Workshop : Introduction to Python
Thursday, June 15, 7 p.m.
On line

Take your first steps in Python, the programming language you need to master in Data and Cybersecurity!

Sign up
Cyber Security
Essentials

Cybersecurity awareness training

In 70 hours, become aware of and master the fundamental concepts of computer security. Get a recognized certification and boost your career!

4.98/5 according to our 1600 students
Upcoming courses:
10
July
2023
31
July
2023
Apply
Download our syllabus
Hired or refunded badge
Build your future in data
Program

Master the basics of Cybersecurity

Do you have limited knowledge of Cybersecurity? Don't worry: our training course is designed to demystify Cybersecurity. You'll get a solid grounding in IT security, essential if you want to continue discovering the field. At the end of your Cybersecurity Essentials training at Jedha, you'll be able to :

  • Understand the major challenges of Cybersecurity
  • Assessing an organization's vulnerabilities
  • Apply good practices and necessary protective measures
Download our syllabus
Build your future in data

The program of our Cybersecurity training for beginners

Cyber Security & Networking

In this first module, you will discover the fundamental concepts of computer security. You will then take your first steps in Networking, in order to understand how a network of machines works.

Module 1

Cyber Security & Networking

Skills mastered
  • Cybersecurity awareness: Offensive and defensive security, CIA Triad model (Availability, Integrity and Privacy), OWASP community.
  • Programming basics with Shell and Vim
  • Networking: operation & management of a network of machines.
Risk assessment & footprinting

The first step in protecting your organization is to be able to assess the risks it faces in order to mitigate them. In this second module, you will discover the basics of cyber risk assessment, footprinting and defense.

Module 2

Risk assessment & footprinting

Skills mastered
  • Structuring a cybersecurity team, with the role of SOCs (Security Operations Centers) to assess cyber risks and protect against potential threats.
  • Risk Assesment: use of a risk matrix.
  • Active & Passive Footprinting : passive collection of information about a potential target, or active with Nmap.
  • Protection with proxies and VPN.
Exploitation of vulnerabilities

Now that you know how to identify vulnerabilities in a target, you can exploit them! In this module, you will learn how to exploit vulnerabilities, how to take advantage of backdoors or human vulnerabilities through Social Engineering techniques. But above all, you will discover how to protect yourself from these vulnerabilities.

Module 3

Exploitation of vulnerabilities

Skills mastered
  • Exploitation of existing vulnerabilities.
  • Social Engineering: use of humans to create vulnerabilities (phising, baiting, dumpster diving etc.)
  • Protection of a vulnerability: Defense in Depth, Patch management, Configuration hardening, Identity and Access Management...
Web penetration & Monitoring

Websites are therefore very good targets for any hacker. That is why in this module, you will learn how to exploit the vulnerabilities of a website. You will then learn how to set up a monitoring system to detect and protect yourself from vulnerabilities.

Module 4

Web penetration & Monitoring

Skills mastered
  • Web penetration testing: use of the OWASP Web Security Testing Guide to assess the vulnerabilities of a website.
  • Exploitation of SQL and Javascript vulnerabilities.
  • How a Man in the Middle attack works.
  • Basics of Cybersecurity Monitoring: Security Incident and Event Management Systems (SIEM), Endpoint Detection and Response (EDR).
Final project

It's your turn to play! To finish your training, you will use all your knowledge in cybersecurity to evaluate a target. Through penetration tests, you will try to detect potential vulnerabilities in a real infrastructure and present a pentest report to the Jedha educational team.

Module 5

Final project

Skills mastered
  • Assess a target's cyber vulnerabilities, using all methods learned in the training.
  • Create a pentest report, to report on identified vulnerabilities.
Download our syllabus
Sessions

Train in computer security at your own pace

Our Cybersecurity Awareness Training can be adapted to your constraints. Online training, evening classes, or short courses: there is bound to be a format that suits you.

Bootcamp

  • 70 hours of classes over 2 weeks
  • Monday to Friday, 10am - 6pm
At one of our 19 campuses or online
  • Short course
  • Limited number of students
  • Prom spirit
Read more

Online training

  • At your own pace over 6 weeks
  • 70 hours of online content
  • 1 live class per module
  • Individual coaching on demand
Distance learning
  • Adapted to your professional and personal constraints
  • Accessible anywhere in the world
Read more

Our next training sessions

Take your training remotely or at one of our 18 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse, Nantes and many other cities in France and Europe.

On line
10
Jul
2023
20
Aug
2023
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
Bootcamp
31
Jul
2023
11
Aug
2023
Monday to Friday
10am - 6pm
🇫🇷
French
Last seats!
Sign up
Bootcamp
4
Sep
2023
15
Sep
2023
Monday to Friday
10am - 6pm
🇫🇷
French
Last seats!
Sign up
On line
11
Sep
2023
22
Oct
2023
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
On line
11
Sep
2023
22
Oct
2023
Individual coaching on demand
1 live class per module
🇬🇧
English
Last seats!
Sign up
On line
13
Nov
2023
24
Dec
2023
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
Bootcamp
27
Nov
2023
8
Dec
2023
Monday to Friday
10am - 6pm
🇫🇷
French
Last seats!
Sign up
Oops! No session in this format is planned at this time, contact us for more information

Do you need maximum flexibility? With our distance learning program, you can follow the program at your own pace online, while benefiting from individualized coaching.

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Course of action

How do I apply for our Cybersecurity Essentials course?

