KEAMANAN JARINGAN
0%
Previous
Course data
Umum
Announcements
PENDAHULUAN
Buku Sakti Hacker
Pengenalan MK Keamanan Jaringan
The Linux Command Line: A Complete Introduction
[Video] Basic Command Linux
Perintah Dasar Linux
Quiz 0. Linux
[Ext Lab] Linux Fundamentals Part 1
[Ext Lab] Linux Fundamentals Part 2
[Ext Lab] Linux Fundamentals Part 3
Week 1. PENGANTAR KEAMANAN JARINGAN
Ch 1. Pengantar jaringan Komputer
Forum diskusi 1. Keamanan jaringan
Tugas 1
Pengantar Keamanan Jaringan
Cyber Security
Security Standar
Quiz 1. Pengantar Keamanan Jaringan
[Video] Konsep Keamanan Jaringan Komputer
[Video] Elemen Keamanan Jaringan Komputer
[Video] Jenis Serangan 1
[Video] Jenis Serangan 2
[Video] Ancaman dan Penanggulangan
[Ext Lab] Principles of Security
Week 2. Kebijakan Keamanan Jaringan
HUKUM (Undang-Undang) CYBER CRIME
Tugas 2
UU Perlindungan Data Pribadi
UU ITE
Week 3. SCANNING DAN FOOTPRINTING
Ch 3. Scanning and footprinting
Quiz 3. Scanning and Footprinting
Tugas 3
Forum diskusi 3. Scanning
Tahapan Hacking
Footprinting
Google Hacking Database
CVSS
Footprinting_1
Footprinting_2
Teknik Footprinting_1
Teknik Footprinting_2
Scanning
Instalasi NMAP
Praktik Scanning
Praktikum 3. Footprinting
[Ext Lab] Vulnerabilities 101
Week 4 . Denial of Service (DoS) Attack
Ch 4. DDoS
Quiz 4
Tugas 4
Forum Diskusi
[Blog] Denial of Service vs DDos
DDoS ATTACK 1-DISTRIBUTED DENIAL OF SERVICE
DDoS ATTACK 2-DEFINISI
DDoS ATTACK 3-BASIS BANDWIDTH
DDoS ATTACK 4-BASIS LALU LINTAS JARINGAN
DDoS ATTACK 5-BASIS APLIKASI
DDoS ATTACK 6-PERTAHANAN DDoS
DDoS ATTACK 7-CIRI WEBSITE TERSERANG DDoS
Week 5. UJI KOMPETENSI 1
Ujikom 1 Teori
Ujikom 1 Praktek
Ujikom 1 Teori
Ujikom 1 Praktek
Week 6. System Hacking
Ch 5. Sistem Penetrasi
Quiz 5. Sistem Penetrasi
Tugas 5
Forum Diskusi
Tahapan Hacking
Kode Etik Hacking
Metasploit
PENGERTIAN SISTEM PENETRASI
LANGKAH-LANGKAH PENETRASI TEST BAGIAN 1
LANGKAH-LANGKAH PENETRASI TEST BAGIAN 2
TIPE PENETRASI TEST
METODE PENETRASI TEST BAG 1
METODE PENETRASI TEST BAG 2
PRAKTEK MENGGUNAKAN METASPLOIT
[Ext Lab] Introduction to Pentesting
[Ext Lab] Metasploit: Introduction
[Ext Lab] Nmap Live Host Discovery
Petunjuk Praktikum Sistem Penetrasi
Praktikum 9. Hacking
Week 7. Hacking Web Servers
Ch 6. Web Security
Quiz 6. Web Security
Tugas 6
Forum Diskusi
[Blog] Web Security
[Blog] XSS
[Blog] SQL Injection
WEB SECURITY - WHAT IS INTERNET
SQL INJECTION
CROSS-SITE SCRIPTING
APPROACHES TO IMPROVE
APPROACHES TO IMPROVE BAGIAN 2
WEB SECURITY 6
WEB SECURITY 7
Langkah Praktikum Web Security
[Ext Lab] Web Fundamentals
