Cybersecurity
Fullstack

Cybersecurity training - 420h

Become a computer security expert, get a recognized certification and land your first Pentester or Cybersecurity Analyst position.

View the Syllabus
Chat with our team
Build your future in data

Become an Ethical Hacker in 3 months

Start your career in Cybersecurity

Realise your professional project thanks to the Cybersecurity Fullstack training which will allow you, in a short time, to get a job as a Pentester, Ethical Hacker, Cybersecurity Analyst or even Cybersecurity Developer.

Learn by doing and build your portfolio

Jedha's training courses are designed so that you can put your knowledge into practice as quickly as possible. During your programme, you will carry out no less than 10 cybersecurity projects that will help you master the challenges of the field and enrich your portfolio.

Detect and remedy weaknesses in your organisation

During the Fullstack Cybersecurity course, you will learn how to conduct penetration tests, suggest remedies to detect vulnerabilities in your organisation as early as possible and assess the extent of the threats it faces.

A tight labour market

Cyber defense is the challenge of the century for companies. Phishing, ransomware, malware injection: the threats are numerous and the need for experts is crying out.

At the end of your Fullstack Cybersecurity training at Jedha, you will be able to:
- Identify and exploit an organization's vulnerabilities
- Apply security principles and protect an infrastructure
- Detect and respond to a cyber attack

Discover our syllabus
Jedha bootcamp fullstack cyber security programme

The curriculum of our Cybersecurity training

Let's get into the heart of the Cybersecurity world with the main concepts of networking,authentication, encryption. We will then study the basics of Python for Cybersecurity and review the terminal command lines of your computer and you will understand what goes on behind the scenes. You will be able to make different servers on the same network interact with each other using the file sharing protocol to better solidify and protect your network infrastructure.

We will then go deeper into the main network protocols: the concepts of spoofing, hijacking, man-in-the-middle will no longer hold any secrets for you. You will also understand in detail the constitution of a Web network with the Internet Protocol (IP), DNS; we will also focus on Microsoft architectures, the first victims of cyber-attacks.
Let's get into the details of what reconnaissance is, that first phase before any attack or pentest. You will practice active and passive reconnaissance techniques to gather information about your target via tools like nmap, shodan and the OSINT framework. We will go as far as discovering early vulnerabilities.

Based on the latest OWASP 10 ranking, we will explore each of the 10 most known cyber-attacks: how they work, where they come from, how to remedy these vulnerabilities, all of these attacks you will master. Your knowledge of Python, SQL and Javascript will come in handy! You will also learn how to bypass anti-virus software to make your exploits more difficult to detect.
Now that you have researched and discovered the main vulnerabilities in a network, it is time to learn how to exploit them. In the new phase of vulnerability exploration, you will use the most popular Cybersecurity frameworks - Metasploit, Beef. In this module, you will understand the underbelly of a machine and discover what a Buffer Overflow is, and you will finish with crackme challenges, testing your ability to crack software.
You will also learn how to exploit and remedy flaws in Microsoft systems, which have been the target of numerous cyber attacks in recent years. You will become familiar with their Active Directory and their vulnerabilities. You will master the Bloohound tool to map the most efficient paths to the heart of an infrastructure in a very simple way.
Once the flaws & vulnerabilities have been exploited, you need to think about the "after". Your goal will be to make it impossible for potential hackers to elevate their access privileges to other, much broader information. This is called Post-Exploitation. You will also see how to install backdoors on an infrastructure and how to detect them if they were not placed by you. Finally, you will learn in this module how to write best practice Pentest Audit Reports that you will deliver to your future clients so that they can make the right decisions about what actions to take to protect their infrastructure.  
Now put on the hat of a member of a Red Team, a group of ethical hackers responsible for detecting, preventing and eliminating vulnerabilities. You will first learn how to use forensic methodologies to investigate and recover information. Still within the framework of a Red Team, you will be familiarised with the concept of White malware and its C&C regulations (Control & Command) allowing to divert information, to take administrative controls.
Discover the world of Cyber
Modules 1 & 2
plus sign
Recognition and Cyber-attacks
Modules 3 & 4
plus sign
Exploring vulnerabilities and loopholes
Modules 5 & 6
plus sign
Post-operation and wireless
Modules 7 & 8
plus sign
Leading your Cyber projects
Modules 9 & 10
plus sign
Download the Complete Syllabus

Our next training sessions

Take your training remotely or at one of our 7 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse or Nantes.

