SlideShare a Scribd company logo
1 of 64
Download to read offline
ACAD-CSIRT
COMPUTER	SECURITY	&	THE	CAREER	PATH	IN	THE	WORLD,	
HOW	‘RE	TIPS	TO	ACHIEVE	IT
Seminar	Computer	&	Cyber	Security
Disampaikan oleh
IGN	MANTRA	– Chairman
Peneliti Cyber		War,	Cyber	Crime	dan Cyber	Security	
Indonesia	Academic	CSIRT
15	April	2018,	Bekasi
STMIK	BANI	SALEH
PROFILE
PROFILE
IGN	MANTRA,	www.ignmantra.id
Opini ttg “Skimming”	di	Kedaipena.com,	
By Irfan	Murpratomo | April	5,	2018
http://kedaipena.com/solusi-menghindari-skimming-dari-perbanas-institute/
http://kedaipena.com/solusi-menghindari-skimming-dari-perbanas-institute/
Opini ttg “Kebocoran data	Facebook	di	Kedaipena.com,	
By Mahameru	Alfaraby | Maret 25,	2018
http://kedaipena.com/penjelasan-perbanas-soal-kebocoran-data-facebook-dalam-kemenangan-trump/
Opini ttg “BSSN”	di	Kedaipena.com,	By Irfan	Murpratomo | Januari 9,	
2018
http://kedaipena.com/perbanas-sebut-bssn-berpotensi-tumpang-tindih-dengan-lembaga-lain/
http://kedaipena.com/perbanas-sebut-bssn-berpotensi-tumpang-tindih-dengan-lembaga-lain/
Opini IGN	Mantra	ttg “WannaCry”	di	Kedaipena.com
By Irfan	Murpratomo | Mei	17,	2017
URL	:	http://kedaipena.com/wannacry-kerap-serang-situs-rumah-sakit-ini-penyebabnya/
Opini IGN	Mantra	ttg “Petya”	di	Kedaipena.com
By Irfan	Murpratomo | Juli 3,	2017
URL	:	http://kedaipena.com/ini-penjelasan-cyber-security-lab-perbanas-soal-virus-petya/
Opini IGN	Mantra	di	detik.com
MELAMAR PEKERJAAN
CLASSIC	JOBS
Antri Lamaran Pekerjaan
JOBS	Fair	1
Antri Lamaran Pekerjaan
JOBS	Fair	2
Antri Lamaran Pekerjaan
JOBS	Fair	3
Seleksi Masuk CPNS
Antri Jobs	Online	di	Jobs	Fair
Antri SKCK	Untuk Melamar Pekerjaan
REMOTE	JOBS
Remote	Jobs
Remote	Jobs
Free	Lancer
Free	Lancer
The	Best	10	Indonesian	Youtubers
START	UP	COMPANY
http://www.businessinsider.com/top-hot-startups-to-launch-in-2017-
7/?IR=T/#essential-from-the-creator-of-android-is-gunning-for-apple-and-samsung-1
APLIKASI	ANAK	BANGSA	MENDUNIA
Sumber :	INFOKOMPUTER	JUNI	2014,	Basis	OS	:	Android,	IOS,	Windows,	Blackberry.
PicMix Harpoen PicStory MemeLens
Catfiz
Messenger
MindTalk
Save	The	
Hamsters
Icon	Pop	
Song
Ninja	
Fishing
Ramen	
Chain
Aplikasi Anak Bangsa
PicMix,	Inovidea
Magna	Global,	
Android,	BB,	
IOS,	5.000.000+
Harpoen,	
Harpoen,	Pte,	
Ltd,	IOS,	
Android,	5.000+
PicStory,	Rsito
Mobile,	BB,	
Android,	
1.000.000+
MemeLens,	
Creacle Studio,	
Win	Phone,	
2.000+
Aplikasi Anak Bangsa
CatFiz
Messenger,Dunia
CatFiz Kreatif,	
Android,	
1.000.000+
MindTalk,	Ansvia
IOS,	Android,	BB,	
Win	Phone,	
1.000+
Save	The	
Hamsters,	Solite
Studio,	Win	
Phone,	Win	8,	
100.000+
Icon	Pop	Song,	
Alegrium,	
Android,	IOS,	
100.000+
Aplikasi Anak Bangsa
Ninja	Fshing,	
Menara
Games,	
Adroid,	IOS,	
1.000.000+
Ramen	Chain,	
Touchten
Games,	
Android,	IOS,	
500.000+
Agenda
COMPUTER	&	CYBER	SECURITY
Apa itu Keamanan Informasi ?	IT	Security	?
Standard	di	Industri
Job	Profiles
Sertifikasi	dan	Karir
Tips
Tujuan Hidup Seseorang
UANG/HARTA POPULARITAS
KENYAMANAN
Bagaimana dapat mencapai hal tersebut ?
Orangtua	yang	
kaya	raya
Menikah	
dengan	pacar	
yang	kaya
Menang	
undian/dapat	
rejeki	runtuh
Menjadi	Black	
Hacker	- negatif
Menjadi	White	
Hacker	- positif
Mendapat	
bantuan	dari	
teman/institusi
Anda sendiri yang	dapat mengubah karir anda
SEMUA	TERGANTUNG	USAHA	ANDA
Under	Ground	Security	Business	Jobs	&	Paid
Sumber :	Kaspersky
• Hiring	a	botnet	for	DDoS	attacks costs	from	$50	to	thousands	of	dollars	for	a	continuous	24-
hour	attack.
• Stolen	bank	account	details vary	from	$1	to	$1,500	depending	on	the	level	of	detail	and	
account	balance.
• Personal	data	capable	of	allowing	the	criminals	to	open	accounts in	stolen	names	costs	$5	
to	$8	for	US	citizens;	two	or	three	times	that	for	EU	citizens.
• A	list	of	one	million	email	addresses costs	between	$20	and	$100;	spammers	charge	$150	to	
$200	extra	for	doing	the	mailshot.
