Additional content
In Data, in Cybersecurity, but also in pure and hard program, a set of additional trainings are available on JULIE! Accessible for life.
Become a computer security expert, get a recognized certification and land your first Pentester or Cybersecurity Analyst position.
Realise your professional project thanks to the Cybersecurity Fullstack training which will allow you, in a short time, to get a job as a Pentester, Ethical Hacker, Cybersecurity Analyst or even Cybersecurity Developer.
Jedha's training courses are designed so that you can put your knowledge into practice as quickly as possible. During your programme, you will carry out no less than 10 cybersecurity projects that will help you master the challenges of the field and enrich your portfolio.
During the Fullstack Cybersecurity course, you will learn how to conduct penetration tests, suggest remedies to detect vulnerabilities in your organisation as early as possible and assess the extent of the threats it faces.
Cyber defense is the challenge of the century for companies. Phishing, ransomware, malware injection: the threats are numerous and the need for experts is crying out.
At the end of your Fullstack Cybersecurity training at Jedha, you will be able to:
- Identify and exploit an organization's vulnerabilities
- Apply security principles and protect an infrastructure
- Detect and respond to a cyber attack
Take your training remotely or at one of our 7 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse or Nantes.
Discuss your career plans with our admissions team.
We will recommend the most suitable training and course format.
Take a quick MCQ to evaluate your level in programming and mathematics.
Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.
The Fullstack Cybersecurity training is based on the same principles as the best Pentest frameworks. In particular, we have followed the PTES (Penetration Testing and Execution Standards) which ensures that you will learn techniques that you can apply directly in your business.
By starting your learning with the attack phases, you will be able to take a step back from the protection needs and best assess the risk that each vulnerability poses to the organisation you will be working for.
Whether you are a developer, a data professional or any other expertise in Tech, sooner or later you will be confronted with data protection or security issues. Having this double skill with Cybersecurity will only make you more attractive to recruiters. Whether you have the basics with Cybersecurity Essentials, or you want to get your job in Cybersecurity with the Fullstack training.
Consultants, marketers, financiers, developers, data analysts, but also sports coaches, journalists, veterinarians, it is the diversity of profiles of our community that makes it so rich. In this way, the only selection criterion we have is motivation. Consultants, marketers, financiers, developers, data analysts, but also sports coaches, journalists, veterinarians, it is the diversity of profiles of our community that makes it so rich. In this way, the only selection criterion we have is motivation.
It's amazing what you can achieve after 2 weeks of Essentials, and even more after 3 months of Fullstack!
Jean Moncade - From Sports Coach to Data Analyst
Anis Zakari - From Business Engineer to NLP Data Scientist
I understand the importance of being savvy in the data business, of learning to search by yourself!
The best way to prove your skills to your future recruiters? A portfolio: the concretisation of experience through practice, not through diplomas. During this Pentesting course, you will complete no less than 14 projects on each aspect of your training.
Just like Data, the growing need for cybersecurity experts is not a fad, but a fundamental issue for a majority of companies and organisations.
The reasons for this increase are diverse. First of all, the health crisis has weakened many companies, thus widening their vulnerabilities. But even before that, the exponential growth in the volume of data generated has also increased the value of these organisations. The new "black gold of the 21st century" that is data is the object of great covetousness for ill-intentioned people. One way to protect these 100% digital infrastructures is through IT security, or cybersecurity.
Cybersecurity professions are still recent but are very much in demand by companies who see their risk of attacks increase every day as the volume of data generated also grows.
The fact that these professions are still recent reinforces our belief that we want to train you in a field and not in a particular profession. This is why, on completion of the Cybersecurity course, a number of job titles with highly sought-after skills are available to you.
SOC analysts, Pentester (ethical hacker), Cybersecurity analysts, all of these are jobs that you can aim for on completion of your training.
Our Cybersecurity training is certifying: at the end of the 420h, you can take the Cybersecurity Auditor certification created and delivered by Jedha.
Consisting of 4 blocks of skills, this certification will allow you to showcase your skills in Cybersecurity to recruiters.
Our Cybersecurity Auditor certification is being registered in the National Directory of Professional Skills (RNCP level 7).
After our Fullstack Cybersecurity training, our alumni work as project managers, data analysts, business analysts or consultants in renowned companies.
SOC Analyst, Senior Pentester, Ethical Hacker: they are the Jedha Masters! Our trainers and the authors of our training courses are seasoned cybersecurity specialists. They all have a double hat of professional and teacher which allows them to have a real know-how in cybersecurity. Our trainings are designed to transmit this expertise to you.
By joining the Jedha community, you will have privileged access to our JULIE platform: a learning platform, much more than just a content portal! Additional trainings, events, Discord community, these are just some of the features you will find on JULIE.
Your main tool will be your computer! It is therefore essential that you come with your own machine. We do not provide computers so that you can feel comfortable and familiar with your own gear. We provide access to all the necessary tools and platforms you will need for the programme. To follow the Cyber Security courses, it will be useful to have a computer with 8GB of RAM, and some free storage available.
The Pentester's job ? A professional who ensures the security of computer networks by means of penetration tests which consist of finding security flaws in a system and carrying out controlled attacks. Because of his missions, the Pentester must master the techniques of protection, but also of attacking the infrastructure. Thus, in the Cybersecurity department of his company, he can join the Blue Team (the one in charge of protecting the infrastructure) or the Red Team (dealing with the attack).
Passwords hold no secrets for him. The cryptologist's job ensures the security of sensitive digital data such as passwords, bank card numbers or account identifiers. He develops coding methods based on complex algorithms. As a result, it is a highly technical job, since it involves not only cybersecurity, but also development and data science. It is a job that you will get closer to following the Fullstack Cybersecurity training, but which will require additional training.
Cryptologist, Pentester, Cybersecurity analyst, IT specialist, all refer to the Information Systems Security Manager. This job of CISO is to establish the global protection strategy for all the company's digital infrastructures. To do so, the CISO must have a good knowledge of the Cyber environment of his company, but also know the core business and cyber issues of his company.
The Fullstack Cybersecurity course is now open to you! If you have any questions about the programme, the tools taught, or the next sessions, please contact our admissions team by downloading the syllabus or by applying
I have strong basic skills in Cybersecurity
I want to professionalise and get my job in the sector
I make an appointment with the admissions team to find out everything!