Paris
🗣 
🇫🇷
Part-time
17
Apr
23
Oct
Monday - Saturday | 10am - 6pm
Monday - Saturday | 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
24
Apr
21
Jul
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
17
Apr
23
Oct
Monday - Saturday | 10am - 6pm
Monday - Saturday | 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
24
Apr
21
Jul
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
17
Apr
23
Oct
Monday - Saturday | 10am - 6pm
Monday - Saturday | 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
24
Apr
21
Jul
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
Oops! No bootcamp is planned here soon, contact us for more information.
🗣 
🇫🇷
Part-time
17
Apr
23
Oct
Monday - Saturday | 10am - 6pm
Monday - Saturday | 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
24
Apr
21
Jul
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
17
Apr
23
Oct
Monday - Saturday | 10am - 6pm
Monday - Saturday | 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
24
Apr
21
Jul
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
17
Apr
23
Oct
Monday - Saturday | 10am - 6pm
Monday - Saturday | 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
24
Apr
21
Jul
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Part-time
17
Apr
23
Oct
Monday - Saturday | 10am - 6pm
Monday - Saturday | 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply
🗣 
🇫🇷
Full Time
24
Apr
21
Jul
Monday to Friday 10am - 6pm
Monday to Friday 10am - 6pm
5
available places
Only 2 places left!
Last place available !
Apply

How to apply for our Pentester training?

Nothing could be easier! Make an appointment with our team to refine your professional project. Depending on the course you choose and the necessary financing, your registration will take between 1 week and 1 month.
Professor Jedha in his classroom

Discuss your career plans with our admissions team.

We will recommend the most suitable training and course format.

Take a quick MCQ to evaluate your level in programming and mathematics.

Make your project a reality with the help of our team.

Searching for financing, putting together the file: we accompany you from A to Z.

Download the Complete Syllabus

The best in Cybersecurity

The Fullstack Cybersecurity training is based on the same principles as the best Pentest frameworks. In particular, we have followed the PTES (Penetration Testing and Execution Standards) which ensures that you will learn techniques that you can apply directly in your business.

By starting your learning with the attack phases, you will be able to take a step back from the protection needs and best assess the risk that each vulnerability poses to the organisation you will be working for.

Learn More About Our Training Courses

Ethical Hacking training: your profile

The objectives of our alumni are diverse, but the Fullstack Cybersecurity training is built to adapt to each one. Because there is the same convergence: to get a job in Cybersecurity or to become an IT security expert.

I have a Tech background but would like to have additional skills

Words From Our Former Students

Consultants, marketers, financiers, developers, data analysts, but also sports coaches, journalists, veterinarians, it is the diversity of profiles of our community that makes it so rich. In this way, the only selection criterion we have is motivation. Consultants, marketers, financiers, developers, data analysts, but also sports coaches, journalists, veterinarians, it is the diversity of profiles of our community that makes it so rich. In this way, the only selection criterion we have is motivation.

It's amazing what you can achieve after 2 weeks of Essentials, and even more after 3 months of Fullstack!

Jean Moncade - From Sports Coach to Data Analyst

French Tech logo

Anis Zakari - From Business Engineer to NLP Data Scientist

I understand the importance of being savvy in the data business, of learning to search by yourself!

French Tech logo
See more testimonials

1st Data Science Bootcamp in Europe, find the interview of Antoine, founder of Jedha.

Adrien Dodinet - From Data Analyst to Data Scientist @ TF1 & Freelance

French Tech logo

Pupils confront their skills, discover new possibilities and experiment with what they have learned.

