Workshop : Introduction to Python
Thursday, June 15, 7 p.m.
On line

Take your first steps in Python, the programming language you need to master in Data and Cybersecurity!

Sign up
Cyber Security
Fullstack

Cyber Security Training

Become a computer security expert, get a recognized certification and land your first job as a pentester or cybersecurity analyst.

4.98/5 according to our 1600 students
Upcoming courses:
3
July
2023
4
September
2023
Apply
Download our syllabus
Hired or refunded badge
Build your future in data
Program

Become an Ethical Hacker in 420h

Cyber defense is the challenge of the century for companies. Phishing, ransomware, malware injection: the threats are numerous and the need for experts crying out. At the end of your Fullstack Cybersecurity training at Jedha, you will be able to:

  • Identify and exploit vulnerabilities in an organization
  • Apply security principles and protect an infrastructure
  • Detecting and responding to a cyber attack
Download our syllabus
Build your future in data

The program of our Cybersecurity training

Discovery of the Cyber

Let's get into the heart of the Cybersecurity universe with the main concepts of networking, authentication, encryption. We will then study the basics of Python for Cybersecurity and review the terminal command lines of your computer and you will understand what goes on behind the scenes. You will be able to make different servers on the same network interact thanks to the file sharing protocol to better solidify your network infrastructure and protect it.

Modules 1 & 2

Discovery of the Cyber

We will then go deeper into the main network protocols: the concepts of spoofing, hijacking, man-in-the-middle will no longer hold any secrets for you. You will also understand in detail the constitution of a Web network with the Internet Protocol (IP), the DNS; we will also focus on Microsoft architectures, the first victims of cyber-attacks.

Recognition & Cyber-attack

Let's get into the details of what reconnaissance is, this first phase before any attack or pentest. You will practice active and passive reconnaissance techniques to gather information about your target via tools like nmap, shodan and the OSINT framework. We will go as far as discovering the first vulnerabilities.

Modules 3 & 4

Recognition & Cyber-attack

Based on the latest OWASP 10 ranking, we will explore each of the 10 most well-known cyber-attacks: how they work, where they come from, how to remedy these flaws, you will master all these attacks. Your knowledge of Python, SQL and Javascript will come in handy! You will also learn how to bypass anti-virus software to make your exploits more difficult to detect.

Vulnerabilities & Flaws

Now that you have researched and discovered the main vulnerabilities in a network, it is time to learn how to exploit them. In the new phase of vulnerability exploration, you will use the most famous Cybersecurity frameworks - Metasploit, Beef. In this module, you will understand the underbelly of a machine and you will discover what a Buffer Overflow is, and you will finish with crackme challenges, testing your ability to crack software.

Modules 5 & 6

Vulnerabilities & Flaws

You will also learn how to exploit and remedy vulnerabilities in Microsoft systems, which have been the target of numerous cyberattacks in recent years. You will become familiar with their Active Directory and their vulnerabilities. You will master the Bloohound tool to map the most efficient paths to the heart of an infrastructure in a very simple way.

Post-operation & Wireless

Once the flaws & vulnerabilities are exploited, you need to think about the "after". Your goal will be to make it impossible for potential hackers to elevate their access privileges to other, much broader information. This is called Post-Exploitation. You will also see how to install backdoors on an infrastructure and how to detect them if you did not place them.

Modules 7 & 8

Post-operation & Wireless

Finally, you will learn in this module how to write Pentest audit reports, according to best practices, that you will deliver to your future customers so that they can make the right decisions about the actions to take on the protection of their infrastructure.

Red Team & Cyber Projects

Now put on the hat of a member of a Red Team, a group of ethical hackers responsible for detecting, preventing and eliminating vulnerabilities. You will first learn how to use forensic methodologies to investigate and retrieve information.

Modules 9 & 10

Red Team & Cyber Projects

Still within the framework of a Red Team, you will be familiarized with the concept of White malware and its C&C regulations (Control & Command) allowing to hijack information, to take administrative controls.

