We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

Pelatihan ini membahas berbagai macam konsep, alat, dan praktik terbaik dari keamanan IT. Di sini akan diperkenalkan ancaman dan serangan dan berbagai cara kemunculan mereka. Kami akan memberi Anda beberapa latar belakang algoritma enkripsi dan bagaimana mereka digunakan untuk melindungi data. Kemudian, kami akan membahas lebih jauh tentang “tiga A”dari keamanan informasi: authentication, authorization, accounting. Kami juga akan membahas solusi keamanan jaringan, mulai dari firewall hingga opsi enkripsi Wifi. Pelatihan ini diakhiri dengan menyatukan semua elemen ini ke dalam arsitektur keamanan yang berlapis-lapis dan mendalam, diikuti dengan rekomendasi tentang cara mengintegrasikan budaya keamanan ke dalam organisasi atau tim Anda.

Read more

Pelatihan ini membahas berbagai macam konsep, alat, dan praktik terbaik dari keamanan IT. Di sini akan diperkenalkan ancaman dan serangan dan berbagai cara kemunculan mereka. Kami akan memberi Anda beberapa latar belakang algoritma enkripsi dan bagaimana mereka digunakan untuk melindungi data. Kemudian, kami akan membahas lebih jauh tentang “tiga A”dari keamanan informasi: authentication, authorization, accounting. Kami juga akan membahas solusi keamanan jaringan, mulai dari firewall hingga opsi enkripsi Wifi. Pelatihan ini diakhiri dengan menyatukan semua elemen ini ke dalam arsitektur keamanan yang berlapis-lapis dan mendalam, diikuti dengan rekomendasi tentang cara mengintegrasikan budaya keamanan ke dalam organisasi atau tim Anda.

Di akhir pelatihan ini, Anda akan memahami:

● bagaimana cara kerja berbagai algoritma dan teknik enkripsi beserta semua manfaat dan keterbatasannya.

● berbagai sistem dan jenis autentikasi.

● perbedaan antara autentikasi dan otorisasi.

● bagaimana mengevaluasi potensi risiko dan merekomendasikan cara untuk mengurangi risiko.

● praktik baik untuk mengamankan jaringan.

● bagaimana membantu orang lain untuk memahami konsep keamanan dan melindungi diri mereka sendiri.

