Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in Annual Research Seminar (ARS), 2019
Citation: Bimantara, Abdi, and Tiara Annisa Dina. “Klasifikasi Web Berbahaya Menggunakan Metode Logistic Regression.” Annual Research Seminar (ARS). Vol. 4. No. 1. 2019.
Download here
Published in Sriwijaya University, 2021
Citation: BIMANTARA, ABDI, and Deris Stiawan. KLASIFIKASI BOTNET PADA JARINGAN INTERNET OF THINGS (IOT) MENGGUNAKAN AUTOENCODER DAN ARTIFICIAL NEURAL NETWORK (ANN). Diss. Sriwijaya University, 2021.
Download here
Published in KSII Transactions on Internet and Information Systems, 2023
Citation: Stiawan, Deris, Abdi Bimantara, Mohd Yazid Idris, and Rahmat Budiarto. “IoT botnet attack detection using deep autoencoder and artificial neural networks.” KSII Transactions on Internet & Information Systems 17, no. 5 (2023).
Download here
Published:
The source of this certification is the Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 National Institute of Standards and Technology (NIST) Cybersecurity Framework April 16, 2018.
Published:
This course by the International Cybersecurity Institute – Certified Network Security Specialist a.k.a ICSI CNSS provides a detailed overview of modern network security including operating system hardening, firewalls, intrusion-detection systems, VPNs, and Encryption. The course also includes topics such as physical security standards, system security, and security policies..
Published:
The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.
Published:
Stellar Cyber unifies currently disjointed security tools and data sources to fully visualize, correlate through AI, and automatically detect, investigate and respond to all attack activities.
Published:
eLearnSecurity Junior Penetration Tester (eJPT) is a 100% practical certification on penetration testing and information security essentials. Passing the exam and obtaining the certificate will prove your shills as a penetration tester.
Published:
A Certified Ethical Hacker (CEH) is a person trained to penetrate their own computer system or that of a client in order to determine what vulnerabilities exist and how to apply protective, corrective, and preventive countermeasures. This helps to mitigate risk and protect the system from being compromised by an unethical hacker or cybercriminal. The CEH is trained to look for weaknesses that can be exploited using the same tools a hacker would use to attack. Their job may include making recommendations for how to patch vulnerabilities or creating strategies to prevent malicious attacks.
Published:
The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.
Published:
The Certified SOC Analyst has an in-depth understanding of various attack methodologies, to collaborating with the IRTs in case of an incident. A certified member has adequate knowledge to bring people, process and technology together and provide a comprehensive skill set to manage a robust security operation centre with enhanced incident detection and response capabilities.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.