Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Security jaringan komputer berbasis CEH
Bookmark Share

Text

Security jaringan komputer berbasis CEH

Rifkie Primartha - Personal Name;

Daftar Isi

Bab 1. Pendahuluan security
Maksud dan tujuan
1.1. Apakah security?
1.2. Makhluk apakah CEH?
1.3. Apakah komputer security itu?
1.4. Computer vs information security
1.5. Network security

Bab 2. Serba-serbi CEH
Maksud dan tujuan
2.1. Jaringan komputer
2.2. Training CEH
2.3. Apa yang dibutuhkan?
2.4. Materi CEH
2.5. Soal ujian CEH

Bab 3. Pendahuluan ethical hacking
Maksud dan tujuan
3.1. Terminologi
3.2. Attack
3.3. Fase hacking
3.4. Menyiapkan senjata
3.5. Praktikum

Bab 4. Jangan melupakan konsep jaringan komputer
Maksud dan tujuan
4.1. Pendahuluan
4.2. Jeni jaringan komputer
4.3. Topologi jaringan komputer
4.4. Metode akses
4.5. Protokol TCP/IP
4.6. IP address
4.7. Domain dan port
4.8. OSI layer
4.9. Praktikum

Bab 5. Footprinting dan reconnaissance
Maksud dan tujuan
5.1. Prosedur
5.2. Metodologi
5.3. Praktikum
5.4. Pencegahan dan manfaat
5.5. Prosedur dan flow chart

Bab 6. Scanning network
Maksud dan tujuan
6.1. Jenis dan teknik scanning
6.2. Metodologi
6.3. IDLE scan
6.4. Membuat peta network
6.5. Praktikum
6.6. Pencegahan dan manfaat
6.7. Prosedur dan flow chart

Bab 7. Enumeration
Maksud dan tujuan
7.1. Jenis dan teknik enumeration
7.2. Metodologi
7.3. Praktikum
7.4. Pencegahan dan manfaat
7.5. Prosedur dan flow chart

Bab 8. System hacking
Maksud dan tujuan
8.1. Jenis dan teknil system hacking
8.2. Etika system hacking
8.3. WiFi hacking
8.4. Persiapan wifi hacking
8.5. WEP wifi hacking
8.6. WPA/WPA2 wifi hacking
8.7. Penutup

Bab 9. Cryptography
Maksud dan tujuan
9.1. Jenis dan teknik encryption
9.2. Praktikum

Bab 10. Contoh konfigurasi firewall berbasis Linux
10.1. Pendahuluan
10.2. Jenis firewall
10.3. Firewall berbasis Linux
10.4. Praktikum
10.5. Firewall builder

Bab 11. Contoh soal ujian CEH
11.1. Penutup
11.2. Soal ujian


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.84 RIF s
b0001014
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 005.84 RIF s/2
b0001184
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 005.84 RIF s/3
b0002008
Currently On Loan (Due on 2025-06-27)
#
Perpustakaan Poltek SSN (Rak 000) 005.84 RIF s/4
b0003084
Available
Detail Information
Series Title
--
Call Number
005.84 RIF s
Publisher
Bandung : Informatika., 2018
Collation
viii, 286 hal.; ilus.; 24 cm + 1 CD
Language
Indonesia
ISBN/ISSN
9786026232571
Classification
005.84
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Computer Hackers
Computer Hacker-Examinations
Computer Security-Examinations
Komputer-Pengamanan
Specific Detail Info
--
Statement of Responsibility
Rifkie Primartha
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?