Topik dalam Tatakelola Keamanan Informasi (A)
0%
Previous
Course data
General
Announcements
Announcements
Announcements
Announcements
MS-Teams untuk kelas Topik Keamanan S2
RANCANGAN PEMBELAJARAN SEMESTER
Pertemuan 1
(PPT) The evolution of information security goals
(PPT) A Business Model for Information Security Management
A Business Model for Information Security Management
(Video) COBIT 5: APO13 Manage Security
1. (Video) Introduction To Cyber Security
2. (Video) How to Get into Cybersecurity
3. (Video) Cyber Security Full Course for Beginner
4. (Video) What is Cyber Resilience?
5. (Video) Cyber Resilience: Say What?
6. (Video) Differentiating Between Cyber Security and Cyber Resilience
Pertemuan ke-1B
(PPT) Data Breaches
(PPT) Personal Data Breaches
Databreach in 2019 and 2020
Informasi terkait Data Breach
ANU releases detailed account of data breach
(Video) What Is Data Breach?
(Video) The Dangers of a Data Breach
(Video) Data Breach reporting webinar
(video) Top Worst 13 Data Breaches and Biggest Hacks
Pertemuan ke-2
Pertemuan 03 s/d 05
Tugas Resume #1
Tugas Resume #2
Pertemuan ke- 06
Business Continuity and Disaster Recovery
Contoh SOP IT Disaster Recovery
Template Dokumen
[Video] What is a Business Continuity Plan?
[Video] What is a Disaster Recovery Plan?
[Video] Disaster recovery plan & Business continuity plan
[Video] Disaster Recovery vs Backup
[Video] IT Disaster Recovery Planning
Data Center
Pertemuan ke-07
Business Continuity and Disaster Recovery (copy)
Template SOP - IT Security Disaster Recovery
Template Dokumen BCP BIA DRP
Dokumen Standar ISO
ISO-22317-2015-Business-Impact-Analysis
[Video] How to Make a Disaster Recovery Plan?
[Video] How to write an IT Disaster Recovery Plan?
[Video] Best Practice in Disaster Recovery Plan
[Video] Risk Mitigation Strategies in DRP
[Video] Disaster Recovery on AWS
Pertemuan ke-8
Tugas UTS #1
UTS #2
UTS #3
Pertemuan ke-9
(PPT) COBIT 5 for Information Security
(PPT) COBIT 5 For Cyber Security Governance and Management
(Buku) COBIT 5 for Information Security
COBIT 5 for Information Security
Panduan Tahapan Penyusunan Dokumen
mapping COBIT to PCI DSS
Evaluating Business Service Continuity and Availability Using COBIT 2019
Pertemuan ke-10
Pertemuan ke-12
Pertemuan ke-05
51. The Security Risk Management Guide, Microsoft Solutions for Security and Compliance
59. (NIST 800-30) Risk management guide for information technology systems
63. (NIST FIPS PUB 199) Standards for Security Categorization of Federal Information and Information Systems
(NIST 800-37r2) Risk Management Framework for Information Systems and Organizations
(NIST 800-53r5) Security and Privacy Controls for Information Systems and Organizations
(NIST 800-53Ar5) Assessing Security and Privacy Controls in Information Systems and Organizations
NIST SP.800-53Ar5_assessment_procedure (xls)
(NIST 800-39) Managing Information Security Risk
ISO/IEC 31000, Risk management – Principles and guidelines
SNI IEC/ISO 31000:2011 Manajemen risiko — Prinsip dan pedoman
ISO/IEC 31010 (2009), Risk management – Risk assessment techniques
SNI IEC/ISO 31010:2016 - Manajemen Resiko, Teknik Penilaian Resiko (ISO 31010 tahun 2009)
ISO/IEC 31010 (2019), Risk management – Risk assessment techniques
ISO/IEC 31010 (2019), Risk management – Risk assessment techniques
ISO/IEC 27005, Information technology – Security techniques – Information security risk management systems
PPT ISO 31010
(PPT) ISO 31010
Buku Manajemen Risiko dari BSSN
(Book) MAGERIT v3 - Methodology for Information Systems Risk Analysis and Management
IISO/IEC 17799 Information technology - Security techniques - Code of practice for information security management
Pertemuan ke-15
Pertemuan ke-16
Laporan Akhir Tugas Kelompok
Tugas Individu UAS
Pertemuan ke-06
Pertemuan ke-04
Pertemuan ke-2A
NIST-intrusion-detection
Intrusion Detection Systems with SNORT
Next
Side panel
Panduan Dosen
Unduh PDF
[Video] Panduan Membuat Video Asinkronus dengan Power Point
Panduan Mahasiswa
Unduh PDF
Log in
Username
Password
Remember username
Forgot Password?
Log in
Log in using your account on
Don't have an account?
Topik dalam Tatakelola Keamanan Informasi (A)
Home
Skip to main content
Course info
Home
Courses
Institut Teknologi Sepuluh Nopember
Magister
Fakultas Teknologi Elektro dan Informatika Cerdas
S-2 SISTEM INFORMASI
Semester Gasal 2024/2025
Topik dalam Tatakelola Keamanan Informasi (A)
Summary
Topik dalam Tatakelola Keamanan Informasi (A)
Teacher:
Bambang Setiawan