Widget HTML Atas


Peta Jalan Pembelajaran Keamanan Siber

Cybersecurity Domains

Security Architecture
Cryptography
Secure System Build
Secure Application Development
Network Design
Data Protection
Cloud Security
Access Control
Security Engineering

Risk Assessment
Source Code Scan
Vulnerability Scan
Asset Inventory
Third-Party Risk
Data-Centric Risk
Data Flow Map
Penetration Test
Defense Team: Blue Team
Offense Team: Red Team

Physical Security

Security Operations
Vulnerability Management
Protection
Data Leakage Prevention
Detection
Prevention
Recovery
Disaster Recovery (DR) and Business Continuity Planning (BCP)
SIEM
SOC
Incident Response
Active Defense

Threat Intelligence
External
Contextual Intelligence
Internal
Intelligence Sharing
Indicators of Compromise (IOCs)

Governance
Executive Management Involvement
Policies, Procedures, Standards, Guidelines
Laws & Regulations
Industry-Specific
Federal
State-Level
Risk-Informed Decisions
Reports & KPIs

Audit
Executive Management Participation
Risk-Informed Reporting
Written Supervisory Procedures (WSP)
Standards and Compliance

Career Development
Conferences
Certifications
Training
Peer Groups
Self-Study

Frameworks and Standards
NIST
ISO/IEC
COBIT
SANS/CSC

User Education
Training (New Skills)
Awareness and Reinforcement