Cyber Security
Fullstack

Cyber Security Training

Apprenez à sécuriser et auditer une infrastructure de A à Z, obtenez un diplôme de niveau Bac +4 et décrochez votre premier poste dans la Cybersécurité.

Upcoming courses:
Apply
Download our syllabus
Hired or refunded badge
Build your future in data
Program

Become an Ethical Hacker in 450h

Cyberdefense is the challenge of the century for businesses. Phishing, ransomware, malware injection: the threats are numerous, and the need for experts is crying out.

At the end of your Fullstack Cybersecurity training at Jedha, you'll be able to :

  • Identify and exploit vulnerabilities in an organization
  • Apply security principles and protect an infrastructure
  • Detecting and responding to a cyber attack
Download program
Build your future in data

Create your own customized training program

Nos formations en Cybersécurité sont conçues par niveau et peuvent se combiner. Si vous débutez en sécurité informatique, vous pouvez d’abord suivre notre formation Cyber pour débutant. Et pour aller plus loin, nous proposons une formation avancée en Cybersécurité.

The program of our Cybersecurity training

From Zero to IT Hero

Before you start learning about cybersecurity, it's time for a refresher course in computer science! In this first module, you'll (re)discover the fundamentals of programming, how a computer and OS work, network protocols and how the web works.

Module 1

From Zero to IT Hero

Skills mastered
  • Programming: fundamentals, IDE, scripting in Bash and Python, discovering C and compilers.
  • How a computer works: in terms of components, architecture and operating system (Linux, MacOS, Windows).
  • Networks: discovery of the OSI model, the most common protocols (DNS, SMTP, POP3, FTP etc.) and other fundamental concepts (proxy, VPN, Wi-Fi, Bluetooth).
  • How the Web works: review of the HTTP protocol and the main languages (HTML, CSS, Javascript, PHP, SQL).
Recognition

It's time to get to the heart of the matter! You'll start your cybersecurity training with reconnaissance, an essential phase in the exploration of your "target". In this module, you'll learn active and passive methods for gathering information, as well as tools and techniques for identifying system vulnerabilities.

Module 2

Recognition

Skills acquired :
  • Information gathering techniques: mastery of passive and active methods, including the use of tools and techniques such as Google Dorking, Shodan, and OSINT.
  • Scanning tools such as Nmap, Netdiscover, Nessus and OpenVAS.
  • Discover enumeration and sniffing techniques.
Red Team

Discover the offensive side of cyber! In an IT department, the Red Team, made up of pentesters or ethical hackers, is responsible for identifying and preventively exploiting vulnerabilities. In this module, you'll learn to think like an attacker to better protect your future employers or customers!

Module 3

Red Team

Skills mastered :
  • Discover pentesting: methodology, exploit concept and use of Metasploit.
  • Web attacks: master various vulnerabilities and attacks, including OWASP, SQLi, XSS, and many more!
  • Network attacks: such as Spoofing, ARP poisoning, MITM, DHCP, and DNS.
  • OS operation and post-operation: Microsoft, Linux and MacOS.
  • Advanced attacks on Active Directory, Docker and radio-frequency systems.
  • Discover social engineering: techniques such as phishing.
Blue Team

The Blue Team has a defensive role: it protects IT systems and responds to cyberattacks. In this module, you'll put yourself in its shoes and learn how to strengthen your infrastructures, detect intrusions and respond to an attack.

Module 4

Blue Team

Skills mastered
  • Blue Team fundamentals: discovering the structure, key concepts, frameworks and tools used.
  • Reinforcing infrastructure protection: using hardening techniques.
  • Monitoring and intrusion detection: with tools for traffic capture & analysis, platform monitoring and much more.
Stealth Techniques

To exploit a vulnerability, penetration is only the first step. Hackers need to maintain access and cover their tracks. In this module, you'll discover the techniques they employ, so you'll be better equipped to counter them.

