Workshop : Introduction to Python
Thursday, June 15, 7 p.m.
On line

Take your first steps in Python, the programming language you need to master in Data and Cybersecurity!

Sign up
Cyber Security
Fullstack

Cybersecurity Distance Learning

In 8 months, learn computer security at your own pace, become a true Ethical Hacker and get your first job as a Cyber Security Analyst or Consultant.

4.98/5 according to our 1600 students
Upcoming courses:
3
July
2023
4
September
2023
Apply
Download our syllabus
Hired or refunded badge
Build your future in data
Program

Become a Cybersecurity Consultant in 8 months

Choose a job that is recruiting and a training that fits your professional and personal constraints!

Protection against cyber threats is a crucial issue for companies in 2023. Faced with threats such as phishing, ransomware and malware injections, the demand for specialists in this field is more than urgent.

Following your online Cybersecurity training, you will be able to:

  • Identify and exploit vulnerabilities in an organization
  • Apply security principles and protect an infrastructure
  • Detecting and responding to a cyber attack
Download our syllabus
Build your future in data

The program of our online Cybersecurity training

Discovery of the Cyber

Let's get into the heart of the Cybersecurity universe with the main concepts of networking, authentication, encryption. We will then study the basics of Python for Cybersecurity and review the terminal command lines of your computer and you will understand what goes on behind the scenes. You will be able to make different servers on the same network interact thanks to the file sharing protocol to better solidify your network infrastructure and protect it.

Modules 1 & 2

Discovery of the Cyber

We will then go deeper into the main network protocols: the concepts of spoofing, hijacking, man-in-the-middle will no longer hold any secrets for you. You will also understand in detail the constitution of a Web network with the Internet Protocol (IP), the DNS; we will also focus on Microsoft architectures, the first victims of cyber-attacks.

Recognition & Cyber-attack

Let's get into the details of what reconnaissance is, this first phase before any attack or pentest. You will practice active and passive reconnaissance techniques to gather information about your target via tools like nmap, shodan and the OSINT framework. We will go as far as discovering the first vulnerabilities.

Modules 3 & 4

Recognition & Cyber-attack

Based on the latest OWASP 10 ranking, we will explore each of the 10 most well-known cyber-attacks: how they work, where they come from, how to remedy these flaws, you will master all these attacks. Your knowledge of Python, SQL and Javascript will come in handy! You will also learn how to bypass anti-virus software to make your exploits more difficult to detect.

Vulnerabilities & Flaws

Now that you have researched and discovered the main vulnerabilities in a network, it is time to learn how to exploit them. In the new phase of vulnerability exploration, you will use the most famous Cybersecurity frameworks - Metasploit, Beef. In this module, you will understand the underbelly of a machine and you will discover what a Buffer Overflow is, and you will finish with crackme challenges, testing your ability to crack software.

Modules 5 & 6

Vulnerabilities & Flaws

You will also learn how to exploit and remedy vulnerabilities in Microsoft systems, which have been the target of numerous cyberattacks in recent years. You will become familiar with their Active Directory and their vulnerabilities. You will master the Bloohound tool to map the most efficient paths to the heart of an infrastructure in a very simple way.

Post-operation & Wireless

Once the flaws & vulnerabilities are exploited, you need to think about the "after". Your goal will be to make it impossible for potential hackers to elevate their access privileges to other, much broader information. This is called Post-Exploitation. You will also see how to install backdoors on an infrastructure and how to detect them if you did not place them.

Modules 7 & 8

Post-operation & Wireless

Finally, you will learn in this module how to write Pentest audit reports, according to best practices, that you will deliver to your future customers so that they can make the right decisions about the actions to take on the protection of their infrastructure.

Red Team & Cyber Projects

Now put on the hat of a member of a Red Team, a group of ethical hackers responsible for detecting, preventing and eliminating vulnerabilities. You will first learn how to use forensic methodologies to investigate and retrieve information.

Modules 9 & 10

Red Team & Cyber Projects

Still within the framework of a Red Team, you will be familiarized with the concept of White malware and its C&C regulations (Control & Command) allowing to hijack information, to take administrative controls.

Download our syllabus

Why train in Cybersecurity online?

At your own pace

Early in the morning, during lunch break, or in the evening: train when you have time! Our training is adapted to your constraints.

Remote

All you need is your computer and 4G! Enjoy the best Cybersecurity training on the market from the location of your choice.

Individualized follow-up

You are accompanied from A to Z. Take advantage of the best supervision ever offered in distance learning.

Our next distance learning courses

Take your Cybersecurity training remotely and at your own pace.

On line
3
Jul
2023
28
Jan
2024
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
On line
4
Sep
2023
31
Mar
2024
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
On line
6
Nov
2023
2
Jun
2024
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
On line
6
Nov
2023
2
Jun
2024
Individual coaching on demand
1 live class per module
🇬🇧
English
Last seats!
Sign up
Oops! No session in this format is planned at this time, contact us for more information

Do you need maximum flexibility? With our distance learning program, you can follow the program at your own pace online, while benefiting from individualized coaching.

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Course of action

How to register for our online training?

It's so easy! Schedule a meeting with our team to fine-tune your professional project. Depending on the program selected and the funding required, registration will take from 1 week to 1 month.

1

Prerequisites

Basic skills in Python and Shell are required.

