• Topik dalam Tatakelola Keamanan Informasi (A)
    0%
  • Previous
  • Course data
    General
    Announcements
    Announcements
    Announcements
    MS-Teams untuk kelas Topik Keamanan S2
    RANCANGAN PEMBELAJARAN SEMESTER
    Pertemuan 1
    (PPT) The evolution of information security goals
    (PPT) A Business Model for Information Security Management
    A Business Model for Information Security Management
    (Video) COBIT 5: APO13 Manage Security
    1. (Video) Introduction To Cyber Security
    2. (Video) How to Get into Cybersecurity
    3. (Video) Cyber Security Full Course for Beginner
    4. (Video) What is Cyber Resilience?
    5. (Video) Cyber Resilience: Say What?
    6. (Video) Differentiating Between Cyber Security and Cyber Resilience
    Pertemuan ke-2
    (PPT) Data Breaches
    (PPT) Personal Data Breaches
    Databreach in 2019 and 2020
    Informasi terkait Data Breach
    ANU releases detailed account of data breach
    (Video) What Is Data Breach?
    (Video) The Dangers of a Data Breach
    (Video) Data Breach reporting webinar
    (video) Top Worst 13 Data Breaches and Biggest Hacks
    Pertemuan ke-2A
    NIST-intrusion-detection
    Intrusion Detection Systems with SNORT
    Pertemuan 03 s/d 05
    Tugas Resume #1
    Pertemuan ke- 06
    Zoom TdTKI_2024
    Quiz #1
    Business Continuity and Disaster Recovery
    Contoh SOP IT Disaster Recovery
    Template Dokumen
    [Video] What is a Business Continuity Plan?
    [Video] What is a Disaster Recovery Plan?
    [Video] Disaster recovery plan & Business continuity plan
    [Video] Disaster Recovery vs Backup
    [Video] IT Disaster Recovery Planning
    Data Center
    Tugas Resume #2
    Pertemuan ke-07
    Tugas Resume #3
    Quiz #2
    [Video] How to Make a Disaster Recovery Plan?
    [Video] How to write an IT Disaster Recovery Plan?
    [Video] Best Practice in Disaster Recovery Plan
    [Video] Risk Mitigation Strategies in DRP
    [Video] Disaster Recovery on AWS
    Contoh SOP IT Disaster Recovery
    ISO-22317-2015-Business-Impact-Analysis
    Pertemuan ke-8
    UTS #1
    Tugas UTS #2
    UTS #3
    Pertemuan ke-9
    (PPT) COBIT 5 for Information Security
    (PPT) COBIT 5 For Cyber Security Governance and Management
    (Buku) COBIT 5 for Information Security
    COBIT 5 for Information Security
    Panduan Tahapan Penyusunan Dokumen
    mapping COBIT to PCI DSS
    Evaluating Business Service Continuity and Availability Using COBIT 2019
    Pertemuan ke-10
    Pertemuan ke-11
    Pertemuan ke-12
    Pertemuan ke-05
    51. The Security Risk Management Guide, Microsoft Solutions for Security and Compliance
    59. (NIST 800-30) Risk management guide for information technology systems
    63. (NIST FIPS PUB 199) Standards for Security Categorization of Federal Information and Information Systems
    (NIST 800-37r2) Risk Management Framework for Information Systems and Organizations
    (NIST 800-53r5) Security and Privacy Controls for Information Systems and Organizations
    (NIST 800-53Ar5) Assessing Security and Privacy Controls in Information Systems and Organizations
    NIST SP.800-53Ar5_assessment_procedure (xls)
    (NIST 800-39) Managing Information Security Risk
    ISO/IEC 31000, Risk management – Principles and guidelines
    SNI IEC/ISO 31000:2011 Manajemen risiko — Prinsip dan pedoman
    ISO/IEC 31010 (2009), Risk management – Risk assessment techniques
    SNI IEC/ISO 31010:2016 - Manajemen Resiko, Teknik Penilaian Resiko (ISO 31010 tahun 2009)
    ISO/IEC 31010 (2019), Risk management – Risk assessment techniques
    ISO/IEC 31010 (2019), Risk management – Risk assessment techniques
    ISO/IEC 27005, Information technology – Security techniques – Information security risk management systems
    PPT ISO 31010
    (PPT) ISO 31010
    Buku Manajemen Risiko dari BSSN
    (Book) MAGERIT v3 - Methodology for Information Systems Risk Analysis and Management
    IISO/IEC 17799 Information technology - Security techniques - Code of practice for information security management
    Pertemuan ke-15
    Pertemuan ke-16
    Laporan Akhir Proposal Penelitian di Bidang Keamanan Informasi
    Tugas Paper Standar ISO (Tata kelola/ Manajemen Risiko/ Audit Keamanan Informasi)
    Tugas Disaster Recovery Plan
    Pertemuan ke-06
    System Implementation and Operations
    Protecting Information Assets
    Pertemuan ke-04
  • Next
  • Panduan Dosen
    Unduh PDF [Video] Panduan Membuat Video Asinkronus dengan Power Point
  • Panduan Mahasiswa
    Unduh PDF
    • Log in
      Forgot Password?
      Don't have an account?
    Topik dalam Tatakelola Keamanan Informasi (A)
    Home
    Skip to main content

    Course info

    1. Home
    2. Courses
    3. Institut Teknologi Sepuluh Nopember
    4. Magister
    5. Fakultas Teknologi Elektro dan Informatika Cerdas
    6. S-2 SISTEM INFORMASI
    7. Semester Genap 2023/2024
    8. Topik dalam Tatakelola Keamanan Informasi (A)
    9. Summary

    Topik dalam Tatakelola Keamanan Informasi (A)

    • Teacher: Bambang Setiawan

    logo

    Sukolilo | Manyar | Tjokroaminoto
    Kampus Institut Teknologi
    Sepuluh Nopember Surabaya
    Phone: 031-5994251-54, 5947274, 5945472
    Fax: 031-5923465, 5947845

    Follow Us

    • Panduan Dosen
      • Unduh PDF
      • [Video] Panduan Membuat Video Asinkronus dengan Power Point
    • Panduan Mahasiswa
      • Unduh PDF
    You are not logged in. (Log in)
    Get the mobile app