Cyber Security Course in Nepal

Comprehensive Cyber Security Course for Beginners – Learn Ethical Hacking & Network Protection

Cyber Security

Looking for the best Cyber Security Offensive course in Nepal?
Join the professional Cyber Security Offensive Training at Code IT and learn ethical hacking, penetration testing, and advanced offensive security techniques to identify and exploit vulnerabilities in systems and networks.

This hands-on cybersecurity course is ideal for students across Nepal who want to master offensive security, gain practical experience, and develop job-ready IT security skills. You’ll work on network scanning, vulnerability assessment, exploit development, and real-world penetration testing projects.

Our training program offers live online classes accessible from anywhere in Nepal, along with hands-on classroom sessions in Dharan. Develop practical offensive security skills, work on real projects, and prepare for professional opportunities in cybersecurity, ethical hacking, and IT defense careers.

Master penetration testing, ethical hacking tools, and gain the confidence to work as a professional Cyber Security Offensive specialist in Nepal’s growing IT industry.

Prerequisites

No coding/programming required
Familiarity with networking fundamentals
Linux command-line knowledge will be an advantage
Cyber Security

Cyber Security

Next batch starting soon

Mode: Online (Google Meet) Google Meet
Duration: 1 month
Rs.2,499/-
Rs.35,000 Save 92%
Enquiry

Have any Question?

WhatsApp: 9862130505
Telephone: 025-575163

Everything You Receive

All-inclusive support — from training to real-world experience

Live Classes

Google Meet
7:00 PM - 8:00 PM

Lifetime Videos

Re-watch anytime

Certification

Industry recognized

Internship

Internship is not currently available.

Course Curriculum

Everything you'll learn — from fundamentals to advanced concepts

What you will learn

  • Cyber Security Fundamentals

  • Network & System Security

  • Ethical Hacking & Penetration Testing

  • Web & Application Security

  • Cyber Security Tools & Real-World Projects

01 Day 1: Introduction to Cybersecurity
What is cybersecurity?
Cyber threats & attack types (Malware, Phishing, Ransomware, etc.)
CIA Triad: Confidentiality, Integrity, Availability
02 Day 2: Cybersecurity Terminologies & Career Paths
White Hat, Black Hat, Grey Hat Hackers
Cybersecurity domains: Network Security, Ethical Hacking, Forensics, etc.
Cybersecurity job roles & certifications (CEH, Security+, CISSP, etc.)
03 Day 3: Networking Fundamentals
OSI & TCP/IP models
IP addresses, MAC addresses, subnetting
Ports & Protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.)
04 Day 4: Understanding Firewalls & Network Security
Types of Firewalls (Hardware/Software)
IDS vs. IPS (Intrusion Detection & Prevention Systems)
Hands-on: Configuring Windows & Linux Firewalls
05 Day 5: Hands-on Lab: Wireshark for Network Traffic Analysis
Capturing & analyzing network packets
Identifying suspicious network activities
06 Day 6: Cyber Threats & Social Engineering
Phishing, Spear Phishing, Smishing, and Vishing
Password attacks & brute force attacks
Hands-on: Creating strong passwords & password managers
07 Day 7: Cybersecurity Laws & Ethics
Cybersecurity regulations (GDPR, ISO 27001, PCI-DSS, IT Act 2000)
Ethical hacking guidelines & responsible disclosure
08 Day 8: Operating System Security (Windows & Linux)
User privileges & access controls
Security features in Windows & Linux (BitLocker, SELinux, AppArmor)
09 Day 9: Introduction to Ethical Hacking & Pentesting
What is Ethical Hacking?
Penetration Testing Lifecycle (Recon, Scanning, Exploitation)
10 Day 10: Footprinting & Reconnaissance Techniques
Passive & Active Footprinting
Hands-on: Using OSINT tools (Google Dorking, Shodan, Maltego)
11 Day 11: Scanning & Enumeration Techniques
Network scanning basics
Hands-on: Using Nmap & Netcat for scanning
12 Day 12: Vulnerability Assessment
Common Vulnerabilities & Exploits (CVE, CVSS)
Hands-on: Using Nessus for vulnerability scanning
13 Day 13: Web Application Security Basics
OWASP Top 10 Vulnerabilities (SQL Injection, XSS, CSRF)
Hands-on: Testing a demo website for vulnerabilities
14 Day 14: Hands-on Lab: Burp Suite for Web Security
Intercepting & modifying web requests
Identifying security loopholes in web applications
15 Day 15: Malware Analysis & Reverse Engineering Basics
Types of malware (Viruses, Trojans, Worms, Rootkits)
Hands-on: Using VirusTotal & sandboxes for malware analysis
16 Day 16: Incident Response & Digital Forensics
Cyberattack response process
Basics of forensic investigations
17 Day 17: Cryptography & Encryption Techniques
Symmetric vs. Asymmetric Encryption
Hands-on: Encrypting and decrypting files with OpenSSL
18 Day 18: Hashing & Steganography
MD5, SHA-256, and their security implications
Hands-on: Hiding messages inside images & files
19 Day 19: Wireless Security & Wi-Fi Hacking Basics
Understanding Wi-Fi security protocols (WEP, WPA, WPA2)
Hands-on: Testing Wi-Fi security with Aircrack-ng
20 Day 20: Sniffing & Spoofing Attacks
ARP Spoofing & MITM (Man-In-The-Middle) attacks
Hands-on: Using Ettercap for ARP spoofing
21 Day 21: Denial-of-Service (DoS) & DDoS Attacks
Types of DoS attacks (SYN Flood, UDP Flood, HTTP Flood)
Hands-on: Simulating & mitigating DoS attacks
22 Day 22: Security Policies & Compliance
Organizational security policies & best practices
Importance of security audits & risk management
23 Day 23: Cloud Security & Virtualization
Cloud computing risks & best practices
Hands-on: Securing AWS/GCP cloud environments
24 Day 24: Introduction to SIEM & Log Analysis
Security Information & Event Management (SIEM) basics
Hands-on: Using Splunk for log analysis
25 Day 25: Cybersecurity Automation & Scripting
Using Python for security automation
Hands-on: Writing basic security scripts
26 Day 26: Red Team vs. Blue Team
Understanding Offensive (Red Team) & Defensive (Blue Team) security
Hands-on: Simulating an attack & response scenario
27 Day 27: Secure Coding Practices
Common coding vulnerabilities & mitigation techniques
Hands-on: Fixing insecure code in Python/PHP
28 Day 28: Cybersecurity in Real-Life Scenarios
Case studies of major cyberattacks (WannaCry, SolarWinds, etc.)
Lessons learned & security improvements
29 Day 29: Capture The Flag (CTF) Challenge
Solving cybersecurity challenges & real-world scenarios
30 Day 30: Final Project & Course Wrap-Up
Students conduct a security assessment on a test environment
Certification exam & feedback session

Earn Your Certification

After completing the course, you will receive a professional certificate from Code IT, verified by industry leaders in Nepal.

Share your achievement with pride on LinkedIn.
Certificate

Course Mentors

Learn directly from industry experts with years of hands‑on experience

Niraj Adhikari

Niraj Adhikari

Cyber security mentor

Code IT, Nepal 5+ Years of Experience
Get in Touch

Need More Information?

Our team will respond within a few hours

Why Enquire?

Payment plans & installment options
Certificate & accreditation details
Course level & suitability check
Flexible batch timings
Career guidance & job support

Join 100k+ successful graduates

We'll respond within 2-3 hours during business hours