Enroll now

What's inside

Syllabus

Memahami Ancaman Keamanan
Selamat datang di pelatihan Keamanan IT untuk program Sertifikat Profesional IT Support. Di minggu pertama materi ini, kita akan membahas dasar-dasar keamanan di lingkungan IT. Kita akan mempelajari bagaimana cara mendefinisikan dan mengenali risiko keamanan, kerentanan dan ancaman. Kita akan mengidentifikasi serangan keamanan yang paling umum terjadi pada organisasi dan memahami bagaimana konsep keamanan dalam prinsip “CIA.” Di akhir modul ini, Anda akan mengetahui jenis perangkat lunak berbahaya, serangan jaringan, serangan client-side, dan istilah keamanan penting yang akan Anda lihat di tempat kerja.
Read more
Pelcgbybtl (Kriptologi)
Di minggu kedua materi ini, kita akan mempelajari tentang kriptologi. Kita akan mengeksplorasi berbagai jenis praktik enkripsi dan bagaimana cara kerjanya. Kami akan tunjukkan pada Anda algoritme paling umum yang digunakan di kriptografi dan bagaimana mereka berevolusi dari waktu ke waktu. DI akhir modul ini, Anda akan memahami bagaimana cara kerja enkripsi simetris, enkripsi asimetris, dan hashing; Anda juga akan mengetahui bagaimana memilih metode kriptografi yang paling sesuai dengan skenario yang Anda temui di tempat kerja.
Keamanan AAA (Bukan Jasa Bantuan Darurat)
Pada minggu ketiga materi ini, kita akan belajar tentang “tiga A” dalam keamanan siber. Apa pun jenis peranan Anda dalam bidang teknologi, sangatlah penting untuk memahami cara autentikasi, otorisasi dan akuntansi dalam suatu organisasi. Di akhir modul ini, Anda diharapkan dapat memilih metode autentikasi, otorisasi dan tingkat akses yang paling sesuai untuk diberikan kepada pengguna dalam sebuah organisasi.
Mengamankan Jaringan Anda
Pada materi di minggu keempat ini, kita akan mempelajari arsitektur jaringan komputer yang aman. Penting untuk mengetahui cara menerapkan langkah-langkah keamanan di suatu lingkungan jaringan, jadi kami akan menunjukkan kepada Anda beberapa praktik terbaik untuk melindungi jaringan sebuah organisasi. Kita akan belajar tentang beberapa risiko jaringan nirkabel dan cara mitigasinya. Kita juga akan membahas cara memantau lalu lintas jaringan dan membaca tangkapan paket. Di akhir modul ini, Anda akan memahami cara kerja VPN, proxy, dan reverse proxy; alasan mengapa 802.1X sangat penting untuk perlindungan jaringan; memahami mengapa WPA/WPA2 lebih baik daripada WEP; dan mengetahui cara menggunakan tcpdump untuk menangkap dan menganalisis paket di jaringan. Informasi yang sangat banyak dan sangat berharga untuk dipahami IT Support Specialist.
Pertahanan Berlapis
Pada minggu kelima materi ini, kita akan mempelajari masalah pertahanan keamanan secara lebih mendalam. Kita akan membahas cara menerapkan metode pengerasan sistem, pengerasan aplikasi, dan menetapkan kebijakan keamanan OS. Di akhir modul ini, Anda akan memahami pentingnya menonaktifkan komponen sistem yang tidak diperlukan, mempelajari firewall berbasis host, menyiapkan perlindungan anti-malware, menerapkan enkripsi disk, dan mengonfigurasi manajemen patch perangkat lunak dan kebijakan aplikasi.
Menciptakan Budaya Perusahaan untuk Keamanan
Selamat, Anda telah mencapai minggu terakhir dari materi ini. Di minggu terakhir ini, kita akan mempelajari cara-cara menciptakan budaya perusahaan tentang keamanan. Setiap orang yang berperan di bidang teknologi harus dapat menentukan tindakan yang tepat guna memenuhi tiga tujuan keamanan. Di akhir modul ini, Anda akan mengembangkan rencana keamanan bagi sebuah organisasi untuk mendemonstrasikan keterampilan yang telah Anda pelajari dalam materi ini. Tetap semangat, pertahankan kemajuan Anda.
Untitled Module

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Mengajarkan kriptografi, yang sangat penting untuk keamanan dunia maya
Membahas metode pengerasan sistem dan aplikasi untuk meningkatkan keamanan
Mencakup arsitektur jaringan komputer yang aman, penting untuk melindungi jaringan organisasi
Membahas langkah-langkah untuk menciptakan budaya keamanan perusahaan yang kuat
Menekankan pentingnya autentikasi, otorisasi, dan akuntabilitas untuk keamanan informasi
Tidak memberikan informasi terbaru tentang ancaman dan serangan keamanan terbaru

Save this course

Save Keamanan IT: Pertahanan terhadap Kejahatan Digital to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Keamanan IT: Pertahanan terhadap Kejahatan Digital with these activities:
Latihan mengenali jenis-jenis perangkat lunak berbahaya
Melatih kemampuan untuk mengidentifikasi malware akan meningkatkan keterampilan Anda dalam mendeteksi dan mencegah ancaman keamanan.
Browse courses on Malware
Show steps
  • Kumpulkan contoh perangkat lunak berbahaya dari sumber yang bereputasi baik.
  • Analisis karakteristik dan perilaku masing-masing perangkat lunak berbahaya.
  • Lakukan latihan simulasi untuk menguji kemampuan identifikasi Anda.
Show all one activities

