Prerequisites
Registration Open - Offer Ends Soon!
Join Our Live Class on Google Meet
Seats Open for Prebooking
Have any Question?
Cyber Security
Comprehensive Cyber Security Course for Beginners – Learn Ethical Hacking & Network Protection
Course Overview
Join Nepal’s Best & Most Affordable Cyber Security Course
Are you searching for an affordable cyber security training course in Nepal? Code IT offers cyber security course at Rs.1499, specially designed for students, IT beginners, and professionals who want to build a strong career in cyber defense. Whether you're from Dharan, Itahari, Biratnagar, Koshi, Mechi, Kathmandu, or anywhere across Nepal, this course is perfect for you!
Our cyber security course for beginners and professionals in Nepal provides practical, hands-on training to help you gain real-world skills and job-ready knowledge. Learn how to protect systems, analyze threats, and secure digital infrastructures from one of Nepal’s most trusted IT institutes.
What You’ll Learn in Code IT’s Cyber Security Training:
- Cyber security fundamentals and basic network security
- Firewalls, intrusion detection, and prevention techniques
- Ethical hacking and penetration testing tools
- Web application security and vulnerability assessments
- Cyber laws, privacy regulations, and compliance in Nepal
- Malware analysis, threat detection, and incident response
- Real-time labs and project-based learning with simulation
This affordable cyber security training in Nepal also prepares you for globally recognized cyber security certifications and professional job roles.
Why Choose Code IT for Cyber Security Training in Nepal?
- Code IT offers cyber security course at Rs.1499, tailored for the Nepali student budget
- Includes free course completion certificate
- Learn from certified cyber security experts and mentors
- Internship opportunities and job placement support
- Flexible online and offline classes across Nepal
- Ideal for college students, job seekers, freelancers, and IT professionals
With a strong focus on practical skills, live projects, and career development, Code IT’s cyber security course empowers you to thrive in Nepal’s fast-growing digital landscape.
Start your cyber security journey today with Code IT – Nepal’s top-value training at just Rs.1499!
Limited seats available. Register now to reserve your spot!
What's Included in the Course
Pre-Recorded Video
Perfect if you're outside Nepal or can't attend live sessions.
- Lifetime access to recordings
Course Syllabus
Explore the complete course syllabus to see what you'll learn from start to finish.
Day 1: Introduction to Cybersecurity
- What is cybersecurity?
- Cyber threats & attack types (Malware, Phishing, Ransomware, etc.)
- CIA Triad: Confidentiality, Integrity, Availability
Day 2: Cybersecurity Terminologies & Career Paths
- White Hat, Black Hat, Grey Hat Hackers
- Cybersecurity domains: Network Security, Ethical Hacking, Forensics, etc.
- Cybersecurity job roles & certifications (CEH, Security+, CISSP, etc.)
Day 3: Networking Fundamentals
- OSI & TCP/IP models
- IP addresses, MAC addresses, subnetting
- Ports & Protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.)
Day 4: Understanding Firewalls & Network Security
- Types of Firewalls (Hardware/Software)
- IDS vs. IPS (Intrusion Detection & Prevention Systems)
- Hands-on: Configuring Windows & Linux Firewalls
Day 5: Hands-on Lab: Wireshark for Network Traffic Analysis
- Capturing & analyzing network packets
- Identifying suspicious network activities
Day 6: Cyber Threats & Social Engineering
- Phishing, Spear Phishing, Smishing, and Vishing
- Password attacks & brute force attacks
- Hands-on: Creating strong passwords & password managers
Day 7: Cybersecurity Laws & Ethics
- Cybersecurity regulations (GDPR, ISO 27001, PCI-DSS, IT Act 2000)
- Ethical hacking guidelines & responsible disclosure
Day 8: Operating System Security (Windows & Linux)
- User privileges & access controls
- Security features in Windows & Linux (BitLocker, SELinux, AppArmor)
Day 9: Introduction to Ethical Hacking & Pentesting
- What is Ethical Hacking?
