Cyber Security

Comprehensive Cyber Security Course for Beginners – Learn Ethical Hacking & Network Protection

Cyber Security Course in Nepal

Learn ethical hacking, penetration testing, and offensive security — Nepal's most affordable cybersecurity training.

If you're searching for the best Cyber Security course in Nepal, this is it. Code IT's 1-month offensive cybersecurity training is the most comprehensive ethical hacking program in Nepal — covering network security, penetration testing, OSINT, Nmap, Nessus, Burp Suite, Wireshark, OWASP Top 10, malware analysis, social engineering, and real-world vulnerability assessment — everything you need to start a career in Nepal's fast-growing cybersecurity industry.

Cyber attacks on Nepal's banks, government systems, and businesses are increasing every year. Ethical hackers and penetration testers — the professionals who find vulnerabilities before criminals do — are among the most urgently needed and highest-paid IT specialists in Nepal right now. This course teaches you exactly how they work.

You won't just study theory. You'll use Wireshark to capture and analyze live network traffic, perform footprinting and reconnaissance using OSINT tools like Google Dorking, Shodan, and Maltego, scan networks with Nmap and Netcat, assess vulnerabilities with Nessus, test web applications for SQL Injection, XSS, and CSRF using Burp Suite, analyze malware with VirusTotal and sandboxes, and work through the complete penetration testing lifecycle — Recon, Scanning, Exploitation, and Reporting.

You'll also cover cybersecurity laws and ethics — GDPR, ISO 27001, PCI-DSS, and Nepal's IT Act — responsible disclosure, and the career paths, certifications (CEH, Security+, CISSP), and job roles that Nepal's cybersecurity sector is built around.

Live classes run from 8:00 PM to 9:30 PM via Google Meet, accessible from Kathmandu, Pokhara, Biratnagar, Butwal, Chitwan, or anywhere in Nepal. Classroom sessions available in Dharan. No coding required — basic networking and Linux familiarity is an advantage.

Every student receives lifetime video access and an industry-recognized certificate from Code IT.

Prerequisites

No coding/programming required
Familiarity with networking fundamentals
Linux command-line knowledge will be an advantage
Cyber Security

Cyber Security

Next batch starting soon

Mode: Online (Google Meet) Google Meet
Duration: 1 month
Rs.2,499/-
Rs.35,000 Save 92%
Enquiry

Have any Question?

WhatsApp: 9862130505
Telephone: 025-575163

Everything You Receive

All-inclusive support — from training to real-world experience

Live Classes

Google Meet
8:00 PM - 9:30 PM

Lifetime Videos

Re-watch anytime

Certification

Industry recognized

Internship

No internships are available right now.

