Badge Test

IAII4 - HADOOP (Practice)

by IAII (Ikatan Ahli Informatika Indonesia)

Hadoop is an open-source software framework used for distributed storage and processing of big data sets using the MapReduce programming model. It consists of computer clusters built from commodity hardware. All the modules in Hadoop are designed with a fundamental assumption that hardware failures are common occurrences and should be automatically handled by the framework

Free

15 minutes

Basic

  • Meet Hadoop
  • MapReduce
  • The Hadoop Distributed Filesystem

PAST2 - Cyber Security Strategic Planning (Practice)

by PASTI (Perhimpunan Arsitek Sistem dan Teknologi Informasi)

• Complete Data Governance and Information Classification Plan • Risk Management Framework to materially reduce cybersecurity risk • Improve institutional user competence though Security Education,Training, and Awareness • Consolidate Security Operations for Networks and System Common Services • Cyber Threat Intelligence Analysis, Dissemination and Remediation • Optimize Services, Establish Security Metrics, Promote Compliance, Achieve Continuous Diagnostics and Mitigation.

Free

15 minutes

Basic

  • Cyber Security Strategic Planning

PAST1 - Cloud Computing & Cloud Technology (Practice)

by PASTI (Perhimpunan Arsitek Sistem dan Teknologi Informasi)

Cloud computing & Cloud Technology is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to configurable computing resources, which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users with various capabilities to store and process their data in either privately owned, or third-party data centers that may be located far from the user–ranging in distance from across a city to across the world. Cloud computing relies on sharing of resources to achieve coherence and economy of scale, similar to a utility over an electricity network

Free

15 minutes

Basic

  • Cloud Computing & Cloud Technology

AKSI9 - Incident and Emergency Response (Practice)

by AKSI (Asosiasi Keamanan Siber Indonesia)

Emergency response is action taken in response to an unexpected and dangerous occurence in an attempt to mitigate its impact on security information and technology. Emergency response may refer to services provided by emergency and rescue services agencies, as well as the plans made and actions taken within an organziation to respond to emergencies. Emergency response plans are an important component of workplace

Free

15 minutes

Basic

  • Incident and Emergency Response

AKSI14 - Vulnerability Analysis and Detection (Practice)

by AKSI (Asosiasi Keamanan Siber Indonesia)

Vulnerability analysis, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.

Free

15 minutes

Basic

  • Vulnerability Analysis and Detection

AKSI13 - Forensic Investigator (Practice)

by AKSI (Asosiasi Keamanan Siber Indonesia)

Forensics Investigator is a specially trained professional who works with law enforcement agencies, as well as private firms, to retrieve information from computers and other types of data storage devices. Equipment can often be damaged either externally or internally corrupted by hacking or viruses. Forensics Investigator is working to test the security of a information systems.

Free

15 minutes

Basic

  • Forensic Investigator

AKSI11 - Countermeasure and Cyber Deception (Practice)

by AKSI (Asosiasi Keamanan Siber Indonesia)

Track bad guys with callback Word documents Track web attackers Block attackers from successfully attacking servers Block web attackers from automatically discovering pages and input fields Understand the legal limits and restrictions of Active Defense Obfuscate DNS entries Create non-attributable Active Defense Servers Combine geolocation with existing Java applications Create online social media profiles for cyber deception.

Free

15 minutes

Basic

  • Countermeasure and Cyber Deception

AKSI10 - Computer and Digital Forensics (Practice)

by AKSI (Asosiasi Keamanan Siber Indonesia)

Develop critical thinking, analytical reasoning, and technical writing skills to effectively work in the field. This is accomplished through utilizing industry standard tools and techniques to investigate labs and cases based upon real-world investigations. Understand about various areas of cyber investigations, including digital evidence gathering, reporting, examinations, and court presentations. Understand to solve cases from start to finish with digital forensics.

Free

15 minutes

Basic

  • Computer and Digital Forensics

APJI5 - Intrusion Detection and Prevention (Practice)

by APJII (Asosiasi Penyelenggara Jasa Internet Indonesia)

Intrusion prevention complements an Intrusion detection configuration by proactively inspecting a system’s incoming traffic to weed out malicious requests. A typical Intrusion prevention configuration uses web application firewalls and traffic filtering solutions to secure applications. An Intrusion prevention prevents attacks by dropping malicious packets, blocking offending IPs and alerting security personnel to potential threats.

Free

15 minutes

Basic

  • Intrusion Detection and Prevention

APJI4 - Firewalls Management (Practice)

by APJII (Asosiasi Penyelenggara Jasa Internet Indonesia)

In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access.

Free

15 minutes

Basic

  • Firewalls Management

DOWNLOAD IC BRIDGE

Filter Category