Skill yang Dibutuhkan Data Protection Officer dalam Menjaga Keamanan Cloud Computing Infrastructure

IT Digital
Diperuntukan Untuk Pemula
171 Peserta Terdaftar
Pembaharuan Terakhir 24 Jan 2024 Jam 11:08:30
  • 1. Modul 1A - Introduction to Cloud Security Risk Assessment and Mitigation
  • 2. Modul 1B - Introduction to Cloud Security Risk Assessment and Mitigation
  • 3. Materi Lecture & Tugas
  • 4. Recording Lecture 02:09:21
  • 5. Recording Mentoring Josua 02:07:57
  • 6. Recording Mentoring Rifkie 01:54:11
  • 7. Recording Mentoring Sulkifly 00:55:50
  • 8. Recording Mentoring Koes Wiyatmoko 01:42:33
  • 9. Recording Mentoring Bagus 01:53:41
  • 10. Recording Mentoring Hoiriyah 01:59:33
  • 11. Recording Mentoring Winda Andrini Wulandari 01:27:39
  • 12. Tutor 02:29:01
  • 1. Modul 2A - THREAT MODELLING (Social Engineering)
  • 2. Modul 2B - THREAT MODELLING (Tipe Serangan)
  • 3. Modul 2C - THREAT MODELLING (Aplikasi Serangan)
  • 4. Modul 2D - THREAT MODELLING (Network Attacks)
  • 5. Recording Lecture 02:11:43
  • 6. Tugas
  • 7. Recording Mentoring Josua 01:56:05
  • 8. Recording Soft Skill 01:36:12
  • 9. Materi Soft Skill
  • 10. Recording Mentoring Sulkifly 01:03:44
  • 11. Recording Mentoring Koes Wiyatmoko 02:02:21
  • 12. Recording Mentoring Bagus 01:46:11
  • 13. Mentoring Hoiriyah 01:53:54
  • 14. Recording Mentoring Winda Andrini Wulandari 01:15:28
  • 15. Recording Mentoring Rifkie 01:33:28
  • 16. Tutor 01:30:03
  • 1. Modul 3A - THREAT MODELLING (Threat Actors, Vectors and Intelligent Sources)
  • 2. Modul 3B - THREAT MODELLING (Vulnerabilities)
  • 3. Modul 3C - THREAT MODELLING (Security Assessment Techniques)
  • 4. Modul 3D - THREAT MODELLING (Penetration Testing Techniques)
  • 5. Recording Lecture 01:58:02
  • 6. Tugas
  • 7. Recording Soft Skill 01:27:06
  • 8. Materi Soft Skill
  • 9. Recording Mentoring Josua 02:05:16
  • 10. Recording Mentoring Sulkifly Said 01:42:24
  • 11. Recording Mentoring Hoiriyah 01:42:29
  • 12. Recording Mentoring Bagus 01:50:33
  • 13. Recording Mentoring Rifkie 01:12:35
  • 14. Recording Mentoring Winda Andrini Wulandari 01:38:38
  • 15. Recording Mentoring Koes Wiyatmoko 01:21:57
  • 16. Tutor 01:28:04
  • 1. Modul 4A - Security Concepts in an Enterprise Environment
  • 2. Modul 4B - Virtualization and Cloud Computing
  • 3. Modul 4C - Secure Application Development Deployment and Automation
  • 4. Modul 4D - Authentication and Authorization Design
  • 5. Recording Lecture 02:18:59
  • 6. Tugas
  • 7. Recording Soft Skill 01:28:34
  • 8. Materi Soft Skill
  • 9. Recording Mentoring Josua 02:14:41
  • 10. Recording Mentoring Sulkifly Said 01:01:28
  • 11. Recording Mentoring Bagus 01:55:58
  • 12. Recording Mentoring Koes Wiyatmoko 01:32:12
  • 13. Recording Mentoring Hoiriyah 01:48:54
  • 14. Recording Mentoring Rifkie 01:45:48
  • 15. Recording Mentoring Winda Andrini Wulandari 01:51:31
  • 16. Tutor 01:25:10
  • 1. Modul 5A - Cybersecurity Resilience
  • 2. Modul 5B - Security Implications of Embedded and Specialized Systems
  • 3. Modul 5C - Physical Security Controls
  • 4. Modul 5D - Cryptograph
  • 5. Recording Lecture 02:09:33
  • 6. Tugas
  • 7. Recording Soft Skill 01:30:38
  • 8. Materi Soft Skill
  • 9. Recording Mentoring Josua 01:58:19
