Cyber Security Defensive

Cyber Security Defensive Techniques Course – Protect Networks and Systems Effectively

Cyber Security Deffensive Course in Nepal

Nepal's most affordable defensive cybersecurity training — protect systems, detect threats, and stop attacks.

If you're searching for the best Cyber Security course in Nepal, this is it. Code IT's 1-month Defensive Cyber Security training is the most comprehensive IT security program in Nepal — covering network defense, malware analysis, threat intelligence, firewall configuration, IDS/IPS, SIEM, endpoint security, log analysis, incident response, and real-world attack simulation — all hands-on, all practical, all built around the tools Nepal's cybersecurity employers actually use.

Cyber attacks in Nepal are rising sharply. Banks, government systems, hospitals, and businesses are being targeted daily. Defensive cybersecurity professionals — the people who detect intrusions, analyze threats, harden systems, and respond to incidents — are among the most urgently needed and highest-paid IT professionals in Nepal right now. This course is your direct entry into that career.

You won't just learn theory. You'll use Wireshark to capture and analyze live network traffic, configure Snort and Suricata for intrusion detection, monitor systems with Zeek, analyze Windows Event Logs and Linux Auditd for suspicious activity, detect threats with VirusTotal, AbuseIPDB, and Shodan, harden both Windows and Linux systems, work with SIEM tools, simulate malware detection, practice incident response workflows, and build real defensive security skills week by week in a hands-on lab environment.

The CIA Triad, the OSI model, firewall rule configuration, VLANs, network segmentation, EDR tools like CrowdStrike and Windows Defender, cyber laws and ethics, and an introduction to professional certifications like CEH and CompTIA Security+ — this course covers the full defensive security landscape.

Live classes run from 8:00 PM to 9:30 PM via Google Meet, accessible from Kathmandu, Pokhara, Biratnagar, Butwal, Chitwan, or anywhere in Nepal. Classroom sessions available in Dharan. Basic networking knowledge and Linux familiarity is helpful — no prior programming experience required.

Every student receives lifetime video access and an industry-recognized certificate from Code IT.

Prerequisites

Basic computer literacy (working familiarity with operating systems file navigation etc.)
Understanding of networking fundamentals (e.g. TCP/IP DNS OSI model Subnet )
Experience with Linux command-line usage is highly beneficial
No prior programming knowledge is required to enroll though experience in Python would be useful
Cyber Security Defensive

Cyber Security Defensive

Next batch starting soon

Mode: Online (Google Meet) Google Meet
Duration: 1 month
Rs.2,499/-
Rs.35,000 Save 92%
Enquiry

Have any Question?

WhatsApp: 9862130505
Telephone: 025-575163

Everything You Receive

All-inclusive support — from training to real-world experience

Live Classes

Google Meet
8:00 PM - 9:30 PM

Lifetime Videos

Re-watch anytime

Certification

Industry recognized

Internship

No internships are available right now.

