1. 1. Kenalan
  2. 2. Mata Kuliah
    1. 2.1. Informatika
      1. 2.1.1. PBO
        1. 2.1.1.1. Java Generics
        2. 2.1.1.2. String Operation
        3. 2.1.1.3. Regex
        4. 2.1.1.4. Exception & Assertion
        5. 2.1.1.5. I/O
      2. 2.1.2. Basdat
      3. 2.1.3. Jarkom
    2. 2.2. Kimia
    3. 2.3. Teknik Elektro
  3. 3. Cyber Security
    1. 3.1. Konsep TCP/IP
    2. 3.2. IPv6
    3. 3.3. Routing
    4. 3.4. Kernel
    5. 3.5. Network Programming
    6. 3.6. Persiapan Hacking
    7. 3.7. Footprinting
    8. 3.8. Information Gathering
    9. 3.9. Sniffing
    10. 3.10. Spoffing
    11. 3.11. Hacking Wireless
    12. 3.12. Attack password
    13. 3.13. Attack database SQL
    14. 3.14. MITM
    15. 3.15. Metasploit
    16. 3.16. Deface WEB
      1. 3.16.1. Defacing Routing
    17. 3.17. Attack File Sharing
    18. 3.18. Vulnerability Analysis
    19. 3.19. DVWA
      1. 3.19.1. Brute Force
      2. 3.19.2. Command Injection
      3. 3.19.3. SQL Injection
      4. 3.19.4. Upload Vuln
      5. 3.19.5. XSS
      6. 3.19.6. XSRF
    20. 3.20. Dasar Pengamanan Server
    21. 3.21. Proxy
    22. 3.22. SSH
      1. 3.22.1. Configure SSH
      2. 3.22.2. SSH Key
      3. 3.22.3. SSH Port Forwarding
      4. 3.22.4. SSH Port
      5. 3.22.5. SSH Remote
      6. 3.22.6. SSH Reverse
    23. 3.23. VPN
    24. 3.24. Proxy VS VPN
    25. 3.25. Web Application Firewall
    26. 3.26. Pertahanan Host
    27. 3.27. Basic Data Security
    28. 3.28. Forensic
    29. 3.29. Stay Anonymous
    30. 3.30. Deep Web
    31. 3.31. Torrent
    32. 3.32. Cisco Cybersecurity
      1. 3.32.1. Categorizing Security Vulnerabilities
      2. 3.32.2. Types of Malware
      3. 3.32.3. Symptoms of Malware
      4. 3.32.4. Social Engineering
      5. 3.32.5. Wi-Fi Password Cracking
      6. 3.32.6. Phishing
      7. 3.32.7. Vulnerability Exploitation
      8. 3.32.8. Dos
      9. 3.32.9. DDoS
      10. 3.32.10. SEO Poisoning
      11. 3.32.11. Blended Attack
      12. 3.32.12. Attacks, Concepts and Techniques
      13. 3.32.13. Impact Reduction
      14. 3.32.14. Protect Your Computing Devices
      15. 3.32.15. Encrypt Your Data
      16. 3.32.16. Two Factor Authentication
      17. 3.32.17. OAuth 2.0
      18. 3.32.18. Email and Web Browser Privacy
      19. 3.32.19. Firewall Types
      20. 3.32.20. Port Scanning
      21. 3.32.21. Security Appliances
      22. 3.32.22. Detecting Attacks in Real Time
      23. 3.32.23. Protecting Against Malware
      24. 3.32.24. Security Best Practices
      25. 3.32.25. Botnet
      26. 3.32.26. The Kill Chain in Cyberdefense
      27. 3.32.27. Behavior-Based Security
      28. 3.32.28. NetFlow
      29. 3.32.29. Security Playbook
      30. 3.32.30. Tools for Incident Prevention and Detection
      31. 3.32.31. IDS and IPS
      32. 3.32.32. CSIRT
      33. 3.32.33. Legal Issues in Cybersecurity
      34. 3.32.34. Ethical Issues in Cybersecurity
      35. 3.32.35. Cybersecurity Jobs
    33. 3.33. MOOC Aptikom
      1. 3.33.1. Security Perimeter Protection
      2. 3.33.2. Network and Internet Defense
      3. 3.33.3. Firewall
