{"id":300,"date":"2026-02-03T02:56:14","date_gmt":"2026-02-03T02:56:14","guid":{"rendered":"https:\/\/binus.ac.id\/humanitarian-ai\/?p=300"},"modified":"2026-02-17T02:05:59","modified_gmt":"2026-02-17T02:05:59","slug":"cyber-security-for-it-leaders-and-officers","status":"publish","type":"post","link":"https:\/\/binus.ac.id\/humanitarian-ai\/blog\/2026\/02\/03\/cyber-security-for-it-leaders-and-officers\/","title":{"rendered":"Cyber Security for IT Leaders and Professional"},"content":{"rendered":"<h1 style=\"text-align: center\" data-start=\"326\" data-end=\"342\"><span style=\"font-size: 18pt\">Training Syllabus<\/span><\/h1>\n<h4 data-start=\"1783\" data-end=\"1799\">\ud83d\udd58 Duration: <strong>3\u00a0full days<\/strong> (08:00 AM \u2013 05:00 PM GMT+7)<\/h4>\n<h4 data-start=\"1845\" data-end=\"1873\">\ud83d\udc65 Minimum Participants: <strong data-start=\"1874\" data-end=\"1886\">5 people<\/strong><\/h4>\n<h4 data-start=\"1888\" data-end=\"1899\">\ud83d\udcbc Fee: <strong data-start=\"1900\" data-end=\"1932\">Based on agreement and venue<\/strong><\/h4>\n<hr class=\"\" data-start=\"1934\" data-end=\"1937\" \/>\n<h3 class=\"\" data-start=\"1939\" data-end=\"1967\">\ud83d\udccb <strong data-start=\"1946\" data-end=\"1967\">Training Overview<\/strong><\/h3>\n<pre id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" role=\"text\" data-placeholder=\"Translation\" data-ved=\"2ahUKEwi7u967zdyQAxXvXGwGHVn2CaUQ3ewLegQIChAV\" aria-label=\"Translated text: This Python Programming for Data Science training is designed for participants who want to understand the fundamentals and practical applications of Python in data analysis and data science. Participants will learn everything from basic Python programming concepts, data manipulation using libraries like NumPy and Pandas, data visualization using Matplotlib and Seaborn, and an introduction to machine learning with scikit-learn. This training focuses on hands-on practice and case studies relevant to the business and research worlds, ensuring participants not only understand the theory but also apply Python to data-driven decision-making.\"><\/pre>\n<p data-start=\"134\" data-end=\"515\">In the era of digital transformation, cyber threats represent strategic risks that can directly affect organizational operations, reputation, and sustainability. Cyber security is no longer solely the responsibility of information technology units; rather, it is a shared responsibility that extends to officers as decision-makers, process supervisors, and guardians of compliance.<\/p>\n<p data-start=\"517\" data-end=\"1008\">The <em data-start=\"521\" data-end=\"550\">Cyber Security for IT Leaders and Professional<\/em>\u00a0program is designed to equip participants with a fundamental understanding of the cyber threat landscape, core principles of information security, and the roles and responsibilities of officers in preventing, detecting, and responding to cyber security incidents. Through this syllabus, participants will gain insight into how policies, governance structures, and secure workplace behaviors contribute to the protection of organizational information assets.<\/p>\n<p data-start=\"1010\" data-end=\"1274\">This training emphasizes a practical and contextual approach, enabling officers to apply cyber security principles in daily decision-making, ensure regulatory compliance, and support the development of a strong information security culture within the organization. <a href=\"https:\/\/binus.ac.id\/humanitarian-ai\/wp-content\/uploads\/2026\/02\/CyberSecurityandEthicalHacking.pdf\">Download Syllabus<\/a>.