Prepare for your training
Programming, database management: with the help JULIE's resources you will be well equipped to get the most out of your course
Protect enterprise infrastructures by learning Ethical Hacker and SOC Analysts techniques in a 70-hour full or part-time program. Discover and understand the major challenges of Cybersecurity. [Training in the process of certification by the RNCP].
The best way to understand Cyber Security is to see with your own eyes the potential vulnerabilities you need to protect your infrastructure against. This is why we have chosen a technical approach to training.
Cyber Security is not just a technical issue, as it affects all areas of the business. Learn how to assess the risks of human and technical vulnerabilities to make informed decisions about the protective measures to be implemented.
Whether you have no initial knowledge or just a basic understanding of Cyber Security, this course is designed to allow you to progressively increase your skills without feeling like you're being drowned in technical language.
According to Gartner, more than one in two executives has had to deal with a cyber-attack and the average cost of such attacks is estimated at more than 4 million dollars (source: IBM). These issues, accelerated by the pandemic, have a global impact that goes far beyond financial cost.
In an infrastructure, the weakest link in the chain is the human being. This is why we have built a training course allowing everyone to learn how hackers work in order to better protect themselves or their company.
Regardless of their initial technical level, each learner leaving the Cyber Security Essentials course will be able to understand and assess the Cyber Security risk of an organisation in order to work on remedial measures.
First London courses (online or in-class) launching 2022!
Apply or request the syllabus here
Make an appointment with our admissions team
Discuss your ambitions and objectives together before finalising your registration
VPN, network server, proxies, URL, IP address, you've probably heard of all of these terms: find out what's behind them.
Cyber Security actors are often portrayed as "geeks with hoods" hiding in the dark. Implicitly, we think that cybersecurity is a field for technicians and yet this not necessarily the case.
Far from being a field reserved for tech geeks, Cyber Security is accessible to anyone who wants to protect their data. There are simple methodologies to implement that you will learn during the Cyber Security Essentials course.
When you manage a technical team, when you lead technical projects, it will always be very useful to have a solid knowledge of the environment in order to guide actions and make more informed decisions. This is true in Cyber Security, but also in all sectors of Tech. You will be all the more aware of the stakes of your project, of the challenges they have to face, but also of the workloads and required skillsets of everyone.
This is a story we are hearing more and more often. Whether you are a developer, a data professional, or in a support role (customer service, marketing, finance, admin), having knowledge of Cyber Security will give you the first keys to understanding what happened to your organisation. If the cyber-attack you have been the victim of is significant, we strongly advise you to take the Full Stack Cyber Security course next, in which you will have a comprehensive and technically advanced understanding of a Cyber Security project.
Intellectual curiosity is a great motivator! If you want to learn more about Cyber Security, or discover this universe fully, the Cyber Security Essentials course is perfect for you. You will learn the technical basics of this field, and get a really good opportunity to understand if you want to continue down this path or not.
In the world of Cyber Security, practice is not only the application of theoretical principles, but is the only way to be effective. To this extent, Jedha's pedagogical approach is key for helping you learn these principles quickly and correctly.
The authors of the course have built it in the same vein: 30% theory / 70% practice. In the course, as soon as a concept is tackled, you will find it applied directly in the course, find it again in the framework of exercises and again in your final project as you carry out your own Pentest.
Hear about the course from our Essentials alumni, facing real life Cyber Security issues in their work every day. These students all learned their first Pentesting skills at Jedha and have taken up Cyber Security as a career.
Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!
Emmanuelle Dennemont - From Developer to Cyber Security Consultant
Big opportunities in this way. I have always loved to find new way to hack life. The teachers were great, and make us realise the opportunities in the sector.
Barry Thien - From Developer to Ethical Hacker
Whether you are changing or retraining, looking for a job or in the process of leaving a company, Cyber Security is an exciting field to be studying.
Our students come from a range of backgrounds but they all converge in the same direction: acquiring practical Cyber Security skills. Roles such as: Cyber Security project manager (with technical skills), Consultant, or Junior Analyst, the opportunities are numerous and ever expanding.
[Certification in the process of being registered with the RNCP].
After our Essentials training, our alumni work as project managers, data analysts, business analysts or consultants and more in distinguished companies.
Our teachers are chosen both for their technical excellence and also their ability to 'popularise' or demystify the subject matter. As this course introduces you to the field in a technical way, by popularisation, we mean the ability to explain technical concepts in a simple and easy to understand way, without losing the quality of the information. This is yet another way how our teachers provide invaluable advice to their students.
Complete your Essentials training on your JULIE platform: your complete learning platform, not just a content portal!
Throughout the course, complete projects and exercises that allow you to apply everything you learn to real-life cases.
Our Cyber Security Essentials programme has been built to provide you with the complete basics in Cyber. The idea is that you get an overview of what is being done in Ethical Hacking. You will learn the basics in Infrastructure, Networking, but also in Pentesting. Thanks to the excellent tutelage by your teachers and through the practice of numerous exercises, you will be able to perform your first Pentest. You can apply or ask for the syllabus before making an appointment with the admissions team to ask all your questions about the programme.
Your main tool will be your computer! It is therefore essential that you come with your own machine. We do not provide computers so that you can feel comfortable and familiar with your own gear. We provide access to all the necessary tools and platforms you will need for the programme. To follow the Cyber Security courses, it will be useful to have a computer with 8GB of RAM, and some free storage available.
This training course is intended to be accessible to as many people as possible, which is why we do not require any technical prerequisites, but simply that you complete some prep-work once you have registered so that you can follow the course with peace of mind. Once you have registered, we will give you access to our JULIE platform, where you will find the content to prepare: Javascript, networking knowledge on the menu!
Now is an incredible time to dive in and discover the world of Cyber Security. Our friendly admissions team would love to schedule a time to chat with you about your goals, answer your questions and help you to decide if Jedha is right for you.
I have little or no knowledge of Cyber Security
I want to have technical skills and understand the global environment
I make an appointment with the admissions team to find out everything!