Charlène Dupont - From Actuarial Consultant to Data Scientist

French Tech logo

A complete portfolio of 14 Cybersecurity projects

The best way to prove your skills to your future recruiters? A portfolio: the concretisation of experience through practice, not through diplomas. During this Pentesting course, you will complete no less than 14 projects on each aspect of your training.

Recognition
Your module's project on the reconnaissance phase! Two new networks have been detected in your cyberspace. You will need to gather as much information as possible about these networks in order to assess their security, and then you will need to draw on this information for reporting purposes.
Web Penetration
Use the theoretical and technical skills you acquired in the previous 2 modules to carry out your first cyber-attack!
You will highlight the vulnerabilities of the affected IT infrastructure. You will have to use one of the hacking methods described by the OWASP 10.
CVE exploitation
When a defect on a machine is detected, it becomes what is called a CVE (Common Vulnerabilities and Exposures). For your Demoday, you will work on a CVE in order to explain its origin, how it works and how to remedy it during a final presentation!
Check Out Our Blog

Larger data volume: greater cyber risk

Just like Data, the growing need for cybersecurity experts is not a fad, but a fundamental issue for a majority of companies and organisations.

The reasons for this increase are diverse. First of all, the health crisis has weakened many companies, thus widening their vulnerabilities. But even before that, the exponential growth in the volume of data generated has also increased the value of these organisations. The new "black gold of the 21st century" that is data is the object of great covetousness for ill-intentioned people. One way to protect these 100% digital infrastructures is through IT security, or cybersecurity.

Learn More About Our Training Courses

The opportunities of our training in Cybersecurity

Cybersecurity professions are still recent but are very much in demand by companies who see their risk of attacks increase every day as the volume of data generated also grows.

The fact that these professions are still recent reinforces our belief that we want to train you in a field and not in a particular profession. This is why, on completion of the Cybersecurity course, a number of job titles with highly sought-after skills are available to you.

SOC analysts, Pentester (ethical hacker), Cybersecurity analysts, all of these are jobs that you can aim for on completion of your training.

Chat with our team
jedha bootcamp data science

Pentester

To understand and fix system flaws, nothing is better than penetrating the system. Master the whole range of Penetration Testing methods, by joining a Red Team or a Blue Team.

Cybersecurity Analyst

Its purpose is to detect flaws in a system to ensure that data is properly protected. They will produce comprehensive reports for the CISO, the person responsible for securing information systems. If you are interested in the job of cybersecurity analyst, you will be in demand!

SOC Analyst

Working in the Security Operation Center, you will be responsible for the technical monitoring of a company's information system in the broadest sense. You will be responsible for monitoring the threats surrounding the company's infrastructure.

IT Security Specialist

His mission is to protect the data and reliability of a company's computer system and its website. His role is to detect any security flaws in the internal networks.

Cybersecurity Auditor Certification
Get certified

Our Cybersecurity training is certifying: at the end of the 420h, you can take the Cybersecurity Auditor certification created and delivered by Jedha.

Consisting of 4 blocks of skills, this certification will allow you to showcase your skills in Cybersecurity to recruiters.

Our Cybersecurity Auditor certification is being registered in the National Directory of Professional Skills (RNCP level 7). 

Discover our courses!
Book a call with Admissions Team
Portrait Antoine Krajnc

Training Costs

  • Payment in up to 10 monthly installments
  • Access to courses & events for life
  • Possibility of making up missed classes
  • Access to our online platform
  • Certification in progress
Make an Appointment
Training fee Schedule
🇫🇷 France
Essentials
1 495 €
Fullstack
Most popular
6 995 €
Essentials
£1,995
Fullstack
Most popular
£6,595

