Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2 
Published in Annual Research Seminar (ARS), 2019
Citation: Bimantara, Abdi, and Tiara Annisa Dina. “Klasifikasi Web Berbahaya Menggunakan Metode Logistic Regression.” Annual Research Seminar (ARS). Vol. 4. No. 1. 2019.
Download here
Published in Sriwijaya University, 2021
Citation: BIMANTARA, ABDI, and Deris Stiawan. KLASIFIKASI BOTNET PADA JARINGAN INTERNET OF THINGS (IOT) MENGGUNAKAN AUTOENCODER DAN ARTIFICIAL NEURAL NETWORK (ANN). Diss. Sriwijaya University, 2021.
Download here
Published in KSII Transactions on Internet and Information Systems, 2023
Citation: Stiawan, Deris, Abdi Bimantara, Mohd Yazid Idris, and Rahmat Budiarto. “IoT botnet attack detection using deep autoencoder and artificial neural networks.” KSII Transactions on Internet & Information Systems 17, no. 5 (2023).
Download here
Published in Punggwawa Magazine Volume 4, 2025
Citation: Punggawa Magazine Volume 4
Download here
Published in Punggwawa Magazine Volume 6, 2025
Citation: Punggawa Magazine Volume 4
Download here
Published:
The source of this certification is the Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 National Institute of Standards and Technology (NIST) Cybersecurity Framework April 16, 2018.
Published:
This course by the International Cybersecurity Institute – Certified Network Security Specialist a.k.a ICSI CNSS provides a detailed overview of modern network security including operating system hardening, firewalls, intrusion-detection systems, VPNs, and Encryption. The course also includes topics such as physical security standards, system security, and security policies..
Published:
The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.
Published:
Stellar Cyber unifies currently disjointed security tools and data sources to fully visualize, correlate through AI, and automatically detect, investigate and respond to all attack activities.
Published:
eLearnSecurity Junior Penetration Tester (eJPT) is a 100% practical certification on penetration testing and information security essentials. Passing the exam and obtaining the certificate will prove your shills as a penetration tester.
Published:
A Certified Ethical Hacker (CEH) is a person trained to penetrate their own computer system or that of a client in order to determine what vulnerabilities exist and how to apply protective, corrective, and preventive countermeasures. This helps to mitigate risk and protect the system from being compromised by an unethical hacker or cybercriminal. The CEH is trained to look for weaknesses that can be exploited using the same tools a hacker would use to attack. Their job may include making recommendations for how to patch vulnerabilities or creating strategies to prevent malicious attacks.
Published:
The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.
Published:
The Certified SOC Analyst has an in-depth understanding of various attack methodologies, to collaborating with the IRTs in case of an incident. A certified member has adequate knowledge to bring people, process and technology together and provide a comprehensive skill set to manage a robust security operation centre with enhanced incident detection and response capabilities.
Published:
Certified Threat Hunting and Incident Response I (CTHRI-I) validates your ability to investigate real-world security incidents end-to-end. This practical exam focuses on hypothesis-driven hunting, log analysis, endpoint telemetry triage, network signal interpretation, MITRE ATT&CK mapping, and clear, actionable reporting. Candidates work through interactive, time-boxed scenarios that simulate enterprise conditions—pivoting across host and network data, correlating events, and documenting containment, eradication and recovery.
Published:
This exam demonstrates mastery across the core domains of cybersecurity, including Fundamentals & Network Security, Information Security Architecture, Identity and Access Management (IAM), Offensive Security, Cloud Security, Security Operations, Application Security, and Incident Response.
Published:
The eCIR is a fully practical exam, which immerses candidates in a realistic lab environment simulating a corporate breach. Examinees must investigate the incident and answer a series of scenario-based questions that mirror the type of findings and information typically included in a professional incident report.
Published:
This certification is well-structured and highly relevant to real-world SOC and blue team operations, covering core areas such as alert triage, SIEM and log analysis, MITRE ATT&CK mapping, threat hunting, incident response, digital forensics, phishing and malware analysis, as well as network and cloud security monitoring. Overall, CBTeamer provides strong practical coverage across detection, investigation, and response, making it a valuable certification for blue team and SOC practitioners. Thanks to The SecOps Group for designing an exam that reflects real-world defensive scenarios.
Published:
The eCIR exam is fully hands-on and focuses on realistic incident scenarios that require in-depth analysis and investigation. Through the exam process, I strengthened my skills in key areas, including:
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.