<\/p>\n<h3 class=\"\" data-start=\"2420\" data-end=\"2445\">\ud83d\udcda <strong data-start=\"2427\" data-end=\"2445\">Topics Covered<\/strong><\/h3>\n<p><strong>Session 1 \u2013 <strong style=\"font-family: inherit\">Introduction to Cyber Security<\/strong><\/strong><\/p>\n<ul>\n<li>Definition of Cyber Security and Ethical Hacking<\/li>\n<li>Examples of threat in internet and networking.<\/li>\n<li>The role of IT leaders and officers in Cyber Security.<\/li>\n<\/ul>\n<p><strong>S<\/strong><strong>ession 2 \u2013 Cyber Threat Landscape<\/strong><\/p>\n<ul>\n<li data-start=\"1743\" data-end=\"1811\">\n<p data-start=\"1745\" data-end=\"1811\">IP Address and Networking essential<\/p>\n<\/li>\n<li data-start=\"1743\" data-end=\"1811\">\n<p data-start=\"1745\" data-end=\"1811\">Types of threats: malware, ransomware, phishing, insider threats<\/p>\n<\/li>\n<li data-start=\"1812\" data-end=\"1849\">\n<p data-start=\"1814\" data-end=\"1849\">Advanced Persistent Threats (APT)<\/p>\n<\/li>\n<li data-start=\"1850\" data-end=\"1881\">\n<p data-start=\"1852\" data-end=\"1881\">Current cyber attack trends<\/p>\n<\/li>\n<\/ul>\n<p><strong>Session 3 \u2013 Basic Principle of Information Security<\/strong><\/p>\n<ul>\n<li data-start=\"2095\" data-end=\"2150\">\n<p data-start=\"2097\" data-end=\"2150\">CIA Triad: Confidentiality, Integrity, Availability<\/p>\n<\/li>\n<li data-start=\"2151\" data-end=\"2198\">\n<p data-start=\"2153\" data-end=\"2198\">Assets, threats, vulnerabilities, and risks<\/p>\n<\/li>\n<li data-start=\"2199\" data-end=\"2243\">\n<p data-start=\"2201\" data-end=\"2243\">Organizational impact of cyber incidents<\/p>\n<\/li>\n<li data-start=\"2199\" data-end=\"2243\">Case study<\/li>\n<\/ul>\n<p><strong>Session 4 \u2013 Cyber Risk Management for IT Leaders\u00a0<\/strong><\/p>\n<ul>\n<li data-start=\"2453\" data-end=\"2497\">\n<p data-start=\"2455\" data-end=\"2497\">Cyber risk identification and assessment<\/p>\n<\/li>\n<li data-start=\"2498\" data-end=\"2534\">\n<p data-start=\"2500\" data-end=\"2534\">Risk appetite and risk tolerance<\/p>\n<\/li>\n<li data-start=\"2535\" data-end=\"2593\">\n<p data-start=\"2537\" data-end=\"2593\">Integrating cyber risk into enterprise risk management<\/p>\n<\/li>\n<li data-start=\"2535\" data-end=\"2593\">Case study<\/li>\n<\/ul>\n<p><strong>Session 5 \u2013 Cyber Security Governance<\/strong><\/p>\n<ul>\n<li data-start=\"2904\" data-end=\"2950\">\n<p data-start=\"2906\" data-end=\"2950\">Information security governance principles<\/p>\n<\/li>\n<li data-start=\"2951\" data-end=\"2994\">\n<p data-start=\"2953\" data-end=\"2994\">Roles and responsibilities (RACI model)<\/p>\n<\/li>\n<li data-start=\"2995\" data-end=\"3048\">\n<p data-start=\"2997\" data-end=\"3048\">Relationship between IT, management, and officers<\/p>\n<\/li>\n<li data-start=\"2995\" data-end=\"3048\">Case study<\/li>\n<\/ul>\n<p><strong>Session 6 \u2013 Ethical Hacking<\/strong><\/p>\n<ul>\n<li>Introduction to Ethical Hacking<\/li>\n<li data-start=\"1860\" data-end=\"1909\">\n<p data-start=\"1862\" data-end=\"1909\">Penetration Testing Execution Standard (PTES)<\/p>\n<\/li>\n<li data-start=\"1910\" data-end=\"1926\">\n<p data-start=\"1912\" data-end=\"1926\">OWASP Top 10<\/p>\n<\/li>\n<li data-start=\"1927\" data-end=\"1972\">\n<p data-start=\"1929\" data-end=\"1972\">NIST &amp; ISO 27001<\/p>\n<\/li>\n<li>Case study<\/li>\n<li>Project Presentation<\/li>\n<\/ul>\n<p><strong>Target:<\/strong> After completing this course, participatn will be able to:<\/p>\n<ol>\n<li><b>describe\u00a0<\/b><\/li>\n<\/ol>\n<hr class=\"\" data-start=\"2710\" data-end=\"2713\" \/>\n<h3 class=\"\" data-start=\"2715\" data-end=\"2743\">\ud83c\udfaf <strong data-start=\"2722\" data-end=\"2743\">Learning Outcomes<\/strong><\/h3>\n<p class=\"\" data-start=\"2744\" data-end=\"2791\">By the end of this training, participants will:<\/p>\n<p>1. Understand the basics of Cyber security and its threats.