Module 5

Stealth Techniques

Skills mastered
  • Antivirus evasion: mastering techniques to thwart detection by antivirus software.
  • Persistence: discover the techniques needed to maintain discrete, continuous access to target systems.
  • Trace concealment: methods for erasing signs of malicious activity, including log falsification and timestamp manipulation.
Reporting

An often underestimated but crucial element in cybersecurity is the art of reporting, essential for communicating effectively on identified threats and implemented solutions! In this module, you'll learn how to create clear, hard-hitting pentest and compromise reports.

Module 6

Reporting

Skills mastered
  • Creation of pentest reports: mastery of methodology and tools (Flameshot, Pwndocs)
  • Compromise reports: to document intrusions and responses to them
Career & Final project

Your training is coming to an end! To facilitate your professional integration, a seasoned cybersecurity expert will share his vision of the market with you during a career coaching session. Then you'll put all your new skills into action during a Capture The Flag Attack and Defense: you'll take it in turns to play the roles of the Red Team and the Blue Team!

Module 7 & 8

Career & Final project

Skills mastered
  • Improving your CV: to make it impactful and in line with the standards of IT security professionals.
  • Online presence: perfect your LinkedIn profile and learn about personal branding to boost your profile on professional platforms.
  • Interview preparation: methods and tips for standing out from the crowd and highlighting your specialist skills.
  • Direct application of your new cybersecurity skills: reconnaissance, attack, evasion, defense and reporting.
See detailed program
Certifications

Double recognition of your skills

At the end of your cybersecurity training, you will be able to obtain 2 types of certification to demonstrate your skills on the job market:

  • Your certificate of achievement (your diploma!)

Thanks to the validation of this professional qualification, our training course is eligible for CPF and most public funding.

Read more

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sessions

Our next training sessions

Take your training by distance learning or at one of our 17 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse, Nantes and many other cities in France and Europe.

Part-time work
9
Sep
2024
6
Apr
2025
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
16
Sep
2024
10
Dec
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Part-time work
4
Nov
2024
1
Jun
2025
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
25
Nov
2024
28
Feb
2025
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Part-time work
6
Jan
2025
3
Aug
2025
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
3
Feb
2025
28
Apr
2025
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Oops! No session in this format is planned at this time, contact us for more information

Vous ne savez pas quel format choisir ?

Découvrez nos modalités d’apprentissage en détail dans notre article dédié.

Course

How do I apply for our cybersecurity training course?

Nothing could be easier! Make an appointment with our team to refine your professional project. Depending on the course you choose and the necessary financing, your registration will take between 1 week and 1 month.

1

Career coaching

Discuss your career plans with our admissions team. We'll recommend the most suitable training and course format.

2

Placement test

Take a quick MCQ to assess your programming and systems skills.

3

Financing

Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.

Prerequisites

  • You'll need basic programming skills in Shell & Python. Alternatively, you can take our Cybersecurity for Beginners course to prepare yourself.
  • Il est également nécessaire d'être à l'aise pour lire et comprendre des contenus en anglais (niveau B1/B2) : nos cours sont dispensés en français mais les ressources pédagogiques (cours écrits, exercices, projets) sont en anglais.

Learn Computer Security at your own pace

It's easy to make your cybersecurity career change a reality. Online or face-to-face training: we're sure to have a pentester training course to suit your career change plans!

Temps complet (3 mois)

  • 450 hours of classroom learning
  • Monday to Friday, 9:30am - 6pm
  • À temps complet sur 3 mois

Online or at one of our 17 campuses

  • Accelerated training
  • Prom spirit
  • Work discipline
Read more

Temps partiel (7 mois)

  • 450 hours of blended learning (independent work, courses, coaching)
  • At your own pace (2 hours per day)
  • À temps partiel sur 7 mois

On line

  • Adapted to your professional and personal constraints
  • Independent learning
  • Accessible worldwide
Read more
Financing

Training Costs

Included in the course :

  • Access to courses for life
  • Close educational support
  • JULIE e-learning platform
  • Career coaching

Temps complet

7 495 €

Part-time work

7 495 €

Hired or Refunded Guarantee

We believe in you and our program. If you don't get a job within 6 months of becoming certified, we will refund your tuition. Learn more about our program

Comment financer votre formation en cybersécurité ?