  • 10. Recording Mentoring Bagus 02:11:28
  • 11. Recording Mentoring Sulkifly Said 01:12:15
  • 12. Recording Mentoring Koes Wiyatmoko 01:08:54
  • 13. Recording Mentoring Winda Andrini Wulandari 01:17:56
  • 14. Recording Mentoring Hoiriyah 02:02:10
  • 15. Tutor 01:17:30
  • 16. Recording Mentoring Rifkie 01:19:38
  • 1. Modul 6A - Security protocols
  • 2. Modul 6B - Host and Application Security Solutions
  • 3. Modul 6C - Security Network Design
  • 4. Recording Lecture 02:16:30
  • 5. Tugas
  • 6. Recording Soft Skill 01:25:29
  • 7. Materi Soft Skill
  • 8. Recording Mentoring Josua 02:01:21
  • 9. Recording Mentoring Bagus 02:00:31
  • 10. Recording Mentoring Rifkie 01:05:07
  • 11. Recording Mentoring Winda Andrini Wulandari 01:57:04
  • 12. Recording Mentoring Sulkifly Said 01:07:28
  • 13. Recording Mentoring Hoiriyah 01:59:10
  • 14. Recording Mentoring Koes Wiyatmoko 01:58:46
  • 15. Tutor 01:06:30
  • 1. Modul 7A - Wireless Security Settings
  • 2. Modul 7B - Secure Mobile Solutions
  • 3. Modul 7C - Cloud Cybersecurity Solutions
  • 4. Modul 7D - Identify and Account Management Controls
  • 5. Modul 7E - Authentication and Authorization Solutions
  • 6. Modul 7F - Public Key Infrastructure
  • 7. Materi Lecture
  • 8. Tugas
  • 9. Recording Lecture 02:16:31
  • 10. Recording Soft Skill 01:30:27
  • 11. Materi Soft Skill
  • 12. Recording Mentoring Josua 02:13:15
  • 13. Recording Mentoring Bagus 01:56:33
  • 14. Recording Mentoring Sulkifly Said 01:02:32
  • 15. Recording Mentoring Rifkie 58:38:00
  • 16. Recording Mentoring Koes Wiyatmoko 01:18:10
  • 17. Recording Mentoring Hoiriyah 01:55:53
  • 18. Recording Mentoring Winda Andrini Wulandari 01:23:27
  • 19. Tutor 01:19:24
  • 1. Modul 8A - Organizational Security
  • 2. Modul 8B - Incident Response
  • 3. Recording Lecture 02:12:29
  • 4. Tugas
  • 5. Recording Soft Skill 01:30:08
  • 6. Materi Soft Skill
  • 7. Recording Mentoring Sulkifly Said 01:16:34
  • 8. Recording Mentoring Josua 02:11:41
  • 9. Recording Mentoring Bagus 01:52:42
  • 10. Recording Mentoring Winda Andrini Wulandari 02:05:12
  • 11. Recording Mentoring Hoiriyah 02:15:31
  • 12. Recording Mentoring Rifkie 01:28:35
  • 13. Recording Mentoring Koes Wiyatmoko 02:19:02
  • 14. Tutor 48:42:00
  • 1. Modul 9A - Incident Investigation
  • 2. Modul 9B - Incident Mitigation
  • 3. Modul 9C- Digital Forensics
  • 4. Recording Lecture 02:05:55
  • 5. Tugas
  • 6. Recording Mentoring Josua 01:59:39
  • 7. Recording Soft Skill 01:29:50
  • 8. Materi Soft Skill
  • 9. Recording Mentoring Sulkifly Said 01:13:55
  • 10. Recording Mentoring Koes Wiyatmoko 01:40:03
  • 11. Recording Mentoring Bagus 02:21:46
  • 12. Recording Mentoring Hoiriyah 02:07:50
  • 13. Recording Mentoring Winda Andrini Wulandari 01:21:00
  • 14. Recording Mentoring Rifkie 01:29:00
  • 15. Tutor 37:05:00
  • 1. Modul 10A - Control Categories and Types
  • 2. Modul 10B - Regulations, Standards and Frameworks
  • 3. Modul 10C - Organizational Security Policies
  • 4. Modul 10D - Risk Management
  • 5. Modul 10E - Sensitive Data and Privacy
  • 6. Recording Lecture 02:01:45
  • 7. Tugas
  • 8. Tutor 57:08:00
  • 9. Recording Mentoring Sulkifly Said 01:22:04
Deskripsi Pelatihan

