Cyber Security
Fullstack

Cyber Security Training

Become an IT security expert, gain recognized certification and land your first job as a cybersecurity engineer or analyst.

Upcoming courses:
6
May
2024
17
June
2024
Apply
Download our syllabus
Hired or refunded badge
Build your future in data
Program

Become an Ethical Hacker in 450h

Cyberdefense is the challenge of the century for businesses. Phishing, ransomware, malware injection: the threats are numerous, and the need for experts is crying out.

At the end of your Fullstack Cybersecurity training at Jedha, you'll be able to :

  • Identify and exploit vulnerabilities in an organization
  • Apply security principles and protect an infrastructure
  • Detecting and responding to a cyber attack
Download program
Build your future in data

Create your own customized training program

Our Cyber security training courses are designed by level and can be combined. If you're new to IT security, you can start by taking our Cyber for Beginners course.

The program of our Cybersecurity training

From Zero to IT Hero

Before you start learning about cybersecurity, it's time for a refresher course in computer science! In this first module, you'll (re)discover the fundamentals of programming, how a computer and OS work, network protocols and how the web works.

Module 1

From Zero to IT Hero

Skills mastered
  • Programming: fundamentals, IDE, scripting in Bash and Python, discovering C and compilers.
  • How a computer works: in terms of components, architecture and operating system (Linux, MacOS, Windows).
  • Networks: discovery of the OSI model, the most common protocols (DNS, SMTP, POP3, FTP etc.) and other fundamental concepts (proxy, VPN, Wi-Fi, Bluetooth).
  • How the Web works: review of the HTTP protocol and the main languages (HTML, CSS, Javascript, PHP, SQL).
Recognition

It's time to get to the heart of the matter! You'll start your cybersecurity training with reconnaissance, an essential phase in the exploration of your "target". In this module, you'll learn active and passive methods for gathering information, as well as tools and techniques for identifying system vulnerabilities.

Module 2

Recognition

Skills acquired :
  • Information gathering techniques: mastery of passive and active methods, including the use of tools and techniques such as Google Dorking, Shodan, and OSINT.
  • Scanning tools such as Nmap, Netdiscover, Nessus and OpenVAS.
  • Discover enumeration and sniffing techniques.
Red Team

Discover the offensive side of cyber! In an IT department, the Red Team, made up of pentesters or ethical hackers, is responsible for identifying and preventively exploiting vulnerabilities. In this module, you'll learn to think like an attacker to better protect your future employers or customers!

Module 3

Red Team

Skills mastered :
  • Discover pentesting: methodology, exploit concept and use of Metasploit.
  • Web attacks: master various vulnerabilities and attacks, including OWASP, SQLi, XSS, and many more!
  • Network attacks: such as Spoofing, ARP poisoning, MITM, DHCP, and DNS.
  • OS operation and post-operation: Microsoft, Linux and MacOS.
  • Advanced attacks on Active Directory, Docker and radio-frequency systems.
  • Discover social engineering: techniques such as phishing.
Blue Team

The Blue Team has a defensive role: it protects IT systems and responds to cyberattacks. In this module, you'll put yourself in its shoes and learn how to strengthen your infrastructures, detect intrusions and respond to an attack.

Module 4

Blue Team

Skills mastered
  • Blue Team fundamentals: discovering the structure, key concepts, frameworks and tools used.
  • Reinforcing infrastructure protection: using hardening techniques.
  • Monitoring and intrusion detection: with tools for traffic capture & analysis, platform monitoring and much more.
Stealth Techniques

To exploit a vulnerability, penetration is only the first step. Hackers need to maintain access and cover their tracks. In this module, you'll discover the techniques they employ, so you'll be better equipped to counter them.

