KEAMANAN SISTEM IT-45-03 [UIR]
0%
Previous
Course data
General
Keaman Siistem
RPS Keamanan Sistem
Petemuan 1 - Perspectives and impact
[Slide] Perspectives and impact
[Video] CIA Triad
Petemuan 2 - Cyber attack and detections
[Slide] Cyber attack and detections
Pembentukan Grup
[Video] IDS Concepts
Upload Tugas Diskusi
Petemuan 3 - Vulnerability threat and risk
[Slide] Vulnerability threat and risk
Tugas Diskusi VTR
[Video] Vulnerability threat and risk
Pertemuan 4 - Anonymity systems
[Slide] Anonymity systems
Tugas 1 - Preparation
Pertemuan 5 - Usable security
[Slide] Usable security
[Video] Usable security - Mental Models
Pertemuan 6 - Cryptography overview
[Slide] Cryptography overview
[Video] Public Key Infrastructure
[Video] Cryptography to prove identity
[Video] The key distribution problem
[Video] Applied Cryptography: Hash Functions
Pertemuan 7 - Malware fundamentals
[Slide] Malware fundamentals
Pertemuan 8 - Minggu UTS
ASESMEN CLO-1
CLO 1
CLO 2
Petemuan 9 - Security services , mechanisms, and countermeasures
[Slide] Security services , mechanisms, and countermeasures
Pertemuan 10 - High assurance systems
[Slide] High assurance systems
DVWA Capture
Pertemuan 11 - Mitigation and recovery
[Slide] Mitigation and recovery
Pertemuan 12 - Personal information
[Slide] Personal information
Pertemuan 13 - Policy goals and mechanisms
[Slide] Policy goals and mechanisms
SQL Injection Test
Pertemuan 14 - Operational issues
[Slide] Operational issues
Pertemuan 15 - Reporting requirements
Next
Side panel
Blog
Recent Blog
Create Blog
How To Blog
English (en)
Bahasa Indonesia (id)
English (en)
Log in
CTJ3E3-IT-45-03
Home
Skip to main content
Course info
Home
Courses
FAKULTAS INFORMATIKA (FIF)
PRODI S1 TEKNOLOGI INFORMASI (FIF)
2324/2
CTJ3E3-IT-45-03
Summary
KEAMANAN SISTEM IT-45-03 [UIR]
Teacher:
MUHAMAD IRSAN