In Data, in Cybersecurity, but also in pure and hard program, a set of additional trainings are available on JULIE! Accessible for life.
Become a computer security expert, get a recognized certification and land your first Pentester or Cybersecurity Analyst position.
Realise your professional project thanks to the Cybersecurity Fullstack training which will allow you, in a short time, to get a job as a Pentester, Ethical Hacker, Cybersecurity Analyst or even Cybersecurity Developer.
Jedha's training courses are designed so that you can put your knowledge into practice as quickly as possible. During your programme, you will carry out no less than 10 cybersecurity projects that will help you master the challenges of the field and enrich your portfolio.
During the Fullstack Cybersecurity course, you will learn how to conduct penetration tests, suggest remedies to detect vulnerabilities in your organisation as early as possible and assess the extent of the threats it faces.
Cyber defense is the challenge of the century for companies. Phishing, ransomware, malware injection: the threats are numerous and the need for experts is crying out.
At the end of your Fullstack Cybersecurity training at Jedha, you will be able to:
- Identify and exploit an organization's vulnerabilities
- Apply security principles and protect an infrastructure
- Detect and respond to a cyber attack
Take your training remotely or at one of our 7 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse or Nantes.
Discuss your career plans with our admissions team.
We will recommend the most suitable training and course format.
Take a quick MCQ to evaluate your level in programming and mathematics.
Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.
The Fullstack Cybersecurity training is based on the same principles as the best Pentest frameworks. In particular, we have followed the PTES (Penetration Testing and Execution Standards) which ensures that you will learn techniques that you can apply directly in your business.
By starting your learning with the attack phases, you will be able to take a step back from the protection needs and best assess the risk that each vulnerability poses to the organisation you will be working for.
Consultants, marketers, financiers, developers, data analysts, but also sports coaches, journalists, veterinarians, it is the diversity of profiles of our community that makes it so rich. In this way, the only selection criterion we have is motivation. Consultants, marketers, financiers, developers, data analysts, but also sports coaches, journalists, veterinarians, it is the diversity of profiles of our community that makes it so rich. In this way, the only selection criterion we have is motivation.
It's amazing what you can achieve after 2 weeks of Essentials, and even more after 3 months of Fullstack!
Jean Moncade - From Sports Coach to Data Analyst
Anis Zakari - From Business Engineer to NLP Data Scientist
I understand the importance of being savvy in the data business, of learning to search by yourself!
1st Data Science Bootcamp in Europe, find the interview of Antoine, founder of Jedha.
Adrien Dodinet - From Data Analyst to Data Scientist @ TF1 & Freelance
Pupils confront their skills, discover new possibilities and experiment with what they have learned.
Charlène Dupont - From Actuarial Consultant to Data Scientist
The best way to prove your skills to your future recruiters? A portfolio: the concretisation of experience through practice, not through diplomas. During this Pentesting course, you will complete no less than 14 projects on each aspect of your training.
Just like Data, the growing need for cybersecurity experts is not a fad, but a fundamental issue for a majority of companies and organisations.
The reasons for this increase are diverse. First of all, the health crisis has weakened many companies, thus widening their vulnerabilities. But even before that, the exponential growth in the volume of data generated has also increased the value of these organisations. The new "black gold of the 21st century" that is data is the object of great covetousness for ill-intentioned people. One way to protect these 100% digital infrastructures is through IT security, or cybersecurity.
Cybersecurity professions are still recent but are very much in demand by companies who see their risk of attacks increase every day as the volume of data generated also grows.
The fact that these professions are still recent reinforces our belief that we want to train you in a field and not in a particular profession. This is why, on completion of the Cybersecurity course, a number of job titles with highly sought-after skills are available to you.
SOC analysts, Pentester (ethical hacker), Cybersecurity analysts, all of these are jobs that you can aim for on completion of your training.
To understand and fix system flaws, nothing is better than penetrating the system. Master the whole range of Penetration Testing methods, by joining a Red Team or a Blue Team.
Its purpose is to detect flaws in a system to ensure that data is properly protected. They will produce comprehensive reports for the CISO, the person responsible for securing information systems. If you are interested in the job of cybersecurity analyst, you will be in demand!
Working in the Security Operation Center, you will be responsible for the technical monitoring of a company's information system in the broadest sense. You will be responsible for monitoring the threats surrounding the company's infrastructure.
His mission is to protect the data and reliability of a company's computer system and its website. His role is to detect any security flaws in the internal networks.
Our Cybersecurity training is certifying: at the end of the 420h, you can take the Cybersecurity Auditor certification created and delivered by Jedha.
Consisting of 4 blocks of skills, this certification will allow you to showcase your skills in Cybersecurity to recruiters.
Our Cybersecurity Auditor certification is being registered in the National Directory of Professional Skills (RNCP level 7).
After our Fullstack Cybersecurity training, our alumni work as project managers, data analysts, business analysts or consultants in renowned companies.
SOC Analyst, Senior Pentester, Ethical Hacker: they are the Jedha Masters! Our trainers and the authors of our training courses are seasoned cybersecurity specialists. They all have a double hat of professional and teacher which allows them to have a real know-how in cybersecurity. Our trainings are designed to transmit this expertise to you.
By joining the Jedha community, you will have privileged access to our JULIE platform: a learning platform, much more than just a content portal! Additional trainings, events, Discord community, these are just some of the features you will find on JULIE.
The Fullstack Cybersecurity course is now open to you! If you have any questions about the programme, the tools taught, or the next sessions, please contact our admissions team by downloading the syllabus or by applying
I have strong basic skills in Cybersecurity
I want to professionalise and get my job in the sector
I make an appointment with the admissions team to find out everything!