Career center

Learners who complete Keamanan IT: Pertahanan terhadap Kejahatan Digital will develop knowledge and skills that may be useful to these careers:
Security Engineer
As a Security Engineer, you are responsible for implementing and maintaining security solutions for an organization. You work with a team of security professionals to ensure that the organization's information assets are protected. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Penetration Tester
As a Penetration Tester, you are responsible for testing the security of an organization's information systems. You work with a team of security professionals to identify vulnerabilities in the organization's systems and develop recommendations for remediation. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Network Security Engineer
As a Network Security Engineer, you are responsible for designing and implementing security solutions for an organization's network. You work with a team of security professionals to ensure that the organization's network is protected from unauthorized access. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Security Consultant
As a Security Consultant, you are responsible for providing security advice and guidance to organizations. You work with clients to identify their security needs, develop security solutions, and implement security measures. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Incident Responder
As an Incident Responder, you are responsible for responding to security incidents and restoring normal operations. You work with a team of security professionals to identify the cause of the incident, contain the damage, and recover the affected systems. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Cloud Security Engineer
As a Cloud Security Engineer, you are responsible for designing and implementing security solutions for organizations' cloud environments. You work with a team of security professionals to ensure that the organization's information is protected from unauthorized access. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Cryptographer
As a Cryptographer, you are responsible for developing and implementing cryptographic solutions for organizations. You work with a team of security professionals to ensure that the organization's information is protected from unauthorized access. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Security Analyst
As a Security Analyst, you are responsible for monitoring and analyzing security events, investigating security incidents, and developing and implementing security solutions. You work with a team of security professionals to ensure that the organization's information assets are protected. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Malware Analyst
As a Malware Analyst, you are responsible for analyzing malware and developing countermeasures to protect organizations from malware attacks. You work with a team of security professionals to identify new malware threats, develop detection and prevention techniques, and provide guidance to organizations on how to protect themselves from malware. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Security Architect
As a Security Architect, you are responsible for designing and implementing security solutions for an organization. You work with a team of security professionals to ensure that the organization's information assets are protected. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Forensic Analyst
As a Forensic Analyst, you are responsible for investigating security incidents and providing evidence to law enforcement. You work with a team of security professionals to collect and analyze evidence, identify the perpetrators of the incident, and develop recommendations for remediation. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Information Security Analyst
As an Information Security Analyst, you are responsible for monitoring and analyzing security events, investigating security incidents, and developing and implementing security solutions. You work with a team of security professionals to ensure that the organization's information assets are protected. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Blockchain Developer
As a Blockchain Developer, you are responsible for developing and implementing blockchain solutions for organizations. You work with a team of security professionals to ensure that the organization's information is protected from unauthorized access. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
IT Auditor
As an IT Auditor, you are responsible for evaluating the security of an organization's information systems. You work with a team of auditors to ensure that the organization's information assets are protected. This course can help you build a foundation in information security by providing you with an understanding of the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.
Chief Information Security Officer (CISO)
As the Chief Information Security Officer (CISO) of an organization, you are responsible for developing and implementing information security policies and procedures. You lead a team of security professionals, establish and maintain relationships with vendors, and are responsible for ensuring that the organization's information assets are protected. This course may be useful in helping you understand the different types of security threats that an organization faces, the different types of security measures that can be implemented, and the importance of creating a culture of security within an organization.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Keamanan IT: Pertahanan terhadap Kejahatan Digital.
Buku teks yang komprehensif tentang kriptografi dan keamanan jaringan. Memberikan dasar yang kuat dalam konsep dan praktik keamanan siber, sangat bermanfaat untuk kursus ini.
Buku ini membahas teknik dan alat penilaian keamanan jaringan. Memberikan panduan langkah demi langkah untuk mengidentifikasi dan mengatasi kerentanan jaringan, sangat bermanfaat untuk kursus ini.
Buku ini mengulas praktik terbaik untuk pemantauan keamanan jaringan. Memberikan panduan tentang cara mendeteksi dan merespons insiden keamanan, sangat bermanfaat untuk kursus ini.
Buku ini membahas dasar-dasar keamanan data dan komputer. Memberikan pemahaman yang kuat tentang konsep dan teknik keamanan, bermanfaat sebagai referensi latar belakang.
Buku ini memberikan pemahaman mendalam tentang teknik peretasan. Meskipun bukan bagian penting dari kursus ini, buku ini menyediakan wawasan yang berharga tentang cara kerja peretas, bermanfaat untuk minat lebih lanjut.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Keamanan IT: Pertahanan terhadap Kejahatan Digital.
Perencanaan Proyek: Menyatukan Semuanya
Most relevant
Pelaksanaan Proyek: Menjalankan Proyek
Most relevant
Seluk Beluk Jaringan Komputer
Most relevant
Dasar-Dasar Dukungan Teknis
Most relevant
Cara Praktis Membuat Aneka Masakan Oriental
Most relevant
Administrasi Sistem dan Layanan Infrastruktur TI
Most relevant
Gemini for Network Engineers - Bahasa Indonesia
Most relevant
Dasar-dasar Analitik Data: Data, Data di Mana-mana
Most relevant
Mendesain Pengalaman Pengguna untuk Kebaikan Sosial &...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser