


Cyber Security Training in Nepal
Cyber Security Courses in Nepal | Learn Ethical Hacking & Network Security
Join Nepal’s Best & Most Affordable Cyber Security Course at Just Rs.1499 – Online & Offline Classes Available with Free Certificate
Are you searching for an affordable cyber security training course in Nepal? Code IT offers cyber security course at Rs.1499, specially designed for students, IT beginners, and professionals who want to build a strong career in cyber defense. Whether you're from Dharan, Itahari, Biratnagar, Koshi, Mechi, Kathmandu, or anywhere across Nepal, this course is perfect for you!
Our cyber security course for beginners and professionals in Nepal provides practical, hands-on training to help you gain real-world skills and job-ready knowledge. Learn how to protect systems, analyze threats, and secure digital infrastructures from one of Nepal’s most trusted IT institutes.
What You’ll Learn in Code IT’s Cyber Security Training:
- Cyber security fundamentals and basic network security
- Firewalls, intrusion detection, and prevention techniques
- Ethical hacking and penetration testing tools
- Web application security and vulnerability assessments
- Cyber laws, privacy regulations, and compliance in Nepal
- Malware analysis, threat detection, and incident response
- Real-time labs and project-based learning with simulation
This affordable cyber security training in Nepal also prepares you for globally recognized cyber security certifications and professional job roles.
Why Choose Code IT for Cyber Security Training in Nepal?
- Code IT offers cyber security course at Rs.1499, tailored for the Nepali student budget
- Includes free course completion certificate
- Learn from certified cyber security experts and mentors
- Internship opportunities and job placement support
- Flexible online and offline classes across Nepal
- Ideal for college students, job seekers, freelancers, and IT professionals
With a strong focus on practical skills, live projects, and career development, Code IT’s cyber security course empowers you to thrive in Nepal’s fast-growing digital landscape.
Start your cyber security journey today with Code IT – Nepal’s top-value training at just Rs.1499!
Limited seats available. Register now to reserve your spot!
Materials included
Requirements
Course Syllabus
Day 1: Introduction to Cybersecurity
- What is cybersecurity?
- Cyber threats & attack types (Malware, Phishing, Ransomware, etc.)
- CIA Triad: Confidentiality, Integrity, Availability
Day 2: Cybersecurity Terminologies & Career Paths
- White Hat, Black Hat, Grey Hat Hackers
- Cybersecurity domains: Network Security, Ethical Hacking, Forensics, etc.
- Cybersecurity job roles & certifications (CEH, Security+, CISSP, etc.)
Day 3: Networking Fundamentals
- OSI & TCP/IP models
- IP addresses, MAC addresses, subnetting
- Ports & Protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.)
Day 4: Understanding Firewalls & Network Security
- Types of Firewalls (Hardware/Software)
- IDS vs. IPS (Intrusion Detection & Prevention Systems)
- Hands-on: Configuring Windows & Linux Firewalls
Day 5: Hands-on Lab: Wireshark for Network Traffic Analysis
- Capturing & analyzing network packets
- Identifying suspicious network activities
Day 6: Cyber Threats & Social Engineering
- Phishing, Spear Phishing, Smishing, and Vishing
- Password attacks & brute force attacks
- Hands-on: Creating strong passwords & password managers
Day 7: Cybersecurity Laws & Ethics
- Cybersecurity regulations (GDPR, ISO 27001, PCI-DSS, IT Act 2000)
- Ethical hacking guidelines & responsible disclosure
Day 8: Operating System Security (Windows & Linux)
- User privileges & access controls
- Security features in Windows & Linux (BitLocker, SELinux, AppArmor)
Day 9: Introduction to Ethical Hacking & Pentesting
- What is Ethical Hacking?
- Penetration Testing Lifecycle (Recon, Scanning, Exploitation)
Day 10: Footprinting & Reconnaissance Techniques
- Passive & Active Footprinting
- Hands-on: Using OSINT tools (Google Dorking, Shodan, Maltego)
Day 11: Scanning & Enumeration Techniques
- Network scanning basics
- Hands-on: Using Nmap & Netcat for scanning
Day 12: Vulnerability Assessment
- Common Vulnerabilities & Exploits (CVE, CVSS)
- Hands-on: Using Nessus for vulnerability scanning
Day 13: Web Application Security Basics
- OWASP Top 10 Vulnerabilities (SQL Injection, XSS, CSRF)
- Hands-on: Testing a demo website for vulnerabilities
Day 14: Hands-on Lab: Burp Suite for Web Security
- Intercepting & modifying web requests
- Identifying security loopholes in web applications
Day 15: Malware Analysis & Reverse Engineering Basics
- Types of malware (Viruses, Trojans, Worms, Rootkits)
- Hands-on: Using VirusTotal & sandboxes for malware analysis
Day 16: Incident Response & Digital Forensics
- Cyberattack response process
- Basics of forensic investigations
Day 17: Cryptography & Encryption Techniques
- Symmetric vs. Asymmetric Encryption
- Hands-on: Encrypting and decrypting files with OpenSSL
Day 18: Hashing & Steganography
- MD5, SHA-256, and their security implications
- Hands-on: Hiding messages inside images & files
Day 19: Wireless Security & Wi-Fi Hacking Basics
- Understanding Wi-Fi security protocols (WEP, WPA, WPA2)
- Hands-on: Testing Wi-Fi security with Aircrack-ng
Day 20: Sniffing & Spoofing Attacks
- ARP Spoofing & MITM (Man-In-The-Middle) attacks
- Hands-on: Using Ettercap for ARP spoofing
Day 21: Denial-of-Service (DoS) & DDoS Attacks
- Types of DoS attacks (SYN Flood, UDP Flood, HTTP Flood)
- Hands-on: Simulating & mitigating DoS attacks
Day 22: Security Policies & Compliance
- Organizational security policies & best practices
- Importance of security audits & risk management
Day 23: Cloud Security & Virtualization
- Cloud computing risks & best practices
- Hands-on: Securing AWS/GCP cloud environments
Day 24: Introduction to SIEM & Log Analysis
- Security Information & Event Management (SIEM) basics
- Hands-on: Using Splunk for log analysis
Day 25: Cybersecurity Automation & Scripting
- Using Python for security automation
- Hands-on: Writing basic security scripts
Day 26: Red Team vs. Blue Team
- Understanding Offensive (Red Team) & Defensive (Blue Team) security
- Hands-on: Simulating an attack & response scenario
Day 27: Secure Coding Practices
- Common coding vulnerabilities & mitigation techniques
- Hands-on: Fixing insecure code in Python/PHP
Day 28: Cybersecurity in Real-Life Scenarios
- Case studies of major cyberattacks (WannaCry, SolarWinds, etc.)
- Lessons learned & security improvements
Day 29: Capture The Flag (CTF) Challenge
- Solving cybersecurity challenges & real-world scenarios
Day 30: Final Project & Course Wrap-Up
- Students conduct a security assessment on a test environment
- Certification exam & feedback session