Online open evening: discover our training courses!
Wednesday, October 4 at 7 p.m.
On line

Find out more about our accelerated training programs in Data and Cybersecurity, and ask Marine all your questions.

Sign up
Cyber Security
Fullstack

Pentester training

In 420 hours, become a Pentesting pro. Learn to manage web penetration and vulnerability exploitation issues from A to Z.

4.98/5 according to our 1,900 alumni
Upcoming courses:
6
November
2023
2
January
2024
Apply
Download our syllabus
Hired or refunded badge
Build your future in data
Program

Become a Pentester in 420h

Cyberdefense is a priority for companies, faced with a multitude of threats such as phishing, ransomware and malware. To protect themselves, they are looking for Pentesting experts, able to identify vulnerabilities so that they can be corrected.

At the end of your Cybersecurity training at Jedha, you'll be able to :

  • Identify and exploit vulnerabilities in an organization
  • Apply security principles and protect an infrastructure
  • Detecting and responding to a cyber attack
Download our syllabus
Build your future in data

Our Pentester training program

Discovery of the Cyber

Let's get into the heart of the Cybersecurity universe with the main concepts of networking, authentication, encryption. We will then study the basics of Python for Cybersecurity and review the terminal command lines of your computer and you will understand what goes on behind the scenes. You will be able to make different servers on the same network interact thanks to the file sharing protocol to better solidify your network infrastructure and protect it.

Modules 1 & 2

Discovery of the Cyber

We will then go deeper into the main network protocols: the concepts of spoofing, hijacking, man-in-the-middle will no longer hold any secrets for you. You will also understand in detail the constitution of a Web network with the Internet Protocol (IP), the DNS; we will also focus on Microsoft architectures, the first victims of cyber-attacks.

Recognition & Cyber-attack

Let's get into the details of what reconnaissance is, this first phase before any attack or pentest. You will practice active and passive reconnaissance techniques to gather information about your target via tools like nmap, shodan and the OSINT framework. We will go as far as discovering the first vulnerabilities.

Modules 3 & 4

Recognition & Cyber-attack

Based on the latest OWASP 10 ranking, we will explore each of the 10 most well-known cyber-attacks: how they work, where they come from, how to remedy these flaws, you will master all these attacks. Your knowledge of Python, SQL and Javascript will come in handy! You will also learn how to bypass anti-virus software to make your exploits more difficult to detect.

Vulnerabilities & Flaws

Now that you have researched and discovered the main vulnerabilities in a network, it is time to learn how to exploit them. In the new phase of vulnerability exploration, you will use the most famous Cybersecurity frameworks - Metasploit, Beef. In this module, you will understand the underbelly of a machine and you will discover what a Buffer Overflow is, and you will finish with crackme challenges, testing your ability to crack software.

Modules 5 & 6

Vulnerabilities & Flaws

You will also learn how to exploit and remedy vulnerabilities in Microsoft systems, which have been the target of numerous cyberattacks in recent years. You will become familiar with their Active Directory and their vulnerabilities. You will master the Bloohound tool to map the most efficient paths to the heart of an infrastructure in a very simple way.

Post-operation & Wireless

Once the flaws & vulnerabilities are exploited, you need to think about the "after". Your goal will be to make it impossible for potential hackers to elevate their access privileges to other, much broader information. This is called Post-Exploitation. You will also see how to install backdoors on an infrastructure and how to detect them if you did not place them.

Modules 7 & 8

Post-operation & Wireless

Finally, you will learn in this module how to write Pentest audit reports, according to best practices, that you will deliver to your future customers so that they can make the right decisions about the actions to take on the protection of their infrastructure.

Red Team & Cyber Projects

Now put on the hat of a member of a Red Team, a group of ethical hackers responsible for detecting, preventing and eliminating vulnerabilities. You will first learn how to use forensic methodologies to investigate and retrieve information.

Modules 9 & 10

Red Team & Cyber Projects

Still within the framework of a Red Team, you will be familiarized with the concept of White malware and its C&C regulations (Control & Command) allowing to hijack information, to take administrative controls.

Download our syllabus
Sessions

Learn Pentesting at your own pace

Choose our training course for a successful retraining in Pentesting. Whether you prefer an intensive Pentesting course or online training, you're sure to find a format to suit your needs!

