SAARATHI
VAPT-first ethical hacking in 3 months - Kali, Nmap, Burp, Metasploit, SQLMap, OWASP Top 10 and API Top 10, professional pen-test report, Sec+ → CEH → eJPT → OSCP runway.
Tuition & Support
Save NPR 5,250 on this course.
Upcoming Batch
May 4, 2026
7:00 AM – 9:00 AM
Limited seats. Final class timing is confirmed within 48 hours based on availability.
Drop your name and phone. We will call to confirm the next cohort details.
Cyber security training in Nepal is no longer optional for serious tech careers because banks, fintech services, e-commerce systems, SaaS products, ISPs, educational platforms, and government-linked systems all rely on secure digital infrastructure and safer application behavior.
The problem is that many learners see cybersecurity only as tool names or dramatic hacking demos. Real employable security work is quieter and more disciplined: understanding scope, observing evidence, validating findings, documenting impact, and explaining remediation in a way engineers and managers can act on.
A structured journey to mastery
Topics
What is cybersecurity? CIA triad explained simply, How the internet works: clients, servers, requests, TCP/IP basics, common ports and protocols, Scope, authorization, and ethical testing rules, Wireshark introduction and first packet capture, Evidence journal and documentation habits
Topics
Routing, NAT, segmentation, firewall logic, TLS, certificates, SSH, secure service exposure, Wireshark deeper: streams, filters, protocol analysis, ARP/DNS manipulation awareness, MITM concepts, Defensive baselining and traffic anomaly detection, Network visibility summary writing
Topics
Nmap scan types, service detection, safer defaults, Enumeration workflow, banner grabbing, service review, Correlating Nmap and Wireshark findings, Secure architecture: least privilege, defenseindepth, Attacksurface mapping and reduction, Network mapping and defense review report
| Week | Topics |
|---|---|
| W1 | What is cybersecurity? CIA triad explained simply, How the internet works: clients, servers, requests, TCP/IP basics, common ports and protocols, Scope, authorization, and ethical testing rules, Wireshark introduction and first packet capture, Evidence journal and documentation habits |
| W2 | Routing, NAT, segmentation, firewall logic, TLS, certificates, SSH, secure service exposure, Wireshark deeper: streams, filters, protocol analysis, ARP/DNS manipulation awareness, MITM concepts, Defensive baselining and traffic anomaly detection, Network visibility summary writing |
| W3 | Nmap scan types, service detection, safer defaults, Enumeration workflow, banner grabbing, service review, Correlating Nmap and Wireshark findings, Secure architecture: least privilege, defenseindepth, Attacksurface mapping and reduction, Network mapping and defense review report |
2 hrs live class/day + 2 hrs self-study at home (required).
Classrooms and labs stay fully open all day. Come study, pair-program, and build.
Minimum 2 hrs focused practice beyond class at home. This is what builds real mastery.
These are examples of roles, responsibilities, or directions this course can help you grow toward.
Can't find yours? Send an inquiry or visit Old Baneshwor. We'll give you a straight answer before you commit.
Yes, but it is serious beginner-friendly. Before Day 1 you should complete the TryHackMe Pre-Security path, install the lab tools, and be comfortable using a computer daily with an 8GB+ RAM laptop.
The course then starts from security mindset, networking, and Linux foundations before moving into web testing, API testing, and reporting.
Saarathi Gate is a diagnostic, not a pass-or-fail exam. It helps us understand your current skill level, how you learn best, where you are already strong, and where you need extra support before the batch begins.
You complete the Gate Assessment — an aptitude test that maps your strengths, weaknesses, learning style, and pace — before the batch begins. Your personal plan is built from that.
Trainers use that diagnostic profile to guide pacing, practice focus, feedback, and the kind of support that helps you learn best.
Certification for Cybersecurity Course in Nepal — Ethical Hacking, VAPT & Network Security Training depends on attendance, required coursework, trainer review, and the practical work described in the micro-syllabus and full syllabus.
Reserve your seat, complete Saarathi Gate, and start the batch with clearer guidance on your level, pacing, and practical focus.
Junior Cloud Security / DevSecOps Engineer
View trackJunior Project Manager / Scrum Master (Associate)
View trackInterview-ready Junior / Mid-level Software Engineer
View track10-student batch cap
Weekly mentor review
Sunday Open Classroom access
CV and LinkedIn review
1:1 mock interview