• Targeted	spam	mailshots can	cost	from	$70	for	a	few	thousand	names	to	$1,000	of	tens	of	
millions	of	names.
• User	accounts	for	paid	online	services	and	games	stores such	as	Steam	go	for	$7	to	$15	per	
account.
• Phishers pay	$1,000	to	$2,000	a	month	for	access	to	fast	flux	botnets
• Spam	to	optimise a	search	engine	ranking is	about	$300	per	month.
• Adware	and	malware	installation	ranges from	30	cents	to	$1.50	for	each	program	installed.	
But	rates	for	infecting	a	computer	can	vary	widely,	from	$3	in	China	to	$120	in	the	US,	per	
computer.
MARI	KITA	FOKUS	SEBENTAR
Jumlah Digital	Devide Saat Ini
Sumber :	Infokomputer Okt 2016
Rumah yang	
terkoneksi ke
Internet
1	Miliar
Kecepatan Rata-rata	
Koneksi Internet	
Dunia
1.8	mbps
Nilai Belanja TI	
Sampai Akhir 2016
3.54	T	USD
Jumlah Internet	
Users
3,631	Miliar
Harga Bandwidth	Makin	Turun
Tahun 1998
• 1,200	US$	/	
MBps
• Handset	4jt
Tahun 2013
• 1.57	US$	/	
MBps
• Handset	
500rb
Tahun 2014
• 0.94	US$	/	
MBps
• Handset	
500rb
Tahun 2015
• 0.63	US$	/	
MBps
• Handset	
200rb
Tahun 2017
• 0.51	US$	/	
MBps
• Handset	
300rb
Top	Cyber	Threats	2015
http://www.insurancejournal.com/news/national/2015/11/17/389164.htm
Hardware Ransomware Wearables
Employee Cloud	Services Automobiles
Warehouse	of	
stolen	data
Integrity	
Attacks
Sharing	threat	
Intelligence
Mengapa harus mengamankan
Computer	dan Informasi ?
Meningkatkan	kepatuhan	terhadap	peraturan	(compliance).
Mengharuskan	organisasi	untuk	mengadopsi	standar	keamanan	dan	kerangka	kerja	untuk	
pendekatan	jangka	panjang	dan	untuk	mitigasi	risiko.
Semakin	berkembangnya	ancaman	dan	model	serangan.
Terus	belajar	untuk	ketrampilan	baru	dan	teknik	baru.
Konvergensi	keamanan	fisik	dan	keamanan	informasi.
Akuntabilitas	antara	profesional	keamanan	informasi	dan	manajemen	yang	jatuh	pada	
beberapa	eksekutif	kunci	untuk	mengelola	tumbuhnya	eksposur	risiko	dewasa	ini.
Apa itu Informasi ?
Informasi	adalah	kumpulan	DATA	yang	
berguna.
Informasi	bisa	jadi
• Rincian	data	pribadi	anda
• Rincian	data	perusahaan	Anda
• Track	Record	masa	depan
Apa Saja Domain	Keamanan Informasi ?
Keamanan	dalam	
Akses
Keamanan	Jaringan	
dan	Telko
Keamanan
Informasi dan
Manajemen Resiko
Keamanan	Aplikasi
Kriptografi
Arsitektur	dan	
Desain	Keamanan
Keamanan	Operasi
Perencanaan untuk
Kelanjutan Bisnis
dan Pemulihan
Bencana
Investigasi,	
Kepatuhan,	Regulasi	
dan	Hukum
Keamanan	Fisikal
Apa berikutnya ?
Explore :
Standard	Industri
Knowledge	– Pengetahuan	menjadi	penting	dalam	
Standard	Industri
Certification	– Membantu	untuk	pengakuan	skill	dalam	
Standard	Industri
JOB	PROFILES
Fenomena SDM	IT	Global
Konseptor	IT
•USA
Programmer
•INDIA
Pekerja	IT
•Japan	&	Korea
Konsultan	IT
•Australia,	Singapore
Syariah	IT
•Malaysia,	Saudi	Arabia,	
Kuwait
Hackers
•China
Defence	
•????
Data	Program	Studi	Th.2015
Sumber	:	Dirjen	Dikti,	Kemendiknas
• Jumlah	PS	D1-4 +	S1+(S2+S3)	=	2078
• Jenjang	Pendidikan	TIK	:	D1-D2-D3-D4,	S1-S2-
S3	:	
– Ilmu	Komputer,	
– Manajemen	Informatika,	
– Komputer	Multimedia/Jaringan,	
– Sistem	Infomasi,	
– Sistem	Komputer,	
– Teknik	Informatika,	
– Teknik	Komputer	dan	
– Teknologi	Informasi.
SERTIFIKASI DAN KARIR
Cyber	Security	Career	Path
EC-Council	
Computer	Security	Career	Path	2017
EC-Council	Security	Career	Base
Remunerations
• Non	Sertifikasi (D3-2.5	
jt)	sesuai UMP/UMR
• Sertifikasi (D3-5jt)
Lokal
• Non	Sertifikasi (2,000	
USD$)
• Sertifikasi (3,000-4,000$)
Internasional
6	Cybersecurity	Roles	Netting	Top	Salaries	2017
https://www.mondo.com/blog-highest-paid-cybersecurity-jobs/
Application	Security	Engineer: This cybersecurity role	tops	the	list	with	an	average	salary	range	that	falls	
between	$100,000	to	$210,000
Network	Security	Analyst: Another	of	the	highest-paid cybersecurity jobs,	Network	Security	Analysts	
make	on	average	between	$90,000	and	$150,000
