Skip to main content
Back to CoursesCareer TrackCybersecurity

Cybersecurity Course in Nepal — Ethical Hacking, VAPT & Network Security Training

Learn safe, authorized security testing from networking and Linux review to web assessment and reporting.

Duration
12 weeks
Batch Size
Max 10
Format
Online + Offline
Level
beginner

Your Learning Schedule

Mon-Fri live classes

2 hrs live class/day + 2 hrs self-study at home (required).

Sunday Open Lab

Classrooms and labs stay fully open all day. Come study, pair-program, and build.

Daily commitment

Minimum 2 hrs focused practice beyond class at home. This is what builds real mastery.

Core tech & tools
WiresharkNmapBurp SuiteOWASP Top 10Linux HardeningAPI TestingCVSSSecurity Reporting

Networking, packet analysis, and enumeration with safer methodology from Week 1

A fuller Linux hardening, logging, and host-review block instead of a rushed host-security overview

Scoped web and API testing with Burp Suite, OWASP thinking, and evidence capture habits

Tuition & Support
Initial batch offer

Mar 1, 2026 – Dec 31, 2099

NPR 35,000Flexible options available
NPR 29,750

Save NPR 5,250 on this course right now.

Live interactive sessions with trainers

Small-batch feedback on your practical work

Course materials, recordings, and lab support

Personalized guidance after Saarathi Gate on pacing, practice focus, and support

Upcoming Batch

Enrolling Now

Limited seats. Final class timing is confirmed within 48 hours based on availability.

About this Course

Cybersecurity is not about randomly running tools. It is about understanding systems well enough to test them safely, recognize genuine risk, and document what should change. This course helps disciplined beginners build that mindset through networking, Linux review, web and API testing, scanner triage, and professional reporting.

Every concept is practiced in safe, controlled lab environments. By the end, you should be able to investigate, validate, and document common security issues more methodically instead of relying on buzzwords or tool output alone.

Networking, packet analysis, and enumeration with safer methodology from Week 1

A fuller Linux hardening, logging, and host-review block instead of a rushed host-security overview

Scoped web and API testing with Burp Suite, OWASP thinking, and evidence capture habits

Scanner triage, vulnerability validation, and remediation-focused reporting

Authorization, scope discipline, and calm risk communication throughout the course

Capstone spotlight

SecureBank Security Assessment

Final build focus

> Note: Project themes may evolve each batch, but every learner still completes one trainer-approved final project from the approved pool. Smaller guided exercises can happen during the course, but the public completion standard stays anchored to one polished final outcome.

  • Network Reconnaissance: Service mapping, exposure review, and scoped vulnerability validation of SecureBank infrastructure
  • Web Application Testing: OWASP-style testing for auth, input handling, access control, and session risks on the SecureBank portal
  • System Review: Linux security review, service enumeration, and evidence collection
  • Professional Report: Executive summary, CVSS-scored findings, remediation roadmap, and handoff notes

Why This Course?

Global Context: Organizations continue to face phishing, credential abuse, exposed services, weak web applications, and fragile configurations. They need security professionals who can test responsibly, verify carefully, and communicate findings clearly.

Nepal Context: Nepal's banks, fintech products, hosting environments, public-facing websites, and growing digital businesses all need stronger security review habits. The skill gap is not only in tooling; it is in methodology, validation, and reporting discipline.

Your Opportunity: This course positions you for security analyst, vulnerability review, junior penetration testing, and application-security support roles with stronger fundamentals in Linux, evidence handling, and remediation-focused reporting.

Strong entry-level security candidates are rarely the loudest. They are the ones who can stay inside scope, explain what they observed, show evidence, and recommend the next fix calmly.

How Saarathi Gate shapes your learning plan

Saarathi Gate is a diagnostic, not a pass-or-fail exam. It helps us understand your current skill level, how you learn best, where you are already strong, and where you need extra support before the batch begins.

Before the batch starts

You complete Saarathi Gate so we can understand your current skill level, how you learn best, your strengths, and the support you may need before classes begin.

During the course

Trainers use that diagnostic profile to guide pacing, practice focus, feedback, and the kind of support that helps you learn best.

Certification and proof of work

Certification for Cybersecurity Course in Nepal — Ethical Hacking, VAPT & Network Security Training depends on attendance, required coursework, trainer review, and the practical work described in the micro-syllabus and full syllabus.

Curriculum

A structured journey to mastery

WeekFocus AreaWhat You'll Master
W1Security Mindset, Authorization & Lab DisciplineAuthorization, scope, threat thinking, TCP/IP basics, safe classroom setup, packet-capture basics, and disciplined note-taking for security work
W2Network Services, Filtering & Traffic AnalysisIP addressing, ports, DNS, HTTP/HTTPS, TLS, segmentation, firewalls, packet reading, and suspicious-pattern review
W3Nmap, Enumeration & Secure ArchitectureWireshark inspection, Nmap scanning, service analysis, attack-surface reasoning, baseline thinking, and safer architecture basics

Where this course can lead

These are examples of roles, responsibilities, or directions this course can help you grow toward.

Possible next roles
Security Analyst
Junior Penetration Tester / Vulnerability Analyst
Application Security Analyst / Security Engineer
Senior Security Engineer / Red-Blue Hybrid Specialist

Frequently Asked Questions

Baseline digital literacy is required. You must already understand what a web browser, IP address, and file system are, be comfortable using a computer daily, and have a laptop with 8GB+ RAM and at least 50GB free disk space for labs and VMs. Before Day 1, complete TryHackMe's free 'Pre-Security' learning path and our Pre-Course 7-Day Challenge. All students complete the Saarathi Gate Assessment before Day 1 and commit to 2 hours of daily practice beyond class.

Seats are limited

Ready to start your journey?

Complete Saarathi Gate, confirm your level, and secure your seat for the upcoming batch.