<\/p>\n<p>2. To provide a comprehensive understanding of ethical hacking concepts, methodologies, and basic techniques to help participants identify system weaknesses and improve organizational security in an ethical and legal manner.<\/p>\n<hr class=\"\" data-start=\"3004\" data-end=\"3007\" \/>\n<h3 class=\"\" data-start=\"3009\" data-end=\"3023\">\ud83d\udcde Contact<\/h3>\n<ul data-start=\"3024\" data-end=\"3182\">\n<li class=\"\" data-start=\"3024\" data-end=\"3089\">\n<p class=\"\" data-start=\"3026\" data-end=\"3089\">\ud83d\udce7 Email: <a class=\"cursor-pointer\" rel=\"noopener\" data-start=\"3036\" data-end=\"3087\">wbudiharto@binus.edu<\/a><\/p>\n<\/li>\n<li class=\"\" data-start=\"3090\" data-end=\"3136\">\n<p class=\"\" data-start=\"3092\" data-end=\"3136\">\ud83d\udcf1 Mr. Widodo (WhatsApp): +62 856 9887 384<\/p>\n<\/li>\n<li class=\"\" data-start=\"3137\" data-end=\"3182\">\n<p class=\"\" data-start=\"3139\" data-end=\"3182\">\ud83d\udcf1 Ms. Emny (WhatsApp): +62 813 8741 3863<\/p>\n<\/li>\n<\/ul>\n<hr \/>\n<h2 class=\"\" style=\"text-align: center\" data-start=\"162\" data-end=\"191\"><strong data-start=\"168\" data-end=\"189\">Silabus Pelatihan<\/strong><\/h2>\n<h3 class=\"\" style=\"text-align: center\" data-start=\"192\" data-end=\"237\">Cyber Security for IT Leaders and Officers<\/h3>\n<h4 data-start=\"266\" data-end=\"280\">\ud83d\udd58 Durasi: <strong>3\u00a0hari fullday<\/strong> (08:00 &#8211; 17:00 WIB)<\/h4>\n<h4 data-start=\"321\" data-end=\"351\">\ud83d\udc65 Jumlah Peserta Minimum: <strong data-start=\"352\" data-end=\"363\">5 orang<\/strong><\/h4>\n<h4 data-start=\"365\" data-end=\"378\">\ud83d\udcbc Biaya: <strong data-start=\"379\" data-end=\"429\">Sesuai dengan kesepakatan dan lokasi pelatihan<\/strong><\/h4>\n<hr class=\"\" data-start=\"431\" data-end=\"434\" \/>\n<h3 class=\"\" data-start=\"436\" data-end=\"466\">\ud83d\udccb <strong data-start=\"443\" data-end=\"466\">Deskripsi Pelatihan<\/strong><\/h3>\n<p data-start=\"167\" data-end=\"518\">Di era transformasi digital, ancaman siber menjadi risiko strategis yang dapat berdampak langsung pada operasional, reputasi, dan keberlanjutan organisasi. Cyber Security tidak lagi hanya menjadi tanggung jawab tim IT, tetapi merupakan tanggung jawab bersama, termasuk para officers sebagai pengambil keputusan, pengawas proses, dan penjaga kepatuhan.<\/p>\n<p data-start=\"520\" data-end=\"965\">Program Cyber Security for Officers ini dirancang untuk membekali peserta dan leader IT di suatu perusahaan dengan pemahaman fundamental mengenai lanskap ancaman siber, prinsip-prinsip keamanan informasi, serta peran dan tanggung jawab officers dalam mencegah, mendeteksi, dan merespons insiden keamanan siber serta beberapa prinsip dan teknik <em>ethical hacking<\/em> dasar. Melalui silabus ini, peserta akan memahami bagaimana kebijakan, tata kelola, dan perilaku kerja yang aman berkontribusi terhadap perlindungan aset informasi organisasi.<\/p>\n<p data-start=\"967\" data-end=\"1239\">Pelatihan ini menekankan pendekatan praktis dan kontekstual, sehingga officers mampu menerapkan prinsip cyber security dalam pengambilan keputusan sehari-hari, memastikan kepatuhan terhadap regulasi, serta mendukung budaya keamanan informasi yang kuat di lingkungan kerja.