Cyber Security
Fullstack

Pentester training

In 450 hours, become a Pentesting pro. Learn to manage web penetration and vulnerability exploitation issues from A to Z.

Upcoming courses:
4
March
2024
15
April
2024
Apply
Download our syllabus
Hired or refunded badge
Build your future in data
Program

Become a Pentester in 450h

Cyberdefense is a priority for companies, faced with a multitude of threats such as phishing, ransomware and malware. To protect themselves, they are looking for Pentesting experts, able to identify vulnerabilities so that they can be corrected.

At the end of your Cybersecurity training at Jedha, you'll be able to :

  • Identify and exploit vulnerabilities in an organization
  • Apply security principles and protect an infrastructure
  • Detecting and responding to a cyber attack
Download program
Build your future in data

Create your own customized training program

Our Cyber security training courses are designed by level and can be combined. If you're new to IT security, you can start by taking our Cyber for Beginners course.

Our Pentester training program

From Zero to IT Hero

Before you start learning about cybersecurity, it's time for a refresher course in computer science! In this first module, you'll (re)discover the fundamentals of programming, how a computer and OS work, network protocols and how the web works.

Module 1

From Zero to IT Hero

Skills mastered
  • Programming: fundamentals, IDE, scripting in Bash and Python, discovering C and compilers.
  • How a computer works: in terms of components, architecture and operating system (Linux, MacOS, Windows).
  • Networks: discovery of the OSI model, the most common protocols (DNS, SMTP, POP3, FTP etc.) and other fundamental concepts (proxy, VPN, Wi-Fi, Bluetooth).
  • How the Web works: review of the HTTP protocol and the main languages (HTML, CSS, Javascript, PHP, SQL).
Recognition

It's time to get to the heart of the matter! You'll start your cybersecurity training with reconnaissance, an essential phase in the exploration of your "target". In this module, you'll learn active and passive methods for gathering information, as well as tools and techniques for identifying system vulnerabilities.

Module 2

Recognition

Skills acquired :
  • Information gathering techniques: mastery of passive and active methods, including the use of tools and techniques such as Google Dorking, Shodan, and OSINT.
  • Scanning tools such as Nmap, Netdiscover, Nessus and OpenVAS.
  • Discover enumeration and sniffing techniques.
Red Team

Discover the offensive side of cyber! In an IT department, the Red Team, made up of pentesters or ethical hackers, is responsible for identifying and preventively exploiting vulnerabilities. In this module, you'll learn to think like an attacker to better protect your future employers or customers!

Module 3

Red Team

Skills mastered :
  • Discover pentesting: methodology, exploit concept and use of Metasploit.
  • Web attacks: master various vulnerabilities and attacks, including OWASP, SQLi, XSS, and many more!
  • Network attacks: such as Spoofing, ARP poisoning, MITM, DHCP, and DNS.
  • OS operation and post-operation: Microsoft, Linux and MacOS.
  • Advanced attacks on Active Directory, Docker and radio-frequency systems.
  • Discover social engineering: techniques such as phishing.
Blue Team

The Blue Team has a defensive role: it protects IT systems and responds to cyberattacks. In this module, you'll put yourself in its shoes and learn how to strengthen your infrastructures, detect intrusions and respond to an attack.

Module 4

Blue Team

Skills mastered
  • Blue Team fundamentals: discovering the structure, key concepts, frameworks and tools used.
  • Reinforcing infrastructure protection: using hardening techniques.
  • Monitoring and intrusion detection: with tools for traffic capture & analysis, platform monitoring and much more.
Stealth Techniques

To exploit a vulnerability, penetration is only the first step. Hackers need to maintain access and cover their tracks. In this module, you'll discover the techniques they employ, so you'll be better equipped to counter them.

Module 5

Stealth Techniques

Skills mastered
  • Antivirus evasion: mastering techniques to thwart detection by antivirus software.
  • Persistence: discover the techniques needed to maintain discrete, continuous access to target systems.
  • Trace concealment: methods for erasing signs of malicious activity, including log falsification and timestamp manipulation.
Reporting

An often underestimated but crucial element in cybersecurity is the art of reporting, essential for communicating effectively on identified threats and implemented solutions! In this module, you'll learn how to create clear, hard-hitting pentest and compromise reports.