      4. 3.33.4. Security Concerns & Penetration
      5. 3.33.5. Penetration Testing Methodology
      6. 3.33.6. Real Time Web Monitoring
      7. 3.33.7. Web Attack Visualisation
      8. 3.33.8. Cyber-Threat Real Time Map
      9. 3.33.9. Cyber-Threat Real Time Statistics
      10. 3.33.10. Fireeye Cyber Threat Map
      11. 3.33.11. Ddos Digital Attack Map
      12. 3.33.12. Ddos Attack Worldwide
      13. 3.33.13. Malware And Security Scan
      14. 3.33.14. The Dark Net
  4. 4. Jaringan Komputer
    1. 4.1. Pendahuluan
    2. 4.2. Wireshark
    3. 4.3. Simulator Jaringan
    4. 4.4. Perangkat Keras Jaringan & Data Link Layer
      1. 4.4.1. Data Link Layer
      2. 4.4.2. Lebih Detail Data Link Layer
      3. 4.4.3. Ethernet
      4. 4.4.4. Wireless Internet
      5. 4.4.5. MAC Address
      6. 4.4.6. Teknologi ADSL
      7. 4.4.7. Wireless Internet Wifi
      8. 4.4.8. Teknik Modulasi
    5. 4.5. Perangkat WiFi / Wireless Internet
    6. 4.6. Switch & Hub
    7. 4.7. Network Layer IPv4
      1. 4.7.1. Network Layer
      2. 4.7.2. IPv4
    8. 4.8. Transport Layer
    9. 4.9. Domain Name System & Pengaturan Internet
    10. 4.10. Install DNS Server
    11. 4.11. Routing & NAT
    12. 4.12. Mikrotik
      1. 4.12.1. Basic Networking
      2. 4.12.2. VPN
        1. 4.12.2.1. VPN-PPTP
        2. 4.12.2.2. VPN-SSTP
        3. 4.12.2.3. VPN-L2TP
        4. 4.12.2.4. VPN-OpenVPN
    13. 4.13. Cisco
      1. 4.13.1. Cisco Packet Tracer
        1. 4.13.1.1. Basic Quiz
        2. 4.13.1.2. IoT Basic Quiz
    14. 4.14. Web / Content Management System
    15. 4.15. e-mail / SMTP / POP3 / IMAP / Webmail
    16. 4.16. VoIP / Internet Telepon
    17. 4.17. Streaming Multimedia
    18. 4.18. IPv6
    19. 4.19. Hacking
    20. 4.20. Cyber Security
    21. 4.21. BasicData Security
    22. 4.22. Pemrograman Jaringan & IoT
    23. 4.23. Network Management & Benchmarking
  5. 5. Kriptografi
    1. 5.1. GCD & EGCD
    2. 5.2. Chinese Remainder Theorem
    3. 5.3. Modular Mulitplicative Inverse
    4. 5.4. Block Cipher
      1. 5.4.1. ECB
      2. 5.4.2. CBC
      3. 5.4.3. CFB
      4. 5.4.4. OFB
      5. 5.4.5. Counter Mode
    5. 5.5. Confusion & Diffusion Shannon
    6. 5.6. Iterated Cipher
    7. 5.7. Feistel Network
    8. 5.8. S-Box
    9. 5.9. DES
    10. 5.10. RSA
    11. 5.11. Common Modulus Attack - RSA
    12. 5.12. ECC
    13. 5.13. NTRU
    14. 5.14. Digital Signature
    15. 5.15. Digital Signature Standard
    16. 5.16. MAC
    17. 5.17. Digital Certificate
    18. 5.18. Protokol Kriptografi
    19. 5.19. SSL
  6. 6. Artificial Intelligence
    1. 6.1. Convolutional Neural Network
    2. 6.2. Gabor Filter
    3. 6.3. Hidden Markov Model
    4. 6.4. Principal Component Analysis
  7. 7. Robotics
    1. 7.1. Arduino
      1. 7.1.1. Arduino Board
      2. 7.1.2. Arduino Data Types
      3. 7.1.3. Arduino Coding
      4. 7.1.4. Arduino Function Lbraries
    2. 7.2. Android Studio
  8. 8. Capture The Flag
    1. 8.1. Overthewire
      1. 8.1.1. Bandit
      2. 8.1.2. Natas
    2. 8.2. Binary Exploitation
      1. 8.2.1. Pwn & Shellcode