<\/p>\n<hr class=\"\" data-start=\"906\" data-end=\"909\" \/>\n<p><strong>Sesi 1 \u2013 Pengantar Cyber Security<\/strong><\/p>\n<ul>\n<li>Definition of Cyber Security and Ethical Hacking<\/li>\n<li>Examples of threat in internet and networking.<\/li>\n<li>The role of IT leaders and officers in Cyber Security.<\/li>\n<\/ul>\n<p><strong>Sesi 2 \u2013 Cyber Threat Landscape<\/strong><\/p>\n<ul>\n<li>IP Address and Networking essential<\/li>\n<li>Types of threats: malware, ransomware, phishing, insider threats<\/li>\n<li>Advanced Persistent Threats (APT)<\/li>\n<li>Current cyber-attack trends<\/li>\n<\/ul>\n<p><strong>Sesi 3 \u2013 Konsep Information Security<\/strong><\/p>\n<ul>\n<li>CIA Triad: Confidentiality, Integrity, Availability<\/li>\n<li>Assets, threats, vulnerabilities, and risks<\/li>\n<li>Organizational impact of cyber incidents<\/li>\n<li>Case study<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Sesi 4 \u2013 Cyber Risk Management for IT Leaders\u00a0<\/strong><\/p>\n<ul>\n<li>Cyber risk identification and assessment<\/li>\n<li>Risk appetite and risk tolerance<\/li>\n<li>Integrating cyber risk into enterprise risk management<\/li>\n<li>Case study<\/li>\n<\/ul>\n<p><strong>Sesi 5 \u2013 Cyber Security Governance<\/strong><\/p>\n<ul>\n<li>Information security governance principles<\/li>\n<li>Roles and responsibilities (RACI model)<\/li>\n<li>Relationship between IT, management, and officers<\/li>\n<li>Case study<\/li>\n<\/ul>\n<p><strong>Sesi 6 \u2013 Ethical Hacking<\/strong><\/p>\n<ul>\n<li>Introduction to Ethical Hacking<\/li>\n<li>Penetration Testing Execution Standard (PTES)<\/li>\n<li>OWASP Top 10<\/li>\n<li>NIST &amp; ISO 27001<\/li>\n<li>Case study<\/li>\n<li>Project Presentation<\/li>\n<\/ul>\n<h3 class=\"\" data-start=\"2715\" data-end=\"2743\">\ud83c\udfaf Target Pelatihan<\/h3>\n<p>Setelah mengikuti pelatihan ini, peserta dapat:<\/p>\n<ol>\n<li>Memahami konsep dasar Cyber security dan berbagai jenis ancama <em>(threats)<\/em>.<\/li>\n<li>Menyediakan pemahaman komprehensif dari konsep Cyber Security dan ethical hacking, metodologi dan Teknik mengidentifikasi kelemahan system.<\/li>\n<\/ol>\n<hr class=\"\" data-start=\"1513\" data-end=\"1516\" \/>\n<h3 class=\"\" data-start=\"1518\" data-end=\"1531\">\ud83d\udcde Kontak<\/h3>\n<ul data-start=\"1532\" data-end=\"1679\">\n<li class=\"\" data-start=\"1532\" data-end=\"1597\">\n<p class=\"\" data-start=\"1534\" data-end=\"1597\">\ud83d\udce7 Email: <a class=\"cursor-pointer\" rel=\"noopener\" data-start=\"1544\" data-end=\"1595\">wbudiharto@binus.edu<\/a><\/p>\n<\/li>\n<li class=\"\" data-start=\"1598\" data-end=\"1639\">\n<p class=\"\" data-start=\"1600\" data-end=\"1639\">\ud83d\udcf1 Bpk. Prof. Widodo Budiharto (WA): +62 856 9887 384<\/p>\n<\/li>\n<li class=\"\" data-start=\"1640\" data-end=\"1679\">\n<p class=\"\" data-start=\"1642\" data-end=\"1679\">\ud83d\udcf1 Ibu Dr. Emny Harna Yossy (WA): +62 813 8741 3863<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Training Syllabus \ud83d\udd58 Duration: 3\u00a0full days (08:00 AM \u2013 05:00 PM GMT+7) \ud83d\udc65 Minimum Participants: 5 people \ud83d\udcbc Fee: Based on agreement and venue \ud83d\udccb Training Overview In the era of digital transformation, cyber threats represent strategic risks that can directly affect organizational operations, reputation, and sustainability. Cyber security is no longer solely the responsibility [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":457,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":7,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts\/300\/revisions\/