Keamanan Jaringan
pengenalan sistem operasi open source, tahapan-tahapan footprinting & scanning, konfigurasi Virtual Private Network, dll

What you will learn
Memahami (Menjelaskan) konsep teori jaringan komputer dan keamanannya
Memahami (Menjelaskan) konsep dari confidentiality, authentication, data integrity, availability, Access Control, non repudiation
Memahami (Menjelaskan) konsep tentang perkembangan teknologi informasi dan konsep etika pada dunia maya dan memahami resiko terhadap kejahatan di dunia maya
Memahami (Menjelaskan) tentang jenis-jenis serangan mulai dari interupsi, intersepsi, modifikasi,dan fabrikasi, mengenalkan tentang Denial of Service Attack
Memahami (Menjelaskan) tentang sejarah open source, sistem operasi linux, jenis-jenis perintah dasar di linux
mengoperasikan sistem operasi linux, perintah dasar di linux, mengetahui cara membuat dual boot antara linux dengan windows, dan hirarki sistem linux
(Memahami) Konsep dari footprinting dan scanning,
melakukan trace route untuk mengetahui hop router yang dilewati, menggunakan aplikasi spiderfoot, web data extractor, portscan dan port printing.
Memahami (Menjelaskan) materi tentang Virtual Private Network, mulai dari proses remote access, remote system, authentication, access, control, confidentiality
Memahami (Menjelaskan) Cara kerja dari Firewall, aturan-aturan yang bekerja pada akses list, istilah dari statefull Filtering, stateless filtering
Memahami (Menjelaskan) tentang keamanan web server, mulai dari istilah Remote File Inclusion (RFI), Local File Inclusion (LFI), SQL injection, Cross Site Script
Memahami (Menjelaskan) tentang digital forensik
menyelesaikan masalah untuk melindungi data yang dianggap rentan terhadap pengrusakan/pengahancuran dengan konsep digital forensik
Memahami (Menjelaskan) tentang proses penyerangan (system penetration), many attack vectors, memahami software exploitation attacks, exploits framework
Memahami (Menjelaskan) tentang istilah wardriving tools, netstumbler, kismet, akses point channel detected, hide SSID, WEP dan WPA
Why take this course?
🛡️ Become a Cybersecurity Expert with Keamanan Jaringan at Telkom University 🛡️
Course Title: Introduksi Sistem Operasi Open Source dan Sistem Keamanan Jaringan Headline: Pengenalan Sistem Operasi Open Source, Tahapan-tahapan Footprinting & Scanning, Konfigurasi VPN, dll
Course Overview
Dive into the world of cybersecurity with our comprehensive online course designed to equip you with the knowledge and skills necessary to protect digital assets. This course covers a wide range of topics, including an introduction to open source operating systems, footprinting and scanning techniques, Virtual Private Network (VPN) configuration, and much more.
What You'll Learn:
📚 Week-by-Week Breakdown:
- Pertemuan 1: Introduction to Network Security Fundamentals
- Pertemuan 2: Understanding Malware and Its Impact
- Pertemuan 3: Mastering Scanning and Footprinting Techniques
- Pertemuan 4: Cryptography: The Backbone of Secure Communication
- Pertemuan 5: Navigating the World of Denial of Service (DoS) Attacks
- Pertemuan 6: Setting Up and Managing Virtual Private Networks (VPN)
- Pertemuan 7: Building Robust Firewalls and Access Lists
- Pertemuan 8: Securing Web Environments Against Threats
- Pertemuan 9: System Penetration Testing Strategies
- Pertemuan 10: Exploring Wireless Hacking Techniques
- Pertemuan 11: Introduction to Digital Forensics
Course Objectives:
- Understand network security concepts and principles.
- Grasp key concepts such as confidentiality, authentication, data integrity, availability, access control, and non-repudiation.
- Analyze the evolution of technology information and ethical considerations in cyberspace.
- Identify and understand various attack types, including DDoS attacks.
- Gain hands-on experience with open source systems like Linux, its commands, and its importance in cybersecurity.
- Learn to secure web applications and understand vulnerabilities like SQL injection and XSS.
- Explore digital forensics to protect sensitive data against unauthorized access and breaches.
Hands-On Learning:
This course is not just about theory; it's designed to be practical and hands-on. You will learn by doing, using real-world tools and techniques such as:
- 🛠️ Vulnerability Scanners: Identify vulnerabilities in systems.
- ♻️ Firewall Configuration: Protect networks from malicious traffic.
- 🔒 Web Security Techniques: Secure web applications and databases.
- 📡 Wireless Network Analysis: Detect and defend against wireless security threats.
- 🕵️♂️ Digital Forensics: Investigate cyber incidents and recover digital evidence.
Essential Reading:
To complement your learning, we've selected a set of authoritative texts:
- Joseph Migga Kizza, "Computer Network Security," Springer [2005].
- Stallings S, "Cryptography and Network Security," 4th Edition, Prentice Hall [2011].
- William Stallings, "Network Security Essentials: Applications and Standards," 4th Edition, Prentice Hall [2010].
- "Linux The Complete Reference.6th.Edition," Nov [2007].
- Matthew Rash, "Linux Firewalls: Attack Detection and Response with IPTables, psad, and fwSnort," Syngress [2007].
- Jason Beale, "Snort IDS and IPS Toolkit," Syngress [2007].
- Michael Sikorski, "Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software" [2012].
Join us on this journey to master the art of cybersecurity and safeguard our digital world! 🌐💪
Enroll now and secure your future in the realm of network security with Telkom University's expert-led course. Let's turn today's challenges into tomorrow's solutions!
Screenshots