Module 5

Stealth Techniques

Skills mastered
  • Antivirus evasion: mastering techniques to thwart detection by antivirus software.
  • Persistence: discover the techniques needed to maintain discrete, continuous access to target systems.
  • Trace concealment: methods for erasing signs of malicious activity, including log falsification and timestamp manipulation.
Reporting

An often underestimated but crucial element in cybersecurity is the art of reporting, essential for communicating effectively on identified threats and implemented solutions! In this module, you'll learn how to create clear, hard-hitting pentest and compromise reports.

Module 6

Reporting

Skills mastered
  • Creation of pentest reports: mastery of methodology and tools (Flameshot, Pwndocs)
  • Compromise reports: to document intrusions and responses to them
Career & Final project

Your training is coming to an end! To facilitate your professional integration, a seasoned cybersecurity expert will share his vision of the market with you during a career coaching session. Then you'll put all your new skills into action during a Capture The Flag Attack and Defense: you'll take it in turns to play the roles of the Red Team and the Blue Team!

Module 7 & 8

Career & Final project

Skills mastered
  • Improving your CV: to make it impactful and in line with the standards of IT security professionals.
  • Online presence: perfect your LinkedIn profile and learn about personal branding to boost your profile on professional platforms.
  • Interview preparation: methods and tips for standing out from the crowd and highlighting your specialist skills.
  • Direct application of your new cybersecurity skills: reconnaissance, attack, evasion, defense and reporting.
See detailed program
Certifications

Double recognition of your skills

At the end of your cybersecurity training, you will be able to obtain 2 types of certification to demonstrate your skills on the job market:

  • Your certificate of achievement (your diploma!)

Thanks to the validation of this professional qualification, our training course is eligible for CPF and most public funding.

Read more

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sessions

Our next training sessions

Take your training by distance learning or at one of our 17 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse, Nantes and many other cities in France and Europe.

Part-time work
6
May
2024
30
Nov
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
17
Jun
2024
10
Sep
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Part-time work
8
Jul
2024
31
Dec
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Part-time work
9
Sep
2024
10
Apr
2025
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
16
Sep
2024
10
Dec
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
25
Nov
2024
28
Feb
2025
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Oops! No session in this format is planned at this time, contact us for more information

Vous ne savez pas quel format choisir ?

Découvrez nos modalités d’apprentissage en détail dans notre article dédié.

Course

How do I apply for our cybersecurity training course?

Nothing could be easier! Make an appointment with our team to refine your professional project. Depending on the course you choose and the necessary financing, your registration will take between 1 week and 1 month.

1

Career coaching

Discuss your career plans with our admissions team. We'll recommend the most suitable training and course format.

2

Placement test

Take a quick MCQ to assess your programming and systems skills.

3

Financing

Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.

Prerequisites

You'll need basic programming skills in Shell & Python. Alternatively, you can take our Cybersecurity for Beginners course to prepare yourself.

Learn Computer Security at your own pace

It's easy to turn your plans for a career change in cybersecurity into reality. Online or face-to-face training: we're sure to have a pentester training course to suit your career change plans!

Temps complet (3 mois)

  • 450 hours of classroom learning
  • Monday to Friday, 9:30am - 6pm
  • À temps complet sur 3 mois

Online or at one of our 17 campuses

  • Accelerated training
  • Prom spirit
  • Work discipline
Read more

Part-time (8 months)

  • 450 hours of blended learning (independent work, courses, coaching)
  • At your own pace (2 hours per day)
  • Part-time over 8 months

On line

  • Adapted to your professional and personal constraints
  • Independent learning
  • Accessible worldwide
Read more
Financing

Training Costs

Included in the course :

  • Access to courses for life
  • Close educational support
  • JULIE e-learning platform
  • Career coaching

Temps complet

7 495 €

Part-time work

7 495 €

Hired or Refunded Guarantee

We believe in you and our program. If you don't get a job within 6 months of becoming certified, we will refund your tuition. Learn more about our program

How to finance your training to become a computer security expert?

  • Personal Training Account (CPF)

Our Cybersecurity training course is eligible for the Compte Personnel de Formation (CPF). Use all or part of your CPF balance to pay for it.