Module 6

Reporting

Skills mastered
  • Creation of pentest reports: mastery of methodology and tools (Flameshot, Pwndocs)
  • Compromise reports: to document intrusions and responses to them
Career & Final project

Your training is coming to an end! To facilitate your professional integration, a seasoned cybersecurity expert will share his vision of the market with you during a career coaching session. Then you'll put all your new skills into action during a Capture The Flag Attack and Defense: you'll take it in turns to play the roles of the Red Team and the Blue Team!

Module 7 & 8

Career & Final project

Skills mastered
  • Improving your CV: to make it impactful and in line with the standards of IT security professionals.
  • Online presence: perfect your LinkedIn profile and learn about personal branding to boost your profile on professional platforms.
  • Interview preparation: methods and tips for standing out from the crowd and highlighting your specialist skills.
  • Direct application of your new cybersecurity skills: reconnaissance, attack, evasion, defense and reporting.
See detailed program
Certifications

Double recognition of your skills

Once you have completed your training to become a Pentester, you will be able to obtain 2 types of certification to demonstrate your skills on the job market:

  • Your certificate of achievement (your diploma!)

Thanks to the validation of this professional qualification, our training course is eligible for CPF and most public funding.

Read more

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sessions

Learn Pentesting at your own pace

Choose our Pentesting training course for a successful career change. Whether you prefer intensive Pentesting training or self-paced training, you're sure to find a format to suit your needs!

Full-time (3 months)

  • 450 hours of classroom learning
  • Monday to Friday, 9:30am - 6pm
  • Full-time over 3 months

Online or at one of our 17 campuses

  • Accelerated training
  • Prom spirit
  • Work discipline
Read more

Part-time (8 months)

  • 450 hours of blended learning (independent work, courses, coaching)
  • At your own pace (2 hours per day)
  • Part-time over 8 months

On line

  • Adapted to your professional and personal constraints
  • Independent learning
  • Accessible worldwide
Read more

Our next training sessions

Take your training by distance learning or at one of our 17 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse, Nantes and many other cities in France and Europe.

Part-time work
4
Mar
2024
29
Sep
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
15
Apr
2024
12
Jul
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Part-time work
6
May
2024
30
Nov
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
17
Jun
2024
10
Sep
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Part-time work
8
Jul
2024
31
Dec
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Full-time
16
Sep
2024
10
Dec
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Oops! No session in this format is planned at this time, contact us for more information

Do you need maximum flexibility? With our part-time training, you can follow the program at your own pace, while benefiting from individual coaching and classes every other Saturday.

Course

How to apply for our pentesting training course?

Nothing could be easier! Make an appointment with our team to refine your professional project. Depending on the course you choose and the necessary financing, your registration will take between 1 week and 1 month.

1

Career coaching

Discuss your career plans with our admissions team. We'll recommend the most suitable training and course format.

2

Placement test

Take a quick MCQ to assess your programming and systems skills.

3

Financing

Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.

Prerequisites

You'll need basic programming skills in Shell & Python. Alternatively, you can take our Cybersecurity for Beginners course to prepare yourself.

How does Pentester training work?

9h30

Course review

Guided by the teacher, start the day by reviewing the concepts from the previous class.

9h45

Theoretical course

Every day, discover new theoretical concepts accompanied by our teacher.

11h

Putting it into practice

Before lunch, apply the concepts you have just learned with simple exercises.

13h30

Challenges

Challenges, very professionalizing practical exercises in the form of projects.

16h

Office Hours

Work on courses and projects on your own or with the support of our coaches.

18h

Events

Participate in our events to build your professional network and learn more about the industry.

Build your future in data

Our part-time training program adapts to your personal and professional constraints, while offering you genuine individualized support: you're with us from start to finish!

‍Workingindependently

‍Learnat your own pace on our e-learning platform JULIE : 

  • Written & video courses
  • Exercises
  • Projects‍

Pedagogical support

‍Takeadvantage of the best support ever offered in part-time training: 

  • Daily support with coaches available every day from 5pm to 7pm.
  • Live lessons 1 Saturday out of 2 with a teacher at the end of each module.
Build your future in data
Download our syllabus
Financing

Training Costs

Included in the course :

  • Access to courses for life
  • Close educational support
  • JULIE e-learning platform
  • Career coaching

Full-time

7 495 €

Part-time work

7 495 €

Hired or Refunded Guarantee

We believe in you and our program. If you don't get a job within 6 months of becoming certified, we will refund your tuition. Learn more about our program

How can you finance your training to become a Pentester?