If you don't have them, you can participate to our Cybersecurity training for beginners.

2

Career coaching

Discuss your career plans with our Admissions team.

We will suggest the course and format best suited to your needs.

3

MCQS

Complete a brief multiple choice quiz to assess your programming and math skills.

4

Financing

Realize your project with the support of our team.

From the search for financing to the preparation of the file, we guide you throughout the process".

The Jedha method for distance learning

E-learning platform

Advance at your own pace. As soon as you register, you have access to 420 hours of content on our e-learning platform JULIE :

  • written and video courses
  • exercises
  • projects

And that's not all: once your training is over, you keep a lifetime access to JULIE to continue to improve your skills.

Finally, we have set up individualized follow-up so that you can learn at a distance without ever being left to your own devices. Our Teaching Assistants are available every day to answer your questions, and our most experienced teachers offer live class sessions to review your progress at the end of each module.

Individualized follow-up

Train remotely without ever being left to your own devices. You benefit from the best support ever offered in distance learning:

  • Daily coaching: our Teaching Assistants are available every day from 5 to 7 pm to answer your questions
  • Course Review: our most experienced teachers offer 7 hours of live instruction at the end of each module to review the course.
Build your future in data
Download our syllabus
Financing

Training Costs

Included in the training :

  • Access to courses for life
  • Close educational support
  • JULIE e-learning platform
  • Career coaching

On line

6 995 €

Hired or Refunded Guarantee

We believe in you and our program. If you don't get a job within 6 months of becoming certified, we will refund your tuition. Learn more about our program

How to finance your online Cybersecurity training?

  • Public funding

Our certification training is eligible for various public funding: CPF, Pôle Emploi (AIF or POEI), Transition Pro, local funding...

  • Monthly payment

Take advantage of our 3-installment payment plan, or spread your training costs over several monthly installments (up to 60) with our partners Pledg and Cresh.

  • Your employer or your OPCO

Are you an employee? Your employer can pay for your training, directly or through his OPCO. Our teams will assist you in putting together your file.

  • Preferred rate loans

Finance your Cybersecurity training with low or no interest loans offered by our partner Crédit du Nord.

Apply for the Course
Download our syllabus
Certification

Cybersecurity Auditor Certification

Our Cybersecurity training is certifying: at the end of the 420h, you will be able to pass the Cybersecurity Auditor certification created and delivered by Jedha.

Consisting of 4 blocks of skills, this certification will allow you to show your skills in Cybersecurity to recruiters.

Discover our certification

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Testimonials

Become a Pentester or Cybersecurity Analyst

Discover the online training that will propel your career to new heights! Our professionalizing program is designed for people who want to become experts in Cybersecurity. With our practice-oriented approach, we have enabled our students to realize their career plans.

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont

 - 

From Developer to Cybersecurity Consultant

@

French Tech logo

Quick bootcamp, big skills! The teachers were perfect, and make us realize the opportunities in the sector.

Barry Thien

 - 

Ethical Hacker

@

Webomatic

French Tech logo

It was a great experience! An intensive programme, taught and kept up to date with the latest technologies, ultra-competent teachers (thanks to them), connected to the tech world and very good communication between the team and the students. Once again, a great experience.

Olga Kurnosova

 - 

@

Jellysmack

French Tech logo
1600
Students who have followed one or
several of our courses
87
 %
Of professional integration
within 6 months
4.98
 /5
Average rating awarded
by our students
Download our syllabus

The opportunities of our online training

Start your career in Cybersecurity with our professional online training! We provide career coaching to help you land your first job.

SOC Analyst

The SOC Analyst is in charge of monitoring threats to the company's infrastructure. Working within the Security Operation Center, he/she is responsible for the technical monitoring of a company's information system in the broadest sense.

Online training designed by experts

Our training to retrain in Cyber was developed by recognized experts in the field. They have a concrete experience of the sector that they put at your disposal in the training.

Charles Tanguy
Charles Tanguy
Lead Instructor
 @
Jedha
Our very own Jedha Master! Charles is our Lead Instructor, having taught at Jedha since the first sessions. A double graduate of ENSAE & HEC, Charles is also the guarantor of the excellence of Jedha's course content.
[...]
Read More
Charles Tanguy
Charles is our Lead Instructor, having taught at Jedha since the beginning. He also participated in the development of the Full Stack curriculum on all the statistical and Machine Learning parts, his specialties! Charles studied statistics at ENSAE before going to HEC. He then worked at PayWithMyBank in San Fransisco and MWM in the music industry as a Data Scientist. His missions? User profile analysis, trend prediction, preference modelling.
Read Less
Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Guillaume Gracieux
Guillaume Gracieux
Senior IT Security Consultant
 @
Computer systems know him well, and vice versa! After 6 years at university, Guillaume became a systems engineer for i-BP (Banque Populaire), CGG Veritas and then Talendus.
[...]
Read More
Guillaume Gracieux
He stayed there for no less than 3 years as a Pentesting engineer. He then joined the Econocom team as an SSI auditor and then OKIDOK where he conducted several Cybersecurity awareness workshops.
Read Less
Download our syllabus
FAQ
Your questions about training

What distance learning course should I take to become a Cybersecurity Analyst?

What are the basics of cybersecurity?

What is the pace of your distance learning course?

Have a question? Ask our Admissions team

Apply to

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.