[Ext Lab] OWASP Top 10
[Ext Lab] OWASP Juice Shop
Week 8. Malwares
Ch 7. Malware
Quiz 7. Malware dan Open source Linux
Tugas 7
Forum Diskusi
Malware
[Blog] Definisi Malware
Virus total
https://www.hybrid-analysis.com/
[Video] Malware 1 rootkit
Video] Malware 2 Virus
Video] Malware Worm
Video] Malware 4 Trojan Horse
Video] Malware 5 Spyware
Video] Malware 6 Adware
Praktikum 2. Malware
[Ext Lab] History of Malware
[Ext Lab] MAL: Malware Introductory
[Ext Lab] Basic Malware RE
Week 9. Vulnerabilities Analysis
Tugas 8
Week 10. Ujikom 2
Week 11. Virtual Private Network
Ch 9. VPN
Quiz 9. Virtual Private Network dan Autentikasi
Tugas 9
Forum Diskusi
[Blog] Virtual Private Network
[Blog] VPN Tunneling
PENGERTIAN VIRTUAL PRIVATE NETWORK
JENIS JENIS VITRUAL PRIVATE NETWORK
POINT TO POINT TUNNELING PROTOCOL (PPTP)
LAYER TWO TUNNELING PROTOCOL
INTERNET PROTOCOL SECURITY (IPsec)
SIMULASI JARINGAN VPN (1)
SIMULASI JARINGAN VPN (2)
Langkah Praktikum VPN
Praktikum 6. VPN
Week 12. Firewall dan Akses List
Ch 10. Firewall
Quiz 10. Firewall dan Access list
Tugas 10
Forum Diskusi
[Blog] Firewall
[Blog] Access List (ACL)
[Blog] Network Address Translation
PENGERTIAN FIREWALL
JENIS-JENIS FIREWALL
JENIS-JENIS FIREWALL BAGIAN 2
JENIS-JENIS FIREWALL BAGIAN 3
BERBAGAI FITUR PADA FIREWALL
PRAKTEK MEMBUAT FIREWALL PADA PACKET TRACER
PRAKTEK MEMBANGUN FIREWALL PADA LINUX
Langkah Praktikum Firewall
Praktikum 7. Firewall
Week 13. Kriptografi
Ch 11.1 Cryptography
Ch 11.2 Steganography
Quiz 11
Tugas 11
Forum Diskusi
[Blog] Definisi Kriptografi
Steganography (Apps)
Mata Uang Kripto
[Blog] Steganografi
PENGANTAR KRIPTOGRAFI
KRIPTOGRAFI KLASIK
KRIPTOGRAFI MODERN
SIMULASI CAESAR CHIPPER MENGGUNAKAN CRYPTOOL
PRAKTIK MENGGUNAKAN HASH FUNCTION DENGAN CRYPTOOL
PRAKTIK STEGANOGRAFI
[Ext Lab] Encryption - Crypto 101
Week 14. Digital Forensik
Ch 12. Digital Forensic
Tugas 12
Forum Diskusi
Wireshark
nslookup
whois
DIGITAL FORENSIK 1
DIGITAL FORENSIK 2
DIGITAL FORENSIK 3
DIGITAL FORENSIK 4
DIGITAL FORENSIK 5
DIGITAL FORENSIK 6
DIGITAL FORENSIK 7
[Ext Lab] Investigating Windows
[Ext Lab] Disk Analysis & Autopsy
Week 15. Security Information and Event Management
Tugas 13
Introduction To Wazuh SIEM
Week 14. Ujikom III
Week 12. WIRELESS HACKING
Next
Panel samping
Bahasa Indonesia (id)
Bahasa Indonesia (id)
English (en)
Masukkan kueri pencarian
Masuk
VMI3D3-33575
Depan
Loncat ke konten utama
Info Kursus
Depan
Kursus
FAKULTAS ILMU TERAPAN (FIT)
D3 Teknik Telekomunikasi - Kampus Jakarta
VMI3D3-33575
Penjelasan
KEAMANAN JARINGAN
Pengajar:
NURWAN REZA FACHRUR ROZI