IS	Security	Manager: Another	of	the	highest-paid cybersecurity jobs	highlighted	that	falls	between	
$120,00	and	$180,000
Cybersecurity	Analyst: The	average	annual	salary	for	this cybersecurity title	falls	between	$90,000	and	
$185,000.
Penetration	Tester: A	title	that	is	still	unfamiliar	to	some	although	it's	been	around	for	years,	the	
Penetration	Tester	role	nets	an	average	salary	between	$80,000	and	$130,000.
IS	Security	Engineer: Rounding	out	this	list	of	the	highest-paid cybersecurity jobs	is	the	Information	
Systems	Security	Engineer.	This	role	nets	an	average	salary	range	of	$90,000	to	$150,000.
TIPS	TO	ACHIEVE
10	TIPS	Cyber	Security	Achieved
Research Get	Qualified
Acquire	a	Rounded	
Skill	Set
Learning	in	the	
Workplace	
Through	an	
Apprenticeship
Work	Experience Internships
Join	a	Professional	
Association
Take	the	Cyber	
Security	Challenge
Set	up	Your	Own	
Testing	Site
Set	up	a	Personal	
Network
Research
• Find	out	more	about	the	field	of	cyber	security.	
• Having	a	good	knowledge	of	the	different	kinds	of	discipline	
that	the	work	involves	will	not	only	show	a	potential	employer	
that	you	have	a	general	(and	genuine)	interest	in	the	subject	
but	it	will	also	help	you	to	decide	the	particular	type	of	work	
you	want	to	do	and	what	you	think	will	be	most	suited	to	your	
skill	set	and	experience.	
• Read	as	much	as	you	can	on	subjects	such	as	protecting	
information,	confidentiality,	information	assurance,	
penetration	testing,	data	confidentiality	and	encryption.
Get	Qualified
• Any	training	and	qualifications	that	you	gain	
will	go	a	long	way	towards	advancing	a career	
in	cyber	security.	
• You	should	consider	enrolling	in cyber	security	
courses that	are	industry	recognised,	such	as	
the	CEH	(Certified	Ethical	Hacker)	and	the	
Global	Information	Assurance	Certification	
GPEN	(Certified	Penetration	Tester)	
Certificates.
•
Acquire	a	Rounded	Skill	Set
• Although	having	specialist	knowledge	of	cyber	
security	is	important,	it	will	also	help	in	your	search	
for	a	job	to	be	able	to	show	a	more	rounded,	overall	
technical	experience.	
• If	you	are	currently	working	in	I.T,	use	this	as	a	base	
for	developing	a	core	set	of	I.T.	skills.	If	you	aren’t	
working	in	I.T,	you	should	check	out	any	courses	that	
are	available	locally	to	give	you	the	basic	grounding	
in	I.T	that	will	boost	your	chances	of	getting	the	job	
that	you	want.
•
Learning	in	the	Workplace	Through	an	
Apprenticeship
• If	you	feel	that	you	would	prefer	a	more	“hands	on”	
approach	to	gaining	expertise	in	cyber	security	or	
don’t	like	the	idea	of	limiting	your	education	to	a	
college	setting,	why	not	look	at	whether	there	are	
any	apprenticeships	available	through	the National	
Apprenticeship	Service?	
• That	way	you	can	acquire	the	necessary	skills	and	
experience	at	the	same	time	as	earning	a	living.
Work	Experience
• Even	though	an	apprenticeship	may	not	be	available,	
it	might	still	be	possible	to	get	a	better	idea	of	the	
fundamental	aspects	of	cyber	security,	and	the	way	
in	which	the	professionals	in	the	industry	work,	by	
spending	some	time	on	a	work	experience	
placement.	
• Whilst	this	may	not	involve	any	pay,	except,	perhaps	
your	expenses,	the	experience	it	provides	may	make	
a	difference	when	it	comes	for	applying	for	your	job	
in	cyber	security.
Internships
• Another	useful	way	of	getting	experience	in	
the	workplace	is	through	one	of	the	
internships	that	many	of	the	larger	
organisations offer.	
• Although,	again,	this	may	involve	unpaid	work,	
the	experience	may	prove	invaluable	and,	at	
the very	least,	will	be	a	useful	addition	to	
your	C.V.
Join	a	Professional	Association
• You	can	advance	your	understanding	of	cyber	security	work	
and	become	involved	in	the	profession,	even	before	becoming	
a	professional	yourself,	by	joining	associations	such	as	the IISP	
