- Apprise Cyber
- Academy
- ACCF
Apprise Certified CyberSecurity Fundamentals (ACCF)
ACCF KEY FEATURES
45+ Hrs Instructor
Led Live Training
Course
70% Practical Oriented
Payment
Full or 2 Installments
Career Oriented
Training
Support
via Whatsapp
Download Course Outline
ACCF - Apprise Academy
Course Introduction
- Support Group (Important)
- Flavors of Cyber Security
- Notes Keeping
- Important Tools
- Introduction
- IP Addresses & MAC Addresses
- OSI Model
- Common Ports and Protocols
- TCP UDP, Three-way Handshake
- Subnetting
- Information Gathering (Reconnaissance)
- Scanning & Enumeration
- Vulnerability Scanning Tools & Techniques
- Exploitation Tools & Techniques
Web Application Pentest
- Web application architecture and security model
- HTTP protocol and web server basics
- Setting up a web application testing environment
- Reconnaissance and information gathering
- Scanning and mapping web applications
- Vulnerability assessment and exploitation techniques (e.g. SQL injection, XSS, CSRF, etc.)
- Authentication and session management vulnerabilities
- Web application firewall (WAF) bypass techniques
- API security testing
- Server-side attacks (e.g. exploiting file inclusion, remote code execution, etc.)
- Client-side attacks (e.g. exploiting insecure JavaScript, DOM XSS, etc.)
- Source code review and code-level vulnerabilities
- Testing Top 10 Web Application
- Report Writing
- Simulation Activity
Android Application Pentest
- Android architecture and security model
- Setting up an Android testing environment
- Static analysis of Android apps
- Dynamic analysis of Android apps
- Reverse engineering Android apps
- Attacking Android apps through common vulnerabilities
- Rooting Android devices
- Testing Top 10 Mobile Application
- Report Writing
- Simulation Activity
iOS Application Pentest
- iOS architecture and security model
- Setting up an iOS testing environment
- Static analysis of iOS apps
- Dynamic analysis of iOS apps
- Reverse engineering iOS apps
- Attacking iOS apps through common vulnerabilities
- Jailbreaking iOS devices
- Testing Top 10 Mobile Application
- Report Writing
- Simulation Activity
Network Pentest
- Introduction to network pentesting
- Network architecture and protocols
- Network reconnaissance and information gathering
- Network scanning and mapping
- Vulnerability assessment and exploitation techniques (e.g. port scanning, banner grabbing, SNMP, etc.)
- Exploiting network-level vulnerabilities (e.g. IP spoofing, ARP spoofing, DNS poisoning, etc.)
- Firewall and IDS/IPS evasion techniques
- Social engineering and physical security testing
- Best practices for network security testing and pentesting methodologies.
- Simulation Activity
Career Advice
- Career paths in cybersecurity
- Developing technical skills in cybersecurity
- Soft skills for success in cybersecurity
- Building a professional network in cybersecurity
- Balancing work and life in cybersecurity
- Diversity and inclusion in cybersecurity
- Making a positive impact in cybersecurity
- Creating a personal brand in cybersecurity
ACCF Instructor
Ali Hassan Ghori
- Certified Ethical Hacker (CEH)
- EC-Council Certified Security Analyst (ECSA)
- Certified Red Team Professional (CRTP)
- Certified Penetration Testing Engineer (CPTE)
- Certified Vulnerability Assessor (CVA)
- ISO 27001 Lead Implementer (LI)
ACCF Registration Form
FAQ's
You should have a basic understanding of computer systems and networks. A laptop with a minimum i3 processor and 8 GB RAM is required. Familiarity with programming concepts is beneficial but not mandatory.
The ACCF course spans over 8 weeks of comprehensive training.
We welcome your feedback! After completing the course, you will have the opportunity to provide feedback through surveys or directly to our support team. Your input helps us improve our offerings and better serve our students.
Yes, we have an alumni network where past participants can connect, share experiences, and access additional resources. Joining the network can help you build professional relationships and stay engaged with the cybersecurity community.
The course will guide you through various tools. Access to a virtual machine environment and software tools will be provided during the course.
Flexibility to learn at your own pace and convenience. Expert-led sessions and hands-on exercises. Interactive discussions and real-world scenarios.
Cancellations made before the course start date are eligible for a full refund.
This course is ideal for individuals who are looking to start or advance their career in cybersecurity. It is suitable for beginners, IT professionals, and those interested in deepening their understanding of cybersecurity practices.
For any other queries or clarifications, please feel free to contact us:
Address: FL-12, Central Government Housing Society,
Gulshan-e-Iqbal Block 10-A, Karachi.
Contact: +92 332 2777473
Email: Info@Apprise-Cyber.com
We’re excited to assist you on your journey to becoming a cybersecurity expert through our ACCF course!
Our instructors are experienced cybersecurity professionals with extensive industry knowledge. They hold relevant certifications and have hands-on experience in various cybersecurity domains. Their expertise ensures you receive high-quality education and practical insights.
Upon successful completion of the ACCF course, you will receive a Course Completion Certificate, validating your skills and knowledge in the field of cybersecurity.
Yes, we can connect you with past students who have agreed to share their experiences. This can provide valuable insights into the course and its impact on their careers.