Course Curriculum

Everything you'll learn — from fundamentals to advanced concepts

Course Outlines

  • Cyber Security Fundamentals

  • Network & System Security

  • Ethical Hacking & Penetration Testing

  • Web & Application Security

  • Cyber Security Tools & Real-World Projects

Full Curriculum

01 Day 1: Introduction to Cybersecurity
What is cybersecurity?
Cyber threats & attack types (Malware, Phishing, Ransomware, etc.)
CIA Triad: Confidentiality, Integrity, Availability
02 Day 2: Cybersecurity Terminologies & Career Paths
White Hat, Black Hat, Grey Hat Hackers
Cybersecurity domains: Network Security, Ethical Hacking, Forensics, etc.
Cybersecurity job roles & certifications (CEH, Security+, CISSP, etc.)
03 Day 3: Networking Fundamentals
OSI & TCP/IP models
IP addresses, MAC addresses, subnetting
Ports & Protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.)
04 Day 4: Understanding Firewalls & Network Security
Types of Firewalls (Hardware/Software)
IDS vs. IPS (Intrusion Detection & Prevention Systems)
Hands-on: Configuring Windows & Linux Firewalls
05 Day 5: Hands-on Lab: Wireshark for Network Traffic Analysis
Capturing & analyzing network packets
Identifying suspicious network activities
06 Day 6: Cyber Threats & Social Engineering
Phishing, Spear Phishing, Smishing, and Vishing
Password attacks & brute force attacks
Hands-on: Creating strong passwords & password managers
07 Day 7: Cybersecurity Laws & Ethics
Cybersecurity regulations (GDPR, ISO 27001, PCI-DSS, IT Act 2000)
Ethical hacking guidelines & responsible disclosure
08 Day 8: Operating System Security (Windows & Linux)
User privileges & access controls
Security features in Windows & Linux (BitLocker, SELinux, AppArmor)
09 Day 9: Introduction to Ethical Hacking & Pentesting
What is Ethical Hacking?
Penetration Testing Lifecycle (Recon, Scanning, Exploitation)
10 Day 10: Footprinting & Reconnaissance Techniques
Passive & Active Footprinting
Hands-on: Using OSINT tools (Google Dorking, Shodan, Maltego)
11 Day 11: Scanning & Enumeration Techniques
Network scanning basics
Hands-on: Using Nmap & Netcat for scanning
12 Day 12: Vulnerability Assessment
Common Vulnerabilities & Exploits (CVE, CVSS)
Hands-on: Using Nessus for vulnerability scanning
13 Day 13: Web Application Security Basics
OWASP Top 10 Vulnerabilities (SQL Injection, XSS, CSRF)
Hands-on: Testing a demo website for vulnerabilities
14 Day 14: Hands-on Lab: Burp Suite for Web Security
Intercepting & modifying web requests
Identifying security loopholes in web applications
15 Day 15: Malware Analysis & Reverse Engineering Basics
Types of malware (Viruses, Trojans, Worms, Rootkits)
Hands-on: Using VirusTotal & sandboxes for malware analysis
16 Day 16: Incident Response & Digital Forensics
Cyberattack response process
Basics of forensic investigations
17 Day 17: Cryptography & Encryption Techniques
Symmetric vs. Asymmetric Encryption
Hands-on: Encrypting and decrypting files with OpenSSL
18 Day 18: Hashing & Steganography
MD5, SHA-256, and their security implications
Hands-on: Hiding messages inside images & files
19 Day 19: Wireless Security & Wi-Fi Hacking Basics
Understanding Wi-Fi security protocols (WEP, WPA, WPA2)
Hands-on: Testing Wi-Fi security with Aircrack-ng
20 Day 20: Sniffing & Spoofing Attacks
ARP Spoofing & MITM (Man-In-The-Middle) attacks
Hands-on: Using Ettercap for ARP spoofing
21 Day 21: Denial-of-Service (DoS) & DDoS Attacks
Types of DoS attacks (SYN Flood, UDP Flood, HTTP Flood)
Hands-on: Simulating & mitigating DoS attacks
22 Day 22: Security Policies & Compliance
Organizational security policies & best practices
Importance of security audits & risk management
23 Day 23: Cloud Security & Virtualization
Cloud computing risks & best practices
Hands-on: Securing AWS/GCP cloud environments
24 Day 24: Introduction to SIEM & Log Analysis
Security Information & Event Management (SIEM) basics
Hands-on: Using Splunk for log analysis
25 Day 25: Cybersecurity Automation & Scripting
Using Python for security automation
Hands-on: Writing basic security scripts
26 Day 26: Red Team vs. Blue Team
Understanding Offensive (Red Team) & Defensive (Blue Team) security
Hands-on: Simulating an attack & response scenario
27 Day 27: Secure Coding Practices
Common coding vulnerabilities & mitigation techniques
Hands-on: Fixing insecure code in Python/PHP
28 Day 28: Cybersecurity in Real-Life Scenarios
Case studies of major cyberattacks (WannaCry, SolarWinds, etc.)
Lessons learned & security improvements
29 Day 29: Capture The Flag (CTF) Challenge
Solving cybersecurity challenges & real-world scenarios
30 Day 30: Final Project & Course Wrap-Up
Students conduct a security assessment on a test environment
Certification exam & feedback session

Earn Your Certification

After completing the course, you will receive a professional certificate from Code IT, verified by industry leaders in Nepal.

Share your achievement with pride on LinkedIn.
Certificate

Course Mentors

Learn directly from industry experts with years of hands‑on experience

Niraj Adhikari

Niraj Adhikari

Cyber security mentor

Code IT, Nepal 5+ Years of Experience
Get in Touch

Need More Information?

Our team will respond within a few hours

Why Enquire?

Payment plans & installment options
Certificate & accreditation details
Course level & suitability check
Flexible batch timings
Career guidance & job support

Join 100k+ successful graduates

We'll respond within 2-3 hours during business hours