Download our syllabus
Sessions

Learn Computer Security at your own pace

Make your cybersecurity career transition project a reality. Online training, or Bootcamp: we have a pentester training that fits your project!

Bootcamp

  • 420 hours of classes over 3 months
  • Monday to Friday, 10am - 6pm
At one of our 19 campuses or online
  • Short course
  • Limited number of students
  • Prom spirit
Read more

Online training

  • At your own pace over 30 weeks
  • 420 hours of online content
  • 1 live class per module
  • Individual coaching on demand
Distance learning
  • Adapted to your rhythm
  • Accessible anywhere in the world
Read more

Our next training sessions

Take your training remotely or at one of our 19 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse, Nantes and many other cities in France and Europe.

On line
3
Jul
2023
28
Jan
2024
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
On line
4
Sep
2023
31
Mar
2024
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
Bootcamp
18
Sep
2023
11
Dec
2023
Monday to Friday
10am - 6pm
🇫🇷
French
Last seats!
Sign up
On line
6
Nov
2023
2
Jun
2024
Individual coaching on demand
1 live class per module
🇫🇷
French
Last seats!
Sign up
On line
6
Nov
2023
2
Jun
2024
Individual coaching on demand
1 live class per module
🇬🇧
English
Last seats!
Sign up
Bootcamp
12
Feb
2024
3
May
2024
Monday to Friday
10am - 6pm
🇫🇷
French
Last seats!
Sign up
Oops! No session in this format is planned at this time, contact us for more information

Do you need maximum flexibility? With our distance learning program, you can follow the program at your own pace online, while benefiting from individualized coaching.

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Course of action

How to apply for our Pentester training?

Nothing could be easier! Make an appointment with our team to refine your professional project. Depending on the course you choose and the necessary financing, your registration will take between 1 week and 1 month.

1

Prerequisites

You must have basic programming skills in Shell & Python. Otherwise, you can take our Cybersecurity for Beginners course to prepare yourself.

2

Career coaching

Discuss your career plans with our admissions team.
We will recommend the most suitable course and format.

3

MCQS

Take a quick MCQ to assess your level in programming and mathematics.

4

Financing

Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.

How does the Cybersecurity training take place?

10h

Course review

Guided by the teacher, start the day by reviewing the concepts from the previous class.

10h15

Theoretical course

Every day, discover new theoretical concepts accompanied by our teacher.

12h

Putting it into practice

Before lunch, apply the concepts you have just learned with simple exercises.

13h30

Challenges

Challenges, very professionalizing practical exercises in the form of projects.

16h

Office Hours

Work on courses and projects independently or with the help of our teacher assistants.

18h

Events

Participate in our events to build your professional network and learn more about the industry.

Build your future in data

Our distance learning course adapts to your personal constraints while offering you a real individualized follow-up: you are accompanied from start to finish!

‍Working supports

‍Benefit fromlifetime access to our e-learning platform JULIE : 

  • Written & video courses
  • Exercises
  • Projects‍

Pedagogical support

‍Enjoythe best coaching ever offered in distance learning: 

  • Teaching Assistants available daily from 5:00 pm to 7:00 pm
  • 7 hours of live instruction per module
Build your future in data
Download our syllabus
Financing

Training Costs

Included in the training :

  • Access to courses for life
  • Close educational support
  • JULIE e-learning platform
  • Career coaching

Bootcamp

6 995 €

On line

6 995 €

Hired or Refunded Guarantee

We believe in you and our program. If you don't get a job within 6 months of becoming certified, we will refund your tuition. Learn more about our program

How to finance your training to become a computer security expert?

  • Public funding

Our diploma course is eligible for numerous public funding programs: CPF, Pôle Emploi (AIF or POEI), Transition Pro, local funding.

  • Payment in installments

Take advantage of our 3-installment payment plan, or spread your training costs over several monthly installments (up to 60) with our partners Pledg and Cresh.

