be implemented.

Start from scratch in Cyber Security

Whether you have no initial knowledge or just a basic understanding of Cyber Security, this course is designed to allow you to progressively increase your skills without feeling like you're being drowned in technical language.

Cyber Security Affects Everyone

According to Gartner, more than one in two executives has had to deal with a cyber-attack and the average cost of such attacks is estimated at more than 4 million dollars (source: IBM). These issues, accelerated by the pandemic, have a global impact that goes far beyond financial cost.

In an infrastructure, the weakest link in the chain is the human being. This is why we have built a training course allowing everyone to learn how hackers work in order to better protect themselves or their company.

Regardless of their initial technical level, each learner leaving the Cyber Security Essentials course will be able to understand and assess the Cyber Security risk of an organisation in order to work on remedial measures.

Learn More About Our Training Courses
Essential Jedha bootcamp cyber security programme

The Cybersecurity Essentials trainingcurriculum

The class wakes up! In this first module, we will introduce the first important concepts to know in cybersecurity. You will learn how to use the CIA Triad model , the Defense-in-Depth and OWASP to shape your mind around security. We will then attack the Networking part where you will understand how a network of machines works and how to use it via shell commands and Vim.
The first step in protecting your company is to assess the risks it faces. We will therefore see how a cybersecurity team is organised in SOCs (Security Operations Centers), how it can assess the risk and prevent possible threats. You will also see how to gather information on a potential target using Nmap and how to protect them via VPNs and Proxies.
Once you know how to gather information about a target, you can exploit it! In this module, you will see how to perform Penetration Testing via msfconsole. You will learn how to exploit vulnerabilities in a system by utilising known vulnerabilities like Bluekeep. You will see how to take advantage of human vulnerabilities through Social Engineering techniques and how backdoors are installed allowing hackers to exploit a system without being detected. Finally, you will see how to defend yourself against these attacks with URL recognition, encryption and patching.
A website is a common tool for any organisation that wants to make itself known. It has therefore become a source of potential attacks. That is why in this module we will cover everything related to the exploitation of vulnerabilities in a website. We will see the injection of SQL commands and Javascript code to take control of or extract information from a server and how to protect against it. We will also see how to hack Wifi networks to carry out Man in the Middle attacks and recover sensitive information.
From this module, you will have a solid knowledge of the potential vulnerabilities of a system and how to protect yourself against them. Therefore, you will now learn how to set up a monitoring system to detect flaws according to the level of compliance that your organisation wishes to maintain. We will therefore look at the use of tools such as splunk, the organisation of CSIRTs and the different levels of compliance such as NIST, ISO/IEC 27000 or GDPR.

And to finish your training, you will use all your cybersecurity knowledge to evaluate the infrastructure of a company of your choice or a Jedha partner. You will try to detect potential vulnerabilities and present a report to the rest of your class.
Cybersecurity and Networking
Module 1
plus sign
Risk Management
Module 2
plus sign
Exploitation of vulnerabilities
Module 3
plus sign
Website Penetration
Module 4
plus sign
Risk & Project Monitoring
Module 5
plus sign
Download the Complete Syllabus

Next Sessions

First London courses (online or in-class) launching 2022!

Paris
🗣 
🇫🇷
Full Time
3
Apr
17
Apr
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
3
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
31
Jul
11
Aug
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
9
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
19
Sep
4
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
10
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
31
Jul
11
Aug
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
9
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
19
Sep
4
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
10
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
31
Jul
11
Aug
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
9
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
19
Sep
4
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
10
available places
Only 2 places left!
Last place available !
Apply
Oops! No bootcamp is planned in Paris soon, contact us for more information.
🗣 
🇫🇷
Full Time
3
Apr
17
Apr
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
3
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
31
Jul
11
Aug
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
9
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
19
Sep
4
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
10
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
31
Jul
11
Aug
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
9
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
19
Sep
4
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
10
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
31
Jul
11
Aug
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
9
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
19
Sep
4
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
10
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
31
Jul
11
Aug
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
9
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
19
Sep
4
Nov
Every Saturday | 10am - 4pm
Every Saturday | 10am - 4pm
10
available places
Only 2 places left!
Last place available !
Apply

How to Join Our Community?

To help you learn data in the best conditions, we have built our JULIE platform dedicated to online and in-class learning. You will be able to review the materials for your programme as well as additional resources to continue to improve your skills
Professor Jedha in his classroom

Apply or request the syllabus here

Make an appointment with our admissions team

Discuss your ambitions and objectives together before finalising your registration

Download the Complete Syllabus

What's Behind the Buzz Words?

VPN, network server, proxies, URL, IP address, you've probably heard of all of these terms: find out what's behind them.

Cyber Security actors are often portrayed as "geeks with hoods" hiding in the dark. Implicitly, we think that cybersecurity is a field for technicians and yet this not necessarily the case.

Far from being a field reserved for tech geeks, Cyber Security is accessible to anyone who wants to protect their data. There are simple methodologies to implement that you will learn during the Cyber Security Essentials course.

Learn More About Our Training Courses
People at Jedha campus

World Class Training, Whatever Your Motivation

"Cyber-attacks happen to others but not to me" That's what everyone says to themselves and yet, from SMEs to large groups, it is also individuals who can be attacked. This is why we find in our alumni community a wide range of backgrounds and motivations.

I manage a technical team, I would like to understand it better.

I work in a company that was hacked, I would like to know what happened!

I don't come from the tech world at all, but I discovered Cyber Security and I liked it!

Cyber Security Doesn't Stand Still: Practice is Everything

In the world of Cyber Security, practice is not only the application of theoretical principles, but is the only way to be effective. To this extent, Jedha's pedagogical approach is key for helping you learn these principles quickly and correctly.

The authors of the course have built it in the same vein: 30% theory / 70% practice. In the course, as soon as a concept is tackled, you will find it applied directly in the course, find it again in the framework of exercises and again in your final project as you carry out your own Pentest.

Learn More About Our Training Courses
People at jedha campus
Words From Our Former Students

Hear about the course from our Essentials alumni, facing real life Cyber Security issues in their work every day. These students all learned their first Pentesting skills at Jedha and have taken up Cyber Security as a career.

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont - From Developer to Cyber Security Consultant

French Tech logo

Big opportunities in this way. I have always loved to find new way to hack life. The teachers were great, and make us realise the opportunities in the sector.

Barry Thien - From Developer to Ethical Hacker

French Tech logo
See more testimonials

I knew the quality of Jedha through their Data training, I now wanted to enrich my general knowledge! I was not disappointed, the teachers are passionate and fine teachers.

Ludovic Pison - From Product Owner to AI Product Manager

French Tech logo
Join Our Community

Cyber Training: Unlimited Opportunities

Whether you are changing or retraining, looking for a job or in the process of leaving a company, Cyber Security is an exciting field to be studying.

Our students come from a range of backgrounds but they all converge in the same direction: acquiring practical Cyber Security skills. Roles such as: Cyber Security project manager (with technical skills), Consultant, or Junior Analyst, the opportunities are numerous and ever expanding.

Talk to Our Admissions Team

Cybersecurity Project Manager

You will be able to understand and manage a team of Cyber Security analysts to successfully complete your projects! Find out more about the job of Cyber Security Project Manager in our Essentials course.

Cyber Security Consultant

Help companies to take the first steps in building secure infrastructure thanks to your skills as a Cyber Security Consultant. Above all, you will be able to make them aware of Cyber Security issues and make yourself invaluable.

Junior Cyber Security Analyst

You will be responsible for the technical aspects of the project and will be responsible for the first steps of a Pentest report in order to guide the initial decisions. You will accompany the Cyber Security analysts in order to ensure that your skills increase.

Junior CISO

The Information Systems Security Manager has a key role in the organisation. Lead from the front as a technical manager supervising a technical team.

Certificate of completion of Cyber Security training

Discover our courses!

[Certification in the process of being registered with the RNCP]. 

Discover our courses!
Book a call with Admissions Team
Portrait Antoine Krajnc

Training Costs

  • Payment in up to 10 monthly installments
  • Access to courses & events for life
  • Possibility of making up missed classes
  • Access to our online platform
  • Certification in progress
Make an Appointment
Training fee Schedule
🇫🇷 France
Essentials
1 495 €
Fullstack
Most popular
6 995 €
Essentials
£1,995
Fullstack
Most popular
£6,595

A typical day for our students

10:00
Course Review
We start the day by reviewing the previous day's concepts to make sure everything is in place before we start working on new content.
10:15
Course Content
Let's start the concept of the day with our teaching team who will take you step by step through the content. You will be able to ask questions and progress at your own pace. 
12:00
Practice
Apply the concepts you have just explored to simple exercises. This will allow you to see the direct application cases and to grasp the technical mechanisms.
13:30
Challenges
Once you have been able to practice the theoretical concepts on simple exercises, it's time for the Data challenges! You will work on more complex Data topics that will allow you to better understand what a Data project is. 
16:00
Office Hours
Two additional hours are allocated each day with the teaching assistants to review concepts or move forward on your project. This is a good opportunity to ask questions and review some of the theoretical concepts. 
18:00
Events
We offer immersive Data training and what better way to end your day than with a Data talk. Many topics are explored by companies with very interesting stories such as Doctolib, Payfit or Spendesk.
10:00
12:30
18:30
21:00
Sunday
D
Tuesday
L
Monday
L
Wednesday
M
Thursday
J
Friday
V
Saturday
S
Tutorial
Revision of the theoretical courses seen the previous week and introduction of the new concepts
Tutorial
Deepening of the courses and practice on exercises and projects
At Home
Recommended review of the lessons seen during the week and further study of the exercises
😴
🏫 Presential - Work in class with your teacher to see the theoretical concepts and work together on the exercises.
🏠 At home - It is advisable to work at home to deepen the lessons and go over the exercises to best prepare for the week.

Where Our Alumni Work After Graduating

After our Essentials training, our alumni work as project managers, data analysts, business analysts or consultants and more in distinguished companies. 

Jedha student
portrait jean paul paoli
portrait chiara
portrait bonnie naccache
portrait antoine guerrini
portrait augustin lauvencourt
Jedha student
portrait wolfgang fernandez
jedha student
jedha student
portrait camille destombes
Jedha student
Join Our Community

Our Jedha Masters, Born Popularisers

Our teachers are chosen both for their technical excellence and also their ability to 'popularise' or demystify the subject matter. As this course introduces you to the field in a technical way, by popularisation, we mean the ability to explain technical concepts in a simple and easy to understand way, without losing the quality of the information. This is yet another way how our teachers provide invaluable advice to their students.

Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Nicolas Borrat
Nicolas Borrat
Senior Pentester
 @
Ionos
Nicolas is a self-taught man! Initially a developer, he then turned to the world of computer security. He then joined the IONOS group as a Cyber Security Researcher.
[...]
Read More
Nicolas Borrat
His achievements? Detecting system vulnerabilities on several million websites! Nicolas is also the developer of an open-source tool dedicated to Cyber Security training: root-me!
Read Less
Xavier Coquand
Xavier Coquand
Senior Pentester
 @
Bsecure
Xavier is also a self-taught person! He quickly developed a strong interest in IS security issues.
[...]
Read More
Xavier Coquand
Xavier is also a self-taught person! He quickly developed a strong interest in IS security issues. He then became a Malware Analyst (malware analysis) before joining Ecole 42 as a trainee, then Atos as a Pentester.
Read Less
Chat With Your Jedha Masters

Cyber Security Basics in Practice

Throughout the course, complete projects and exercises that allow you to apply everything you learn to real-life cases.

Handle Your VPN
You have been given access to a VPN (Virtual Private Network) on a Jedha server as part of your final project. Manipulate this VPN to compare your connection to a website with and without. Has the IP address been changed? Learn all the best practices of using a VPN.
Attack On Wireless Networks
In this exercise, you will practice a Spoofing attack on a website of your choice using your Kali Linux virtual machine.
Carry Out a Pentest
The moment to apply all the tools, technologies and methods that you have learned and practiced one by one during the training. You will perform your own Pentest on a specific target, exploit its vulnerabilities and build a Pentest report. You will end up giving your feedback and advice to your "client".
Check Out Our Blog

Commonly Asked Questions:

Are 40 or 70 hours enough to have the basics in Cybersecurity?

Do I have to bring my own computer?

What are the pre-requisites for this course?

Ask Our Admissions Team Any Further Questions

Is this Cyber Bootcamp for Me?

Now is an incredible time to dive in and discover the world of Cyber Security. Our friendly admissions team would love to schedule a time to chat with you about your goals, answer your questions and help you to decide if Jedha is right for you.

I have little or no knowledge of Cyber Security

I want to have technical skills and understand the global environment

I make an appointment with the admissions team to find out everything!

Professor Jedha in his classroom