🛡️🔒

Cybersecurity & Ethical Hacking

Belajar melindungi sistem dan etika hacker putih

Bab 1: Pengenalan Cybersecurity

Triad CIA (Confidentiality, Integrity, Availability). Threats landscape.

⚠️ Cybersecurity bukan hanya untuk IT expert, semua perlu tahu!

Bab 2: Network Security

Firewall, IDS/IPS, VPN, Wireshark packet analysis.

# nmap scan nmap -sV -O target_ip

Bab 3: Cryptography

Symmetric/Asymmetric encryption, AES, RSA, Hashing (SHA256), Digital signatures.

Bab 4: Web Security

SQL Injection, XSS, CSRF, OWASP Top 10, Burp Suite.

Bab 5: Ethical Hacking

Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks. Kali Linux tools.

Bab 6: Forensics & Incident Response

Digital forensics, chain of custody, malware analysis, IR phases.

Bab 7: Cloud Security

AWS/Azure security, IAM, container security, serverless security.

Bab 8: Capture The Flag (CTF)

Practical challenges: CTF walkthroughs, TryHackMe, HackTheBox.