- Penetration Testing Lifecycle (Recon, Scanning, Exploitation)
Day 10: Footprinting & Reconnaissance Techniques
- Passive & Active Footprinting
- Hands-on: Using OSINT tools (Google Dorking, Shodan, Maltego)
Day 11: Scanning & Enumeration Techniques
- Network scanning basics
- Hands-on: Using Nmap & Netcat for scanning
Day 12: Vulnerability Assessment
- Common Vulnerabilities & Exploits (CVE, CVSS)
- Hands-on: Using Nessus for vulnerability scanning
Day 13: Web Application Security Basics
- OWASP Top 10 Vulnerabilities (SQL Injection, XSS, CSRF)
- Hands-on: Testing a demo website for vulnerabilities
Day 14: Hands-on Lab: Burp Suite for Web Security
- Intercepting & modifying web requests
- Identifying security loopholes in web applications
Day 15: Malware Analysis & Reverse Engineering Basics
- Types of malware (Viruses, Trojans, Worms, Rootkits)
- Hands-on: Using VirusTotal & sandboxes for malware analysis
Day 16: Incident Response & Digital Forensics
- Cyberattack response process
- Basics of forensic investigations
Day 17: Cryptography & Encryption Techniques
- Symmetric vs. Asymmetric Encryption
- Hands-on: Encrypting and decrypting files with OpenSSL
Day 18: Hashing & Steganography
- MD5, SHA-256, and their security implications
- Hands-on: Hiding messages inside images & files
Day 19: Wireless Security & Wi-Fi Hacking Basics
- Understanding Wi-Fi security protocols (WEP, WPA, WPA2)
- Hands-on: Testing Wi-Fi security with Aircrack-ng
Day 20: Sniffing & Spoofing Attacks
- ARP Spoofing & MITM (Man-In-The-Middle) attacks
- Hands-on: Using Ettercap for ARP spoofing
Day 21: Denial-of-Service (DoS) & DDoS Attacks
- Types of DoS attacks (SYN Flood, UDP Flood, HTTP Flood)
- Hands-on: Simulating & mitigating DoS attacks
Day 22: Security Policies & Compliance
- Organizational security policies & best practices
- Importance of security audits & risk management
Day 23: Cloud Security & Virtualization
- Cloud computing risks & best practices
- Hands-on: Securing AWS/GCP cloud environments
Day 24: Introduction to SIEM & Log Analysis
- Security Information & Event Management (SIEM) basics
- Hands-on: Using Splunk for log analysis
Day 25: Cybersecurity Automation & Scripting
- Using Python for security automation
- Hands-on: Writing basic security scripts
Day 26: Red Team vs. Blue Team
- Understanding Offensive (Red Team) & Defensive (Blue Team) security
- Hands-on: Simulating an attack & response scenario
Day 27: Secure Coding Practices
- Common coding vulnerabilities & mitigation techniques
- Hands-on: Fixing insecure code in Python/PHP
Day 28: Cybersecurity in Real-Life Scenarios
- Case studies of major cyberattacks (WannaCry, SolarWinds, etc.)
- Lessons learned & security improvements
Day 29: Capture The Flag (CTF) Challenge
- Solving cybersecurity challenges & real-world scenarios
Day 30: Final Project & Course Wrap-Up
- Students conduct a security assessment on a test environment
- Certification exam & feedback session
Need More Information About This Course?
Have questions or need clarification? Our education specialists are ready to assist you. Complete the form below and we'll respond within 1 hours.
Frequently Asked Questions
Code IT is a professional IT training institute that offers both online and offline courses in various fields like Web Development, Networking, Graphic Design, and more.
Yes, you will receive a certificate upon successful completion of the course.
Internship opportunities are available for most students; however, some courses do not include internships.
Yes, we offer job placement support. Terms and conditions apply.
Yes, the course fee must be paid during registration to confirm your seat.
Yes, demo classes are available. You can find them at the top of this syllabus — click the "Watch Demo" button.
Yes, you will get access to recorded class videos, which you can watch anytime with lifetime access.
Yes, Code IT provides lifetime support to all students, even after course completion.
No, the fee is non-refundable. However, you can transfer to another class if you inform the administrator within 1 day of the course start date.
Similar Courses
Explore other courses that match your interest and help you upgrade your skills. Whether you're starting fresh or looking to specialize, these related courses are perfect next steps in your learning journey.