Peta Jalan Pembelajaran Keamanan Siber
Cybersecurity Domains
Security Architecture
Cryptography
Secure System Build
Secure Application Development
Network Design
Data Protection
Cloud Security
Access Control
Security Engineering
Risk Assessment
Source Code Scan
Vulnerability Scan
Asset Inventory
Third-Party Risk
Data-Centric Risk
Data Flow Map
Penetration Test
Defense Team: Blue Team
Offense Team: Red Team
Physical Security
Security Operations
Vulnerability Management
Protection
Data Leakage Prevention
Detection
Prevention
Recovery
Disaster Recovery (DR) and Business Continuity Planning (BCP)
SIEM
SOC
Incident Response
Active Defense
Threat Intelligence
External
Contextual Intelligence
Internal
Intelligence Sharing
Indicators of Compromise (IOCs)
Governance
Executive Management Involvement
Policies, Procedures, Standards, Guidelines
Laws & Regulations
Industry-Specific
Federal
State-Level
Risk-Informed Decisions
Reports & KPIs
Audit
Executive Management Participation
Risk-Informed Reporting
Written Supervisory Procedures (WSP)
Standards and Compliance
Career Development
Conferences
Certifications
Training
Peer Groups
Self-Study
Frameworks and Standards
NIST
ISO/IEC
COBIT
SANS/CSC
User Education
Training (New Skills)
Awareness and Reinforcement