  • Paiement en 3 fois sans frais

Étalez le paiement de votre formation en 3 mensualités, et cela sans aucun frais grâce à notre partenaire Stripe !

  • Low-rate student loans

Take advantage of a student loan at a preferential rate with Société Générale. There's no age limit, and you start repaying once you've completed your training.

  • Your employer or your OPCO

If you are employed, your employer can finance your training, either directly or through its OPCO. Our teams will help you put together a file.

Last but not least, our training is also eligible for a wide range of public funding schemes, including Pôle Emploi's AIF, Transitions Pro and other regional funding schemes.

Apply for the Course
Download our syllabus

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Testimonials

Succeed in your transition to Cybersecurity

Choose the best Cybersecurity training. Our alumni tell you how they became Cybersecurity experts thanks to our training:

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont

 - 

From Developer to Cybersecurity Consultant

@

French Tech logo

Quick bootcamp, big skills! The teachers were perfect, and make us realize the opportunities in the sector.

Barry Thien

 - 

Ethical Hacker

@

Webomatic

French Tech logo

It was a great experience! An intensive programme, taught and kept up to date with the latest technologies, ultra-competent teachers (thanks to them), connected to the tech world and very good communication between the team and the students. Once again, a great experience.

Olga Kurnosova

 - 

@

Jellysmack

French Tech logo
+2000
Students who have followed one or
several of our courses
87
 %
Of professional integration
within 6 months
4.98
 /5
Average rating awarded
by our students
Download our syllabus

The opportunities of our training in Cybersecurity

Faced with numerous cyber attacks, companies continue to recruit cyber defense profiles. Once you've completed your training in IT security, you'll be able to apply for a wide range of jobs in cybersecurity, either for a permanent contract or an internship: Pentester, Consultant or Cybersecurity Analyst.

Junior CISO

Our CISO training enables you to become responsible for protecting your company's information systems against cyber-attacks. The CISO implements security policies and manages security incidents in collaboration with IT teams.

Ethical Hacking and Cyber Defense taught by professionals

SOC Analyst, Senior Pentester, Ethical Hacker: these are the Jedha masters! Our trainers and course authors are seasoned cybersecurity specialists. They all wear both professional and teaching hats, giving them real expertise in cybersecurity. Our training courses are designed to pass this expertise on to you.

Charles Tanguy
Charles Tanguy
Lead Instructor
 @
Jedha
Our very own Jedha Master! Charles is our Lead Instructor, having taught at Jedha since the first sessions. A double graduate of ENSAE & HEC, Charles is also the guarantor of the excellence of Jedha's course content.
[...]
Read More
Charles Tanguy
A graduate in statistics from ENSAE and HEC Paris, Charles is our Lead Instructor. He first worked as a Data Scientist at PayWithMyBank in San Fransisco and then at MWM. Since 2018, he has been teaching Data Science and Data Engineering at Jedha and has participated in the development of most of our data training courses.
Read Less
Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Guillaume Gracieux
Guillaume Gracieux
Senior IT Security Consultant
 @
Computer systems know him well, and vice versa! After 6 years at university, Guillaume became a systems engineer for i-BP (Banque Populaire), CGG Veritas and then Talendus.
[...]
Read More
Guillaume Gracieux
He stayed there for no less than 3 years as a Pentesting engineer. He then joined the Econocom team as an SSI auditor and then OKIDOK where he conducted several Cybersecurity awareness workshops.
Read Less
Download our syllabus
FAQ

Your questions about training

What kind of education is needed to work in cybersecurity?

Where to get trained in Cybersecurity?

Is it possible to retrain in Cybersecurity without a degree?

What are the career prospects for cybersecurity training?

What language is used during training?

Is it necessary to use your own computer for your courses?

How much does cybersecurity training cost?

Have a question? Ask our Admissions team!

Apply to

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.