Proctored Exam

APTI5 - People Cyber Literacy and Maturity

by APTIKOM (Asosiasi Pendidikan Tinggi Indonesia)

Cyber Literacy builds upon fundamental cyber skills developed in Cyber Literacy and challenges to go deeper into the world of cyberspace.
Understand will utilize a microcontroller to construct complex systems that bring together a variety of components on each build and also will realize the significant real world connections as they discuss the liberal arts/humanities crossovers that exist with today’s technologies.

APJI4 - Firewalls Management

by APJII (Asosiasi Penyelenggara Jasa Internet Indonesia)

In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access.

AKSI9 - Incident and Emergency Response

by AKSI (Asosiasi Keamanan Siber Indonesia)

Emergency response is action taken in response to an unexpected and dangerous occurence in an attempt to mitigate its impact on security information and technology.
Emergency response may refer to services provided by emergency and rescue services agencies, as well as the plans made and actions taken within an organziation to respond to emergencies. Emergency response plans are an important component of workplace

AKSI10 - Computer and Digital Forensics

by AKSI (Asosiasi Keamanan Siber Indonesia)

Develop critical thinking, analytical reasoning, and technical writing skills to effectively work in the field. This is accomplished through utilizing industry standard tools and techniques to investigate labs and cases based upon real-world investigations.
Understand about various areas of cyber investigations, including digital evidence gathering, reporting, examinations, and court presentations.
Understand to solve cases from start to finish with digital forensics.

AKSI11 - Countermeasure and Cyber Deception

by AKSI (Asosiasi Keamanan Siber Indonesia)

Track bad guys with callback Word documents
Track web attackers
Block attackers from successfully attacking servers
Block web attackers from automatically discovering pages and input fields
Understand the legal limits and restrictions of Active Defense
Obfuscate DNS entries
Create non-attributable Active Defense Servers
Combine geolocation with existing Java applications
Create online social media profiles for cyber deception.

IPKI4 - Security Operation and Monitoring

by IPKIN (Ikatan Profesi Komputer dan Informatika Indonesia)

Security Operation Center manages incidents, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated and reported. Security Operation Center monitors applications to identify a possible cyber-attack or intrusion (event) and determines if it is a real, malicious threat (incident), and if it could have a business impact.

APJI5 - Intrusion Detection and Prevention

by APJII (Asosiasi Penyelenggara Jasa Internet Indonesia)

Intrusion prevention complements an Intrusion detection configuration by proactively inspecting a system’s incoming traffic to weed out malicious requests. A typical Intrusion prevention configuration uses web application firewalls and traffic filtering solutions to secure applications.
An Intrusion prevention prevents attacks by dropping malicious packets, blocking offending IPs and alerting security personnel to potential threats.

ADPI1 - Adobe InDesign

by ADPII (Aliansi Desainer Produk Industri Indonesia)

Changing the world is possible, but it requires the right preparation and skills. One of the best ways to be prepared is with Adobe Certified Associate (ACA) certification. ACA certification is an industry-recognized credential that can be used to effectively validate one’s skills in Adobe digital-media software. It represents the creative skills in demand today by industry and academia and reflects well when presented on a resumé or college application.

PRES2 - Digital Marketing

by PRESTASI Perbanas

Integrate new tactics and strategies with traditional marketing tools and practices aimed at acquiring new customers, building customer loyalty, providing superior customer service, developing new products, improving profitability and conducting market research. Study the value of and methods for determining the return on investment for digital marketing programs, as well as online visitor and buyer behavior.
Build effective online marketing strategies for customer acquisition, conversion and retention.

IAII6 - Platform Operating System Security

by IAII (Ikatan Ahli Informatika Indonesia)

Platform Operating System Security a fundamental component of ICT that enables many different applications to be used in a variety of computing hardware. While, the original operating systems for large centralised computing focused their security efforts primarily on separating users, operating systems security has had to adapt to cater for a wider range of technology, such as desktop computers, smartphones and cloud platforms, and the different threats that have evolved as a consequence.

DOWNLOAD IC BRIDGE