Course Curriculum

Everything you'll learn — from fundamentals to advanced concepts

Course Outlines

  • Cyber Security Defense Fundamentals

  • Network & System Defense

  • Threat Detection & Monitoring

  • Defensive Strategies & Best Practices

  • Real-World Projects & Simulation

Full Curriculum

01 WEEK 1: Fundamentals & Introduction
02 Day 1:
What is Cybersecurity?
Types of Cybersecurity (Network, Application, Cloud, Endpoint, etc.)
Key Threats (Malware, Phishing, Ransomware)
CIA Triad (Confidentiality, Integrity, Availability)
03 Day 2:
Types of Hackers (White Hat, Black Hat, Grey Hat)
Cybersecurity Terminologies
Basics of Cyber Laws and Ethics
Introduction to Cybersecurity Certifications (CEH, Security+, etc.)
04 Day 3:
Operating System Security Basics (Linux & Windows)
User accounts, permissions, file system structure
Lab: Basic Linux commands, users, file permissions
05 Day 4:
Understanding Malware (Virus, Worms, Trojans, Rootkits)
Indicators of Compromise (IOCs)
Lab: Analyze a known malware behavior (in a sandbox)
06 Day 5:
Introduction to Firewalls and IDS/IPS
Difference between hardware and software firewalls
Lab: Setup a simple UFW or Windows Firewall ruleset
07 Day 6:
Introduction to Networking (IP, TCP/UDP, DNS, etc.)
OSI Model & Packet Flow
Lab: Use Wireshark to capture and analyze packets
08 Day 7:
Threat Intelligence Overview
Tools: VirusTotal, AbuseIPDB, Shodan (basic usage)
Lab: Analyze IPs/domains for threat indicators
09 WEEK 2: Network & Endpoint Defense
10 Day 8:
Intrusion Detection/Prevention Systems (IDS/IPS)
Tools: Snort, Suricata (overview)
Lab: Install and run Snort basic rule
11 Day 9:
Network Security Monitoring (NSM)
Tools: Zeek (Bro) introduction
Lab: Install and use Zeek for basic traffic analysis
12 Day 10:
Windows Security Logs & Event Viewer
Common Events: 4624, 4625, 4688, etc.
Lab: Analyze login attempts from Event Viewer
13 Day 11:
Linux Syslog and Auditd
Key log files: /var/log/auth.log, /var/log/syslog
Lab: Monitor user activity on a Linux system
14 Day 12:
Antivirus & EDR (Endpoint Detection and Response)
Overview of Defender, Crowdstrike, etc.
Lab: Simulate malware detection with Defender
15 Day 13:
Network Segmentation and VLANs
Lab: Design a basic secure network layout
16 Day 14:
Hands-on: Harden a Windows 10/11 system
Disable unused services, enable firewall, enforce password policy
17 WEEK 3: Threat Hunting, SIEM & Vulnerability Management
18 Day 15:
Introduction to Threat Hunting
MITRE ATT&CK Framework overview
Lab: Basic hunt using Windows logs
19 Day 16:
SIEM Fundamentals
Tools: Introduction to Splunk / Wazuh / Graylog
Lab: Create basic alerts/search queries
20 Day 17:
Vulnerability Scanning Basics
Tools: Nessus, OpenVAS
Lab: Scan a local VM with OpenVAS/Nessus
21 Day 18:
Patch Management Concepts
WSUS, SCCM (overview), Linux package updates
Lab: Simulate patching outdated software
22 Day 19:
Web Application Security Intro
OWASP Top 10 (basic overview)
Lab: Test a vulnerable web app using DVWA
23 Day 20:
Password Cracking & Defense
Tools: John the Ripper, Hydra (basic usage)
Lab: Crack simple password hashes, then secure with best practices
24 Day 21:
Email Security & Phishing Defense
SPF, DKIM, DMARC overview
Lab: Analyze a phishing email structure
25 WEEK 4: Blue Team, Incident Response, Real-World Scenarios
26 Day 22:
Blue Team Roles and Responsibilities
SOC tiers, daily tasks
Introduction to Log Analysis
27 Day 23:
Incident Response Process (NIST Lifecycle)
Identification, Containment, Eradication, Recovery
Sample IR playbook
28 Day 24:
Forensics Basics
Disk image, Memory analysis (overview)
Tools: Autopsy, Volatility Framework (demo)
29 Day 25:
Security Policies & Compliance
ISO 27001, NIST, PCI-DSS (overview)
Importance of documentation
30 Day 26:
Red Team vs Blue Team Concepts
Purple Teaming basics
Simulate a small attack → detect and respond (mini exercise)
31 Day 27:
Cloud Security Basics (AWS/Azure)
Shared Responsibility Model
Lab: Enable MFA and CloudTrail on AWS free-tier
32 Day 28:
VPN, Proxy, TOR – Use and Security Risks
Lab: Use a VPN and analyze encrypted vs. unencrypted traffic
33 Day 29:
Capture The Flag (CTF) Introduction
Practice: PicoCTF or TryHackMe room (beginner-friendly)
34 Day 30:
Final Review & Assessment
Create a Security Hardening Checklist
Practice Test + Feedback Session

Earn Your Certification

After completing the course, you will receive a professional certificate from Code IT, verified by industry leaders in Nepal.

Share your achievement with pride on LinkedIn.
Certificate

Course Mentors

Learn directly from industry experts with years of hands‑on experience

Niraj Adhikari

Niraj Adhikari

Cyber security mentor

Code IT, Nepal 5+ Years of Experience
Get in Touch

Need More Information?

Our team will respond within a few hours

Why Enquire?

Payment plans & installment options
Certificate & accreditation details
Course level & suitability check
Flexible batch timings
Career guidance & job support

Join 100k+ successful graduates

We'll respond within 2-3 hours during business hours

Watch Demo Video

Cyber Security Defensive

Open on YouTube ↗