(Institute	of	Information	Security	Professionals).	
• The	IISP	offers	affiliate	membership,	which	qualifies	you	to	
attend	lectures	by	experts	and	leaders	in	the	field,	to	receive	
regular	newsletters,	to	have	discounted	attendance	at	training	
and	workshops,	to	attend	regional	meetings,	to	have	access	to	
members-only	areas	of	their	website	and,	most	importantly,	
to	be	able	to	access	their	jobs	board.
Take	the	Cyber	Security	Challenge
• This	is	a	series	of	competitions,	organised and	conducted	by Cyber	Security	
Challenge	UK.	It	is	designed	to	put	your	skills	in	cyber	security	to	the	test.	
• The	challenges	have	been	formulated	by	several	of	the	biggest	security	companies	
in	the	country	and	are	also	backed	by	the	Cabinet	Office	and,	if	you	win,	you	may	
even	be	offered	a	job	on	the	strength	of	your	success	in	the	competition.	
• The	challenge	currently	involves	a	virtual	skyscraper	known	as	‘Cyphinx’,	which	is	
designed	to	resemble	a	3D	console	game.	Contestants	enter	the	building	to	be	met	
with	a	variety	of	puzzles,	challenges	and	demands	on	their	digital,	forensic,	
analytical	and	defence skills.	
• Many	people	take	this	challenge	if	they	are	looking	to	get	a cryptography	job or	
are	studying	a cryptography	course to	gain	some	real	world	experience.	The	first	
winner	of	the	challenge	was	a	postal	worker,	who	has	now	been	elevated	to	Royal	
Mail’s	cyber	security	team!
Set	up	Your	Own	Testing	Site
• It	is	difficult	to	gain	real	first	hand	experience	of	cyber	crime	unless	you	
are	either	a	criminal	trying	to	commit	a	security	crime	or	the	security	
professional	assigned	to	guard	against	it.	One	way	of	testing	your	skills	on	
a	more	“hands-on”	basis	is	by	setting	up	your	own	network,	using	two	or	
more	old	computers	and	a	cheap	wireless	router.	
• This	way,	you	can	carry	out	all	manner	of	checks	and	tests	as	to	the	
security	of	the	network	switch,	firewall,	server	and	other	hardware	and	
software	in	the	network	and	devise	methods	of	securing	any	shortfalls	
that	you	uncover.	
• This	is	the	type	of	initiative	that	might	just	tip	the	balance	your	way	when	
you	are	competing	for	a real job	in	cyber	security.
Set	up	a	Personal	Network
• As	in	most	walks	of	life,	the	people	we	meet	are	often	as	
important	as	the	things	that	we	learn.	Spend	as	much	time	as	
you	can	with	professionals	in	the	field	and	others	who	are	
aiming	for	a	career	in	the	profession.	
• Share	your	ideas	and	experiences	with	them	and, most	
importantly, listen	to	what	they	have	to	say	to	you!	
Knowledge	acquired	through	the	development	of	a	personal	
network	of	people	who	are	interested	and	have	experience	in	
the	field	of	cyber	security	will	help	you	learn	but	may	also	
result	in	you	making	some	very	valuable	future	contacts	when	
it	comes	to	applying	for	a	job.
PENUTUP
Kesimpulan
• Lahan pekerjaan Teknologi Informasi luas sekali.
• Lahan pekerjaan Computer	&	Cyber	Security	luas sekali,	perusahaan yang	
IT	nya sudah maju pasti akan memikirkan Computer	Security.
• Pekerjaan dan profesi bidang Computer	&	Cyber	Security	masih
terbentang luas,	kue pekerjaan masih belum tergarap dengan baik.
• Perlu latihan untuk meningkatkan skill	di	ranah Computer	&	Cyber	
Security.
• Perlu sertifikasi dan pengakuan baik national	dan internasional terhadap
skill	yang	kita miliki.
• Renumerasi akan berbanding lurus dengan skill	yang	kita miliki.
• Perlu memikirkan startup	bidang computer	&	cyber	security	karena masih
sedikit sekali di	Nasional.
• Sering membaca,	sharing	dan mengikuti perkembangan jaman terhadap
kemajuan IT,	computer	&	cyber	security.
TERIMA	KASIH
Contact	:
Informations :	info@acad-csirt.or.id
Incident	Response	:	incident@acad-csirt.or.id
URL	:	http://www.acad-csirt.or.id
URL	:	www.ignmantra.id
FanPage FB	:	http://www.facebook.com/ACAD	CSIRT-Indonesia