  • Your employer or your OPCO

If you are currently working or doing a Cybersecurity training course on a sandwich course, your employer can finance your training, either directly or via its OPCO. Our teams will help you put together a file.

  • Low-interest loans

Finance the cost of your data analysis training with low or no interest loans offered by our partner Crédit du Nord.

Apply for the Course
Download our syllabus
Certification

Cybersecurity Auditor Certification

Our Cybersecurity training is certifying: at the end of the 420h, you will be able to pass the Cybersecurity Auditor certification created and delivered by Jedha.

Consisting of 4 blocks of skills, this certification will allow you to show your skills in Cybersecurity to recruiters.

Discover our certification

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Testimonials

Succeed in your transition to Cybersecurity

Choose the best Cybersecurity training. Our alumni tell you how they became Cybersecurity experts thanks to our training:

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont

 - 

From Developer to Cybersecurity Consultant

@

French Tech logo

Quick bootcamp, big skills! The teachers were perfect, and make us realize the opportunities in the sector.

Barry Thien

 - 

Ethical Hacker

@

Webomatic

French Tech logo

It was a great experience! An intensive programme, taught and kept up to date with the latest technologies, ultra-competent teachers (thanks to them), connected to the tech world and very good communication between the team and the students. Once again, a great experience.

Olga Kurnosova

 - 

@

Jellysmack

French Tech logo
1600
Students who have followed one or
several of our courses
87
 %
Of professional integration
within 6 months
4.98
 /5
Average rating awarded
by our students
Download our syllabus

The opportunities of our training in Cybersecurity

Faced with numerous cyber attacks, companies continue to recruit cyber defense profiles. Once you've completed your training in IT security, you'll be able to apply for a wide range of jobs in cybersecurity, either for a permanent contract or an internship: Pentester, Consultant or Cybersecurity Analyst.

Pentester

The pentester is in charge of controlling the security of computer networks. In order to understand and resolve system flaws, he/she carries out "penetration tests". Our Cybersecurity training will enable you to master the skills of Pentesting and to join a Red Team or a Blue Team.

Ethical Hacking and Cyber Defense taught by professionals

SOC Analyst, Senior Pentester, Ethical Hacker: these are the Jedha masters! Our trainers and course authors are seasoned cybersecurity specialists. They all wear both professional and teaching hats, giving them real expertise in cybersecurity. Our training courses are designed to pass this expertise on to you.

Charles Tanguy
Charles Tanguy
Lead Instructor
 @
Jedha
Our very own Jedha Master! Charles is our Lead Instructor, having taught at Jedha since the first sessions. A double graduate of ENSAE & HEC, Charles is also the guarantor of the excellence of Jedha's course content.
[...]
Read More
Charles Tanguy
Charles is our Lead Instructor, having taught at Jedha since the beginning. He also participated in the development of the Full Stack curriculum on all the statistical and Machine Learning parts, his specialties! Charles studied statistics at ENSAE before going to HEC. He then worked at PayWithMyBank in San Fransisco and MWM in the music industry as a Data Scientist. His missions? User profile analysis, trend prediction, preference modelling.
Read Less
Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Guillaume Gracieux
Guillaume Gracieux
Senior IT Security Consultant
 @
Computer systems know him well, and vice versa! After 6 years at university, Guillaume became a systems engineer for i-BP (Banque Populaire), CGG Veritas and then Talendus.
[...]
Read More
Guillaume Gracieux
He stayed there for no less than 3 years as a Pentesting engineer. He then joined the Econocom team as an SSI auditor and then OKIDOK where he conducted several Cybersecurity awareness workshops.
Read Less
Download our syllabus
FAQ
Your questions about training

Do I have to bring my own computer?

What training to learn cybersecurity?

Where to get trained in Cybersecurity?

Is it possible to retrain in Cybersecurity without a degree?

How much does a Cybersecurity training cost?

Have a question? Ask our Admissions team

Apply to

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.