  • Personal Training Account (CPF)

Our Cybersecurity training course is eligible for the Compte Personnel de Formation (CPF). Use all or part of your CPF balance to pay for it.

  • Paiement en 3 fois sans frais

Étalez le paiement de votre formation en 3 mensualités, et cela sans aucun frais grâce à notre partenaire Stripe !

  • Low-rate student loans

Take advantage of a student loan at a preferential rate with Société Générale. There's no age limit, and you start repaying once you've completed your training.

  • Your employer or your OPCO

If you are employed, your employer can finance your training, either directly or through its OPCO. Our teams will help you put together a file.

Last but not least, our training is also eligible for a wide range of public funding schemes, including Pôle Emploi's AIF, Transitions Pro and other regional funding schemes.

Apply for the Course
Download our syllabus

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Testimonials

Succeed in your transition to Cybersecurity

Choose the best Cybersecurity training. Our alumni tell you how they became Cybersecurity experts thanks to our training:

Les instructeurs sont compétents et passionnés, et l'atmosphère collaborative du campus de Paris a vraiment enrichi mon expérience d'apprentissage. Je recommande vivement Jedha ! May The 4th Be With You.

Ahmed Housni

 - 

Consultant en Cybersécurité

@

French Tech logo

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont

 - 

From Developer to Cybersecurity Consultant

@

French Tech logo

It was a great experience! An intensive programme, taught and kept up to date with the latest technologies, ultra-competent teachers (thanks to them), connected to the tech world and very good communication between the team and the students. Once again, a great experience.

Olga Kurnosova

 - 

@

Jellysmack

French Tech logo
97%
Taux de diplomation
98 %
Taux de satisfaction
93 %
Taux d'insertion à 2 ans
Download our syllabus

The opportunities of our training in Cybersecurity

Confrontées à de nombreuses cyberattaques, les entreprises continuent à recruter des profils en cyberdéfense.

À l'issue de votre formation en sécurité informatique, vous pourrez postuler à de très nombreux métiers de la cybersécurité, pour un CDI ou un stage : RSSI Junior, Pentester Junior ou Analyste en Cybersécurité.

Junior CISO

Le Responsable de la Sécurité des Systèmes d'Information (RSSI) met en place des politiques de sécurité et gère les incidents de sécurité en collaboration avec les équipes informatiques. C'est un poste crucial qui nécessite une certaine expérience. Notre formation RSSI vous permettra d'occuper ce poste à un niveau junior, accompagné par un professionnel plus senior.

Ethical Hacking and Cyber Defense taught by professionals

SOC Analyst, Senior Pentester, Ethical Hacker: these are the Jedha masters! Our trainers and course authors are seasoned cybersecurity specialists. They all wear both professional and teaching hats, giving them real expertise in cybersecurity. Our training courses are designed to pass this expertise on to you.

Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Guillaume Gracieux
Guillaume Gracieux
Senior IT Security Consultant
 @
Computer systems know him well, and vice versa! After 6 years at university, Guillaume became a systems engineer for i-BP (Banque Populaire), CGG Veritas and then Talendus.
[...]
Read More
Guillaume Gracieux
He stayed there for no less than 3 years as a Pentesting engineer. He then joined the Econocom team as an SSI auditor and then OKIDOK where he conducted several Cybersecurity awareness workshops.
Read Less
Jordan Douliez
Jordan Douliez
Safety Engineer
 @
Thales
Jordan is one of the authors of our Cybersecurity programmes! After 5 years at the École des Hautes Technologies et du Numérique, Jordan held positions as Scrum Master & developer and then technical project manager.
[...]
Read More
Jordan Douliez
Following his experience as a Technical Project Manager, he joined Thalès as a Security Engineer. In parallel, he works as a freelancer, allowing him to work in various sectors!
Read Less
Download our syllabus
FAQ

Your questions about training

What kind of education is needed to work in cybersecurity?

Where to get trained in Cybersecurity?

Is it possible to retrain in Cybersecurity without a degree?

What are the career prospects for cybersecurity training?

What language is used during training?

Is it necessary to use your own computer for your courses?

How much does cybersecurity training cost?

Have a question? Ask our Admissions team!

Apply to

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.