More Related Content

More from IGN MANTRA

2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantra2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantraIGN MANTRA
 
2020 07-16 data security lokal-internet it up pancasila
2020 07-16 data security lokal-internet it up pancasila2020 07-16 data security lokal-internet it up pancasila
2020 07-16 data security lokal-internet it up pancasilaIGN MANTRA
 
2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantra2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantraIGN MANTRA
 
2020 06-30 cyber security kbk kkni aptikom-ign mantra
2020 06-30 cyber security kbk kkni aptikom-ign mantra2020 06-30 cyber security kbk kkni aptikom-ign mantra
2020 06-30 cyber security kbk kkni aptikom-ign mantraIGN MANTRA
 
2020 06-20 data security lokal-internet ngampooz
2020 06-20 data security lokal-internet ngampooz2020 06-20 data security lokal-internet ngampooz
2020 06-20 data security lokal-internet ngampoozIGN MANTRA
 
2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantra2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantraIGN MANTRA
 
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0 Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0 IGN MANTRA
 
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019IGN MANTRA
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...IGN MANTRA
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 finalIGN MANTRA
 
2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssn2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssnIGN MANTRA
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.IGN MANTRA
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017IGN MANTRA
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...IGN MANTRA
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...IGN MANTRA
 
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBERIGN MANTRA
 

More from IGN MANTRA (20)

2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantra2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantra
 
2020 07-16 data security lokal-internet it up pancasila
2020 07-16 data security lokal-internet it up pancasila2020 07-16 data security lokal-internet it up pancasila
2020 07-16 data security lokal-internet it up pancasila
 
2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantra2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantra
 
2020 06-30 cyber security kbk kkni aptikom-ign mantra
2020 06-30 cyber security kbk kkni aptikom-ign mantra2020 06-30 cyber security kbk kkni aptikom-ign mantra
2020 06-30 cyber security kbk kkni aptikom-ign mantra
 
2020 06-20 data security lokal-internet ngampooz
2020 06-20 data security lokal-internet ngampooz2020 06-20 data security lokal-internet ngampooz
2020 06-20 data security lokal-internet ngampooz
 
2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantra2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantra
 
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0 Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0
 
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019
Seminar Honeynet ACAD-CSIRT BSSN Cyber Security Tel-U Bandung Nov 2019
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 final
 
2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssn2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssn
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
 
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

ACAD-CSIRT: Computer Security Career Path