Cyber Security Deffensive Course in Nepal

Cyber Security Defensive Techniques Course – Protect Networks and Systems Effectively

Cyber Security Defensive

Looking for the best Cyber Security Defense course in Nepal?
Join the professional Cyber Security Training at Code IT and learn how to protect systems, networks, and data from cyber threats using the latest security tools and practices.

This hands-on IT security course is perfect for students across Nepal who want to gain job-ready skills, practical experience, and expertise in cyber defense. You’ll learn threat analysis, vulnerability assessment, firewall configuration, and implement robust security measures for real-world systems.

Our training program offers live online classes accessible from anywhere in Nepal, along with hands-on classroom sessions in Dharan. Develop practical cyber defense skills, work on real projects, and prepare for professional opportunities in IT security, network administration, and ethical hacking careers.

Protect systems effectively, master cybersecurity tools, and gain the confidence to work as a professional Cyber Security Defense specialist in Nepal’s growing tech industry.

Prerequisites

Basic computer literacy (working familiarity with operating systems
file navigation
etc.)
Understanding of networking fundamentals (e.g.
TCP/IP
DNS
OSI model
Subnet )
Experience with Linux command-line usage is highly beneficial
No prior programming knowledge is required to enroll
though experience in Python would be useful
Cyber Security Defensive

Cyber Security Defensive

Next batch starting soon

Mode: Online (Google Meet) Google Meet
Duration: 1 month
Rs.2,499/-
Rs.35,000 Save 92%
Enquiry

Have any Question?

WhatsApp: 9862130505
Telephone: 025-575163

Everything You Receive

All-inclusive support — from training to real-world experience

Live Classes

Google Meet
7:00 PM - 8:00 PM

Lifetime Videos

Re-watch anytime

Certification

Industry recognized

Internship

Internship is not currently available.

Course Curriculum

Everything you'll learn — from fundamentals to advanced concepts

What you will learn

  • Cyber Security Defense Fundamentals

  • Network & System Defense

  • Threat Detection & Monitoring

  • Defensive Strategies & Best Practices

  • Real-World Projects & Simulation

01 WEEK 1: Fundamentals & Introduction
02 Day 1:
What is Cybersecurity?
Types of Cybersecurity (Network, Application, Cloud, Endpoint, etc.)
Key Threats (Malware, Phishing, Ransomware)
CIA Triad (Confidentiality, Integrity, Availability)
03 Day 2:
Types of Hackers (White Hat, Black Hat, Grey Hat)
Cybersecurity Terminologies
Basics of Cyber Laws and Ethics
Introduction to Cybersecurity Certifications (CEH, Security+, etc.)
04 Day 3:
Operating System Security Basics (Linux & Windows)
User accounts, permissions, file system structure
Lab: Basic Linux commands, users, file permissions
05 Day 4:
Understanding Malware (Virus, Worms, Trojans, Rootkits)
Indicators of Compromise (IOCs)
Lab: Analyze a known malware behavior (in a sandbox)
06 Day 5:
Introduction to Firewalls and IDS/IPS
Difference between hardware and software firewalls
Lab: Setup a simple UFW or Windows Firewall ruleset
07 Day 6:
Introduction to Networking (IP, TCP/UDP, DNS, etc.)
OSI Model & Packet Flow
Lab: Use Wireshark to capture and analyze packets
08 Day 7:
Threat Intelligence Overview
Tools: VirusTotal, AbuseIPDB, Shodan (basic usage)
Lab: Analyze IPs/domains for threat indicators
09 WEEK 2: Network & Endpoint Defense
10 Day 8:
Intrusion Detection/Prevention Systems (IDS/IPS)
Tools: Snort, Suricata (overview)
Lab: Install and run Snort basic rule
11 Day 9:
Network Security Monitoring (NSM)
Tools: Zeek (Bro) introduction
Lab: Install and use Zeek for basic traffic analysis
12 Day 10:
Windows Security Logs & Event Viewer
Common Events: 4624, 4625, 4688, etc.
Lab: Analyze login attempts from Event Viewer
13 Day 11:
Linux Syslog and Auditd
Key log files: /var/log/auth.log, /var/log/syslog
Lab: Monitor user activity on a Linux system
14 Day 12:
Antivirus & EDR (Endpoint Detection and Response)
Overview of Defender, Crowdstrike, etc.
Lab: Simulate malware detection with Defender
15 Day 13:
Network Segmentation and VLANs
Lab: Design a basic secure network layout
16 Day 14:
Hands-on: Harden a Windows 10/11 system
Disable unused services, enable firewall, enforce password policy
17 WEEK 3: Threat Hunting, SIEM & Vulnerability Management
18 Day 15:
Introduction to Threat Hunting
MITRE ATT&CK Framework overview
Lab: Basic hunt using Windows logs
19 Day 16:
SIEM Fundamentals
Tools: Introduction to Splunk / Wazuh / Graylog
Lab: Create basic alerts/search queries
20 Day 17:
Vulnerability Scanning Basics
Tools: Nessus, OpenVAS
Lab: Scan a local VM with OpenVAS/Nessus
21 Day 18:
Patch Management Concepts
WSUS, SCCM (overview), Linux package updates
Lab: Simulate patching outdated software
22 Day 19:
Web Application Security Intro
OWASP Top 10 (basic overview)
Lab: Test a vulnerable web app using DVWA
23 Day 20:
Password Cracking & Defense
Tools: John the Ripper, Hydra (basic usage)
Lab: Crack simple password hashes, then secure with best practices
24 Day 21:
Email Security & Phishing Defense
SPF, DKIM, DMARC overview
Lab: Analyze a phishing email structure
25 WEEK 4: Blue Team, Incident Response, Real-World Scenarios
26 Day 22:
Blue Team Roles and Responsibilities
SOC tiers, daily tasks
Introduction to Log Analysis
27 Day 23:
Incident Response Process (NIST Lifecycle)
Identification, Containment, Eradication, Recovery
Sample IR playbook
28 Day 24:
Forensics Basics
Disk image, Memory analysis (overview)
Tools: Autopsy, Volatility Framework (demo)
29 Day 25:
Security Policies & Compliance
ISO 27001, NIST, PCI-DSS (overview)
Importance of documentation
30 Day 26:
Red Team vs Blue Team Concepts
Purple Teaming basics
Simulate a small attack → detect and respond (mini exercise)
31 Day 27:
Cloud Security Basics (AWS/Azure)
Shared Responsibility Model
Lab: Enable MFA and CloudTrail on AWS free-tier
32 Day 28:
VPN, Proxy, TOR – Use and Security Risks
Lab: Use a VPN and analyze encrypted vs. unencrypted traffic
33 Day 29:
Capture The Flag (CTF) Introduction
Practice: PicoCTF or TryHackMe room (beginner-friendly)
34 Day 30:
Final Review & Assessment
Create a Security Hardening Checklist
Practice Test + Feedback Session

Earn Your Certification

After completing the course, you will receive a professional certificate from Code IT, verified by industry leaders in Nepal.

Share your achievement with pride on LinkedIn.
Certificate

Course Mentors

Learn directly from industry experts with years of hands‑on experience

Niraj Adhikari

Niraj Adhikari

Cyber security mentor

Code IT, Nepal 5+ Years of Experience
Get in Touch

Need More Information?

Our team will respond within a few hours

Why Enquire?

Payment plans & installment options
Certificate & accreditation details
Course level & suitability check
Flexible batch timings
Career guidance & job support

Join 100k+ successful graduates

We'll respond within 2-3 hours during business hours