Documente Academic
Documente Profesional
Documente Cultură
Information Security?
Sesi 1
DigiTalent Scholarship 2018
Dunia di masa depan…
Perlukah keamanan siber atau
keamanan informasi?
Disaat semua tersambung dengan sensor dan internet
Sebelum Melangkah Lebih Jauh
Cyber security comprises technologies, processes
and controls that are designed to protect
systems, networks and data from
cyber attacks.
Other things
Digital Information than
Information
information
Analog
Information
• Sebuah serangan ke
beberapa bank yang ada di
Indonesia
• Viral di tahun 2015 an
Wannacry
*Encrypting data and demanding
ransom payments*
People
Pelatihan dan Kesadaran Technologies
Kemampuan dan Desain sistem
kualifikasi profesional Penguatan dalam koneksi
Emergency drill Pengaturan perangkat lunak
Otorisasi dan otentikasi Protocol enkripsi
Keamanan fisik Jamming dan spoofing
Deteksi dan monitoring
Dari prinsip ini kami meramu 36
sesi di Digitalent
Topik Bahasan
Introduction to Cybersecurity
1.Introduction to CyberSecurity
Fundamentals of Networking Protocols and Devices (sesi 2-5)
2. TCP/IP Protocols : IP address (Ipv4 and IPv6), TCP, UDP, ARP, ICMP, DNS, DHCP
3. Switch, VLAN and STP
4. Router and Firewall
5. NAT and ACL
Security Concepts and Principles (sesi 6-7)
Topik dan
Bahasan 6. Cyber Security Architecture dan pengertian/definisi cyber security
7. Basic Security Control
Network security threats (sesi 8-10)
8. Identify Threats
9. Identify common attacks
10. Hands on Labs
Security Assesment (sesi 11-13)
11. Identify vulnerability
12. Assesment vulnerability
13. Penetration test
Analyzing Risks (sesi 14-15)
14. Paparan metode Analisa resiko
15. Paparan kasus dan contoh analisis
Implementing host and software Security (sesi 16-18)
16. Implement security for mobile and non mobile devices
17. Implement security for software/OS security
18. Hands on labs
Topik dan Implementing Network Security (sesi 19-22)
Bahasan 19. Explanation of network security technology and elements
lanjut 20. Hands on Labs
21. Wireless LAN Security
22. Hands on Labs
Implementing Cryptography and Virtual Private Network (VPN) (sesi 23-26)
23. Cryptography
24. Hands on Labs
25. VPN
26. Hands on Labs
Implementing Operational Security (sesi 27-30)
27. Security Framework and guideline
28. Implement Security Strategies
29. Data Security Process, database security and data privacy
30. Implement Physical Security
Managing Identity and Access (sesi 31-32)
Topik dan 31. Identity and Access Management Process and manage account securely
Bahasan 32. Hands on Labs
lanjut Incident Response & Incident Handling (sesi 33-35)
33. Addressing Common Security Issues
34. Respond to Security Incident
35. Investigate Security Incident
Business Continuity (sesi 36)
36. Business continuity and disaster recovery Process
Selamat datang di Kampus
Universitas Indonesia dan
Selamat Berkarya….
So…..
Why We Need Cyber or
Information Security??
nha.nurhayati@gmail.com