  • Personal Training Account (CPF)

Our Pentester training course is eligible for the Compte Personnel de Formation (CPF). Use all or part of your CPF balance to pay for it.

  • Payment in installments

Take advantage of our 3-installment payment plan, or spread your training costs over several monthly installments (between 4 and 10) with our partner Pledg.

  • Low-rate student loans

Take advantage of a student loan at a preferential rate with Société Générale. There's no age limit, and you start repaying once you've completed your training.

  • Your employer or your OPCO

If you are employed, your employer can finance your training, either directly or through its OPCO. Our teams will help you put together a file.

Last but not least, our training is also eligible for a wide range of public funding schemes, includingPôle Emploi's AIF, Transitions Pro and other regional funding schemes.

Apply for the Course
Download our syllabus

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Testimonials

Succeed in your career transition as a Pentester

Opt for the ultimate training program and become a Pentesting expert! Dozens of professionals have already benefited from our remote or face-to-face training program, enabling them to master, identify and exploit an organization's vulnerabilities. It's given their careers a real boost!

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont

 - 

From Developer to Cybersecurity Consultant

@

French Tech logo

Quick bootcamp, big skills! The teachers were perfect, and make us realize the opportunities in the sector.

Barry Thien

 - 

Ethical Hacker

@

Webomatic

French Tech logo

It was a great experience! An intensive programme, taught and kept up to date with the latest technologies, ultra-competent teachers (thanks to them), connected to the tech world and very good communication between the team and the students. Once again, a great experience.

Olga Kurnosova

 - 

@

Jellysmack

French Tech logo
+1900
Students who have followed one or
several of our courses
87
 %
Of professional integration
within 6 months
4.98
 /5
Average rating awarded
by our students
Download our syllabus

Why become a Pentester?

The Pentester profession is extremely rewarding. Firstly, because you play a key role for the organizations you work for: you enable them to protect themselves from cyber-attacks. But also because you are constantly updating your knowledge, and discovering new aspects of Cybersecurity.

Pentester's salary

The average salary for a Pentester in France is around €43,000 a year, but expect to earn between €30,000 and €40,000 a year for a junior profile. A more experienced profile can expect to earn up to €70,000 a year.

Pentesting taught by professionals

Meet our Jedha masters! Our teachers and trainers are experienced IT security professionals. They'll pass on their practical expertise that's directly applicable in the workplace. Get ready to shine thanks to top-level teaching.

Charles Tanguy
Charles Tanguy
Lead Instructor
 @
Jedha
Our very own Jedha Master! Charles is our Lead Instructor, having taught at Jedha since the first sessions. A double graduate of ENSAE & HEC, Charles is also the guarantor of the excellence of Jedha's course content.
[...]
Read More
Charles Tanguy
A graduate in statistics from ENSAE and HEC Paris, Charles is our Lead Instructor. He first worked as a Data Scientist at PayWithMyBank in San Fransisco and then at MWM. Since 2018, he has been teaching Data Science and Data Engineering at Jedha and has participated in the development of most of our data training courses.
Read Less
Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Guillaume Gracieux
Guillaume Gracieux
Senior IT Security Consultant
 @
Computer systems know him well, and vice versa! After 6 years at university, Guillaume became a systems engineer for i-BP (Banque Populaire), CGG Veritas and then Talendus.
[...]
Read More
Guillaume Gracieux
He stayed there for no less than 3 years as a Pentesting engineer. He then joined the Econocom team as an SSI auditor and then OKIDOK where he conducted several Cybersecurity awareness workshops.
Read Less
Download our syllabus
FAQ

Your questions about training

What is the role of a Pentester?

What are the most important qualities for a Pentester?

What training do you need to become a pentester?

What is a Pentester?

What skills are essential for a Pentester?

What does a Pentester's daily routine consist of?

What is the average salary of a Pentester at the start of his or her career?

Do I need to bring my laptop to the course?

How much does it cost to enroll in the Pentester training course?

Have a question? Ask our Admissions team!

Apply to

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.