Course Outline
Pengantar
- Overview dari konsep dan definisi Keamanan Siber (Cybersecurity)
- Keamanan informasi vs Keamanan Siber (Cybersecurity)
Arsitektur dan Kerangka Kerja Keamanan
- Kerangka kerja arsitektur perusahaan
- Model OSI dan definisi
- Pertahanan berlapis (Defense in depth)
- Kontrol aliran informasi
- Isolasi dan segmentasi
- Pencatatan, pemantauan, dan deteksi
- Teknik dan alat enkripsi
Keamanan Aset (Jaringan, Sistem, Aplikasi, dan Data)
- Pengelolaan identitas
- Penilaian risiko
- Pengelolaan kerentanan
- Uji penetrasi (Penetration testing)
- Keamanan jaringan
- Keamanan sistem operasi
- Keamanan aplikasi
- Keamanan data
Operasi dan Respons Keamanan
- Peristiwa vs Insiden (Event vs Incident)
- Kepatuhan hukum dan peraturan
- Foresnsik digital
- Kategori insiden
- Business kontinuitas dan pemulihan bencana
- Respons dan penanganan insiden
Tantangan Umum dengan Teknologi Teremerging
- Lanskap ancaman
- Ancaman persisten lanjutan (Advanced persistent threats)
- Risiko teknologi mobile
- Konsumerisasi IT (IoT, Big Data, dan AI)
- Risiko dari Cloud Computing
Ringkasan dan Langkah-Langkah Berikutnya
Requirements
- n/a
Audience
- Profesional IT
Testimonials (4)
the live examples
Lee-Ann Cozyn - Vodacom
Course - Cybersecurity Fundamentals - A Practical Course
Made me aware on how important it is to secure my personal and organizations information/data
Tebogo Skosana - Vodacom SA
Course - Cybersecurity Fundamentals - A Practical Course
Was very interactive and the trainer was very knowledgeable and answered all questions in some cases over sharing and going the extra mile in satisfying the question which was rather excellent ..
Fagmie Mondell - Vodacom SA
Course - Cybersecurity Fundamentals - A Practical Course
The subject matter was very interesting and was able to relate this to my current role at Vodacom.