A typical day in Fullstack Cybersecurity

10:00
Course Review
We start the day by reviewing the previous day's concepts to make sure everything is in place before we start working on new content.
10:15
Course Content
Let's start the concept of the day with our teaching team who will take you step by step through the content. You will be able to ask questions and progress at your own pace. 
12:00
Practice
Apply the concepts you have just explored to simple exercises. This will allow you to see the direct application cases and to grasp the technical mechanisms.
13:30
Challenges
Once you have been able to practice the theoretical concepts on simple exercises, it's time for the Data challenges! You will work on more complex Data topics that will allow you to better understand what a Data project is. 
16:00
Office Hours
Two additional hours are allocated each day with the teaching assistants to review concepts or move forward on your project. This is a good opportunity to ask questions and review some of the theoretical concepts. 
18:00
Events
We offer immersive Data training and what better way to end your day than with a Data talk. Many topics are explored by companies with very interesting stories such as Doctolib, Payfit or Spendesk.
10:00
16:30
18:00
Sunday
D
Tuesday
M
Monday
L
Wednesday
M
Thursday
J
Friday
V
Saturday
S
At Home
Recommended review of the lessons seen during the week and further study of the exercises
Tutorial
Revision of the contents seen last week and we explore the new concepts of the day
😴
🏫 Presential - Work in class with your teacher to see the theoretical concepts and work together on the exercises.
🏠 At home - It is advisable to work at home to deepen the lessons and go over the exercises to best prepare for the week.

Where Our Alumni Work After Graduating

After our Fullstack Cybersecurity training, our alumni work as project managers, data analysts, business analysts or consultants in renowned companies. 

Jedha student
portrait jean paul paoli
portrait chiara
portrait bonnie naccache
portrait antoine guerrini
portrait augustin lauvencourt
Jedha student
portrait wolfgang fernandez
jedha student
jedha student
portrait camille destombes
Jedha student

Ethical Hacking and Cyber Defense taught by professionals

SOC Analyst, Senior Pentester, Ethical Hacker: they are the Jedha Masters! Our trainers and the authors of our training courses are seasoned cybersecurity specialists. They all have a double hat of professional and teacher which allows them to have a real know-how in cybersecurity. Our trainings are designed to transmit this expertise to you.

Jordan Douliez
Jordan Douliez
Safety Engineer
 @
Thales
Jordan is one of the authors of our Cybersecurity programmes! After 5 years at the École des Hautes Technologies et du Numérique, Jordan held positions as Scrum Master & developer and then technical project manager.
[...]
Read More
Jordan Douliez
Following his experience as a Technical Project Manager, he joined Thalès as a Security Engineer. In parallel, he works as a freelancer, allowing him to work in various sectors!
Read Less
Jérémie Amsellem
Jérémie Amsellem
Senior IT Security Consultant
 @
Fenrir
Teaching is his job! After an academic career at EPITECH, Jérémie worked as a Developer and Software Developer for 4 years.
[...]
Read More
Jérémie Amsellem
He then became a trainer for several schools and produced educational content on the subject of Pentest (Penetration Testing). At the same time, he worked as a security consultant at Fenrir, a company specialising in the sector.
Read Less
Guillaume Gracieux
Guillaume Gracieux
Senior IT Security Consultant
 @
Computer systems know him well, and vice versa! After 6 years at university, Guillaume became a systems engineer for i-BP (Banque Populaire), CGG Veritas and then Talendus.
[...]
Read More
Guillaume Gracieux
He stayed there for no less than 3 years as a Pentesting engineer. He then joined the Econocom team as an SSI auditor and then OKIDOK where he conducted several Cybersecurity awareness workshops.
Read Less
Discover the whole Jedha Masters team

Your questions about Cybersecurity training

Do I have to bring my own computer?

The professions: what is a Pentester's job?

And what about the Cryptologist in all this?

Who do all these professionals refer to?

Ask Our Admissions Team Any Further Questions

Are you ready for an excellent education?

The Fullstack Cybersecurity course is now open to you! If you have any questions about the programme, the tools taught, or the next sessions, please contact our admissions team by downloading the syllabus or by applying

I have strong basic skills in Cybersecurity

I want to professionalise and get my job in the sector

I make an appointment with the admissions team to find out everything!

Professor Jedha in his classroom