Program pelatihan Skill yang Dibutuhkan Data Protection Officer dalam Menjaga Keamanan Cloud Computing Infrastructure adalah sebuah program pelatihan yang ditujukan untuk menghasilkan tenaga ahli di bidang keamanan data dan informasi dalam sistem cloud computing. Pelatihan ini bertujuan untuk memberikan keterampilan dan pengetahuan yang dibutuhkan oleh para profesional IT untuk memastikan keamanan dan integritas data di lingkungan cloud. Program pelatihan Skill yang Dibutuhkan Data Protection Officer dalam Menjaga Keamanan Cloud Computing Infrastructure akan mencakup berbagai topik, seperti: - Konsep dasar keamanan cloud computing, termasuk kebijakan keamanan, mekanisme otentikasi, dan enkripsi data. - Sosialisasi, pengetahuan dan implementasi UU PDP. - Arsitektur keamanan cloud computing, termasuk kontrol akses, pengamanan jaringan, dan manajemen identitas dan akses. - Pengelolaan risiko keamanan pada sistem cloud computing, termasuk pengenalan ancaman dan risiko yang terkait dengan keamanan data dan jaringan. - Teknik deteksi dan respons terhadap serangan keamanan pada sistem cloud computing, termasuk teknik pemantauan dan analisis log serta metode investigasi keamanan. Selain itu, program pelatihan ini juga akan memberikan praktik dan simulasi untuk membantu peserta memperoleh keterampilan praktis dalam mengevaluasi, mengimplementasikan, dan memelihara keamanan sistem cloud computing. Dalam pelatihan ini, peserta akan berlatih menggunakan alat dan teknologi keamanan yang digunakan secara luas dalam industri, seperti firewall, IDS/IPS, SIEM, dan manajemen keamanan cloud. Setelah menyelesaikan program pelatihan ini, peserta diharapkan dapat memiliki pengetahuan dan keterampilan yang dibutuhkan untuk mengelola keamanan sistem cloud computing dan mampu memenuhi standar keamanan dan privasi data yang diperlukan oleh industri.

Untuk Siapa Pelatihan ini

Mahasiswa MSIB Batch 6

Yang akan Anda pelajari
  • Modul 1 - Introduction to Cloud Security Risk Assessment and Mitigation
  • Modul 2 - Threat Modelling 1
  • Modul 3 - Threat Modelling 2
  • Modul 4 - Identify a cloud-based application or service to assess 1
  • Modul 5 - Identify a cloud-based application or service to assess 2
  • Modul 6 - Cybersecurity Implementation 1
  • Modul 7 - Cybersecurity Implementation 2
  • Modul 8 - Operations and Incident Response 1
  • Modul 9 - Operations and Incident Response 2
  • Modul 10 - Governance, Risk, and Compliance pada Cybersecurity: dibawah UU PDP
  • Modul 11 - Final Project
Persyaratan
  • Mahasiswa minimal Semester 5. Jurusan Matematika / Statistika / Engineering / Teknologi Informasi/Ilmu Komputer /Teknik Elektro/Sistem Informasi/Teknik Informatika/Sistem Komputer, Semua Jurusan Fakultas MIPA, Semua Jurusan Fakultas Teknik. Jenjang S1/D3
  • Mampu membuat analisa dan mampu bekerjasama dalam kelompok
  • Memahami Sistem Operasi Komputer
  • Memahami Jaringan Komputer

Tentang Mentor

Mentor Excellensia
Mentor Excellensia

sa

    Tidak ada pengumuman

Umpan Balik Peserta

.0

1
0%
2
0%
3
0%
4
0%
5
0%

Ulasan

Rp. 1.300.000


Pelatihan ini mendapatkan

353:19:24 Jam Video Pelatihan
148 Materi Pelajaran
Akses Materi Selamanya
Sertifikat Kelulusan

Pelaksanaan Kelas

24 Jan 2024 - 30 Sep 2024