Nothing could be easier! Make an appointment with our team to refine your professional project. Depending on the course you choose and the necessary financing, your registration will take between 1 week and 1 month.

1

Prerequisites

There are no technical requirements. But you will need to do some quick preparatory work in programming.

2

Career coaching

Discuss your career plans with our admissions team.
We will recommend the most suitable course and format.

3

MCQS

Take a quick MCQ to assess your level in programming and mathematics.

4

Financing

Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.

How does the Cybersecurity training for beginners work?

10h

Course review

Guided by the teacher, start the day by reviewing the concepts from the previous class.

10h15

Theoretical course

Every day, discover new theoretical concepts accompanied by our teacher.

12h

Putting it into practice

Before lunch, apply the concepts you have just learned with simple exercises.

13h30

Challenges

Challenges, very professionalizing practical exercises in the form of projects.

16h

Office Hours

Work on courses and projects independently or with the help of our teacher assistants.

18h

Events

Participate in our events to build your professional network and learn more about the industry.

Build your future in data

Our distance learning course adapts to your personal constraints while offering you a real individualized follow-up: you are accompanied from start to finish!

‍Working supports

‍Benefit fromlifetime access to our e-learning platform JULIE : 

  • Written & video courses
  • Exercises
  • Projects‍

Pedagogical support

‍Enjoythe best coaching ever offered in distance learning: 

  • Teaching Assistants available daily from 5:00 pm to 7:00 pm
  • 7 hours of live instruction per module
Build your future in data
Download our syllabus
Financing

Training Costs

Included in the training :

  • Access to courses for life
  • Close educational support
  • JULIE e-learning platform
  • Career coaching

Bootcamp

1 495 €

On line

1 495 €

Hired or Refunded Guarantee

We believe in you and our program. If you don't get a job within 6 months of becoming certified, we will refund your tuition. Learn more about our program

How to finance your Cybersecurity training?

  • Public funding

Our diploma course is eligible for a wide range of public funding: CPF, Pôle Emploi (AIF or POEI), Transition Pro, local funding.

  • Payment in installments

Take advantage of our 3-installment payment plan, or spread your training costs over several monthly installments (up to 60) with our partners Pledg and Cresh.

  • Your employer or your OPCO

If you are employed, your employer can finance your training, either directly or through its OPCO. Our teams will help you put together a file.

  • Low-interest loans

Finance your data analysis training with low or no interest loans from our partner Crédit du Nord.

Apply for the Course
Download our syllabus
Certification

Cybersecurity Auditor Certification

Our Cybersecurity awareness training is certifying: at the end of the 70 hours of training, you will be able to pass the Cyber Project Management block of the Cybersecurity Auditor certification created and delivered by Jedha.

Composed of four areas of expertise, this certification offers the possibility to highlight your cybersecurity skills to potential employers.

Discover our certification

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Testimonials

Take your first step in Cybersecurity

Our awareness training has provided dozens of professionals with valuable computer security skills, and for the most motivated, a career in the industry.

I knew the quality of Jedha through their Data training, I now wanted to enrich my general knowledge! I was not disappointed, the teachers are passionate and fine pedagogues.

Ludovic Pison

 - 

From Product Owner to AI Product Manager

@

French Tech logo

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont

 - 

From Developer to Cybersecurity Consultant

@

French Tech logo

Quick bootcamp, big skills! The teachers were perfect, and make us realize the opportunities in the sector.

Barry Thien

 - 

Ethical Hacker

@

Webomatic

French Tech logo
1600
Students who have followed one or
several of our courses
87
 %
Of professional integration
within 6 months
4.98
 /5
Average rating awarded
by our students
Download our syllabus

The opportunities of our Cybersecurity training

Even though it's a short course, it offers a wide range of career opportunities. Whether you want to work in the world of cybersecurity, or simply become aware of it, this training will give a real boost to your career. Coupled with our advanced training in cybersecurity , you can become a cryptology engineer, cybersecurity consultant or cybersecurity project manager.

Junior CISO

The Information Systems Security Manager is responsible for protecting the company's information systems against cyber-attacks. He/she implements security policies and manages security incidents in collaboration with the IT teams.

Cybersecurity taught by extension experts

Senior Pentester, Cyber Analyst or Cyber Consultant: our lecturers are professionals chosen for their technical expertise, but also for their ability to communicate in layman's terms! They are able to convey complex cybersecurity concepts in a simple, understandable way.

Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Nicolas Borrat
Nicolas Borrat
Senior Pentester
 @
Ionos
Nicolas is a self-taught man! Initially a developer, he then turned to the world of computer security. He then joined the IONOS group as a Cyber Security Researcher.
[...]
Read More
Nicolas Borrat
His achievements? Detecting system vulnerabilities on several million websites! Nicolas is also the developer of an open-source tool dedicated to Cyber Security training: root-me!
Read Less
Xavier Coquand
Xavier Coquand
Senior Pentester
 @
Bsecure
Xavier is also a self-taught person! He quickly developed a strong interest in IS security issues.
[...]
Read More
Xavier Coquand
Xavier is also a self-taught person! He quickly developed a strong interest in IS security issues. He then became a Malware Analyst (malware analysis) before joining Ecole 42 as a trainee, then Atos as a Pentester.
Read Less
Download our syllabus
FAQ
Your questions about training

Are 70 hours enough to have the basics in Cybersecurity?

Do I have to bring my own computer?

What are the pre-requisites for this course?

How to make your employees aware of computer security?

How to get free cybersecurity training?

Have a question? Ask our Admissions team

Apply to

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.