Bootcamp

  • 420 hours of classes over 3 months
  • Monday to Friday, 10am - 6pm
On one of our 17 campuses or online
  • Short courses
  • Limited number of students
  • Prom spirit
Read more

Online training

  • At your own pace over 30 weeks
  • 420 hours of online content
  • 1 live class per module
  • Individual coaching on demand
Distance learning
  • Adapted to your rhythm
  • Accessible worldwide
Read more

Our next training sessions

Take your training by distance learning or at one of our 17 campuses in Paris, Lyon, Lille, Marseille, Bordeaux, Toulouse, Nantes and many other cities in France and Europe.

On line
6
Nov
2023
2
Jun
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
On line
2
Jan
2024
28
Jul
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Bootcamp
12
Feb
2024
3
May
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
On line
4
Mar
2024
29
Sep
2024
Individual coaching on demand
1 live class per module
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Bootcamp
15
Apr
2024
12
Jul
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Bootcamp
17
Jun
2024
10
Sep
2024
Monday to Friday
10am - 6pm
🇫🇷
🇬🇧
🇪🇸
French
Last seats!
Sign up
Oops! No session in this format is planned at this time, contact us for more information

Do you need maximum flexibility? With our distance learning program, you can follow the program at your own pace online, while benefiting from individualized coaching.

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Course

How to apply for our pentesting training course?

Contact our team today to discuss your career plans. Depending on your chosen course and funding requirements, your registration can be finalized very quickly, in 1 week to 1 month.

1

Prerequisites

You must have basic programming skills in Shell & Python. Otherwise, you can take our Cybersecurity for Beginners course to prepare yourself.

2

Career coaching

Discuss your career plans with our admissions team.
We will recommend the most suitable course and format.

3

MCQS

Take a quick MCQ to assess your programming and mathematical skills.

4

Financing

Make your project a reality with the help of our team.
Searching for financing, putting together the file: we accompany you from A to Z.

How does Pentester training work?

10h

Course review

Guided by the teacher, start the day by reviewing the concepts from the previous class.

10h15

Theoretical course

Every day, discover new theoretical concepts accompanied by our teacher.

12h

Putting it into practice

Before lunch, apply the concepts you have just learned with simple exercises.

13h30

Challenges

Challenges, very professionalizing practical exercises in the form of projects.

16h

Office Hours

Work on courses and projects independently or with the help of our teacher assistants.

18h

Events

Participate in our events to build your professional network and learn more about the industry.

Build your future in data

Our distance learning course adapts to your personal constraints while offering you a real individualized follow-up: you are accompanied from start to finish!

‍Working supports

‍Benefit fromlifetime access to our e-learning platform JULIE : 

  • Written & video courses
  • Exercises
  • Projects‍

Pedagogical support

‍Enjoythe best coaching ever offered in distance learning: 

  • Teaching Assistants available daily from 5:00 pm to 7:00 pm
  • 7 hours of live instruction per module
Build your future in data
Download our syllabus
Financing

Training Costs

Included in the course :

  • Access to courses for life
  • Close educational support
  • JULIE e-learning platform
  • Career coaching

Bootcamp

7 495 €

On line

7 495 €

Hired or Refunded Guarantee

We believe in you and our program. If you don't get a job within 6 months of becoming certified, we will refund your tuition. Learn more about our program

How can you finance your training to become a Pentester?

  • Corporate financing

Are you currently in work or on a sandwich course? Your OPCO or employer may be able to finance your Pentester training. Our admissions team is here to help you put together your application.

  • Public funding

Take advantage of various public funding schemes for our diploma courses, such as CPF, Transition Pro, Pôle Emploi (AIF or POEI) and local funding.

  • Self-financing

Pay in 3 instalments, spread the cost of your pentesting training over several monthly instalments (up to 10) in partnership with Pledg, or take out a low-interest student loan with Société Générale.

Apply for the Course
Download our syllabus
Certification

Cybersecurity Auditor Certification

Boost your career with our Pentester training and earn a certification of excellence! With our 420-hour training course, you'll be ready to take the Jedha Certified Cybersecurity Auditor exam.

This certification, based on 4 key skills blocks, will enhance your expertise in Pentesting, and more generally in cybersecurity, and reassure your future employers.

Discover our certification

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Testimonials

Succeed in your career transition as a Pentester

Opt for the ultimate training program and become a Pentesting expert! Dozens of professionals have already benefited from our remote or face-to-face training program, enabling them to master, identify and exploit an organization's vulnerabilities. It's given their careers a real boost!

Cyber Security is a definite future for me as a developer. Both the content and the trainer were great, there will be a follow-up for me!

Emmanuelle Dennemont

 - 

From Developer to Cybersecurity Consultant

@

French Tech logo

Quick bootcamp, big skills! The teachers were perfect, and make us realize the opportunities in the sector.

Barry Thien

 - 

Ethical Hacker

@

Webomatic

French Tech logo

It was a great experience! An intensive programme, taught and kept up to date with the latest technologies, ultra-competent teachers (thanks to them), connected to the tech world and very good communication between the team and the students. Once again, a great experience.

Olga Kurnosova

 - 

@

Jellysmack

French Tech logo
+1900
Students who have followed one or
several of our courses
87
 %
Of professional integration
within 6 months
4.98
 /5
Average rating awarded
by our students
Download our syllabus

Why become a Pentester?

The Pentester profession is extremely rewarding. Firstly, because you play a key role for the organizations you work for: you enable them to protect themselves from cyber-attacks. But also because you are constantly updating your knowledge, and discovering new aspects of Cybersecurity.

Pentester's salary

The average salary for a Pentester in France is around €43,000 a year, but expect to earn between €30,000 and €40,000 a year for a junior profile. A more experienced profile can expect to earn up to €70,000 a year.

Pentesting taught by professionals

Meet our Jedha masters! Our teachers and trainers are experienced IT security professionals. They'll pass on their practical expertise that's directly applicable in the workplace. Get ready to shine thanks to top-level teaching.

Charles Tanguy
Charles Tanguy
Lead Instructor
 @
Jedha
Our very own Jedha Master! Charles is our Lead Instructor, having taught at Jedha since the first sessions. A double graduate of ENSAE & HEC, Charles is also the guarantor of the excellence of Jedha's course content.
[...]
Read More
Charles Tanguy
A graduate in statistics from ENSAE and HEC Paris, Charles is our Lead Instructor. He first worked as a Data Scientist at PayWithMyBank in San Fransisco and then at MWM. Since 2018, he has been teaching Data Science and Data Engineering at Jedha and has participated in the development of most of our data training courses.
Read Less
Florian Amette
Florian Amette
Cybersecurity Consultant & CEO
 @
Faksight
"In Cybersecurity, there is no lack of work!" This is what Florian told you when he was leading his workshop on Pentest. From employee, to entrepreneur, to freelance, Florian has worked for many different organisations.
[...]
Read More
Florian Amette
After 5 years of studies at HEI (Haute Ecole d'Ingénieur), Florian joined the teams of Saint-Gobain, Sopra Steria and then a famous consulting firm as a Consultant in Intrastructure and Cybersecurity. He then worked with the Ares Cyber Expertise team as a freelancer for more than a year and a half. He then created his own Cybersecurity consulting company, Faksight, and taught at Jedha in parallel.
Read Less
Guillaume Gracieux
Guillaume Gracieux
Senior IT Security Consultant
 @
Computer systems know him well, and vice versa! After 6 years at university, Guillaume became a systems engineer for i-BP (Banque Populaire), CGG Veritas and then Talendus.
[...]
Read More
Guillaume Gracieux
He stayed there for no less than 3 years as a Pentesting engineer. He then joined the Econocom team as an SSI auditor and then OKIDOK where he conducted several Cybersecurity awareness workshops.
Read Less
Download our syllabus
FAQ
Your questions about training

What is the role of a Pentester?

What are the most important qualities for a Pentester?

What training do you need to become a pentester?

Have a question? Ask our Admissions team

Apply to

Download the syllabus of our training courses

Academic and technical excellence

Learning by doing

Training adapted to your professional and personal constraints

4,98
/5
Best training in France
Best Data Science Bootcamp 2023
Best Cyber Security Bootcamp 2023
Discover the detailed program
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Request a Copy of Our Syllabus
*required fields
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.