      2. 8.2.2. Coba
      3. 8.2.3. Protostar
    3. 8.3. Exploit Education
      1. 8.3.1. Protostar
        1. 8.3.1.1. Stack0
        2. 8.3.1.2. Stack1
        3. 8.3.1.3. Stack2
        4. 8.3.1.4. Stack3
        5. 8.3.1.5. Stack4
        6. 8.3.1.6. Stack5
        7. 8.3.1.7. Stack6
      2. 8.3.2. Phoenix
        1. 8.3.2.1. Stack0
    4. 8.4. Hackthebox
      1. 8.4.1. Meow
      2. 8.4.2. Fawn
      3. 8.4.3. Dancing
      4. 8.4.4. Explosion
      5. 8.4.5. Preignition
      6. 8.4.6. Appointment
      7. 8.4.7. Sequel
      8. 8.4.8. Crocodile
      9. 8.4.9. Archetype
      10. 8.4.10. Oopsie
      11. 8.4.11. Vaccine
      12. 8.4.12. Unified
    5. 8.5. Cryptography
    6. 8.6. Reverse Engineering
    7. 8.7. Web
    8. 8.8. Forensic
    9. 8.9. Miscellaneous
    10. 8.10. Assembly
      1. 8.10.1. Basic Syntax
      2. 8.10.2. Registers
      3. 8.10.3. System Calls
    11. 8.11. John-Hammond
    12. 8.12. Contoh cracking CTF licence key
    13. 8.13. Writeup
      1. 8.13.1. COMPFEST CTF 2021
        1. 8.13.1.1. Snab? Yes, Snab
    14. 8.14. Random
  9. 9. Kali Linux Tools
    1. 9.1. sqlmap
  10. 10. Tools
    1. 10.1. Nmap
    2. 10.2. Python
      1. 10.2.1. Pwn
      2. 10.2.2. Random
      3. 10.2.3. Zlib
      4. 10.2.4. Request
        1. 10.2.4.1. GET
        2. 10.2.4.2. POST
      5. 10.2.5. linkedlist
    3. 10.3. C
      1. 10.3.1. fflush()
      2. 10.3.2. memset()
    4. 10.4. Curl
    5. 10.5. Tcpdump
    6. 10.6. GDB
    7. 10.7. Radare2
    8. 10.8. Cutter
    9. 10.9. fcrackzip
    10. 10.10. ngrok
    11. 10.11. Netcat
    12. 10.12. Shell Script
      1. 10.12.1. Special Character
      2. 10.12.2. Operators
      3. 10.12.3. Array
      4. 10.12.4. Decision
      5. 10.12.5. Loop
    13. 10.13. OpenSSL
    14. 10.14. Archive File
    15. 10.15. Hydra
    16. 10.16. IronBee
    17. 10.17. ModSecurity
    18. 10.18. Commix
    19. 10.19. Burp Suite
    20. 10.20. OWASP
    21. 10.21. Maltego
    22. 10.22. GNS3
    23. 10.23. Ghidra
    24. 10.24. Ida
  11. 11. TIPS
    1. 11.1. Guide This Web
    2. 11.2. Mdbook
    3. 11.3. Github
    4. 11.4. Install / Remove .deb in ubuntu
    5. 11.5. Install sql server ubuntu 20.04
    6. 11.6. Setting IP Static
    7. 11.7. HTTPS in Local Network (Ubuntu Server 20.04)
    8. 11.8. IT Career Roadmap
    9. 11.9. Wlan Monitor Mode
    10. 11.10. Virtualbox
    11. 11.11. Path variable terminal
    12. 11.12. Linux Users & Groups
    13. 11.13. Replikasi Onnocenter
    14. 11.14. Install Moodle
    15. 11.15. Install ROS
      1. 11.15.1. ROS Melodic
      2. 11.15.2. ROS Noetic
      3. 11.15.3. Install ROS & Opencv
    16. 11.16. Hapus Dual Boot
    17. 11.17. Membuat File ISO
    18. 11.18. Docker
    19. 11.19. Random
  12. 12. Pembahasan Ujian
    1. 12.1. Cisco Packet Tracer
      1. 12.1.1. Quiz 1
      2. 12.1.2. Quiz 2
    2. 12.2. Cisco Introduction to CyberSec
      1. 12.2.1. Chapter 1 Quiz
      2. 12.2.2. Chapter 2 Quiz
    3. 12.3. Onnocenter/moodle
      1. 12.3.1. Jaringan Komputer
        1. 12.3.1.1. TCP/IP
        2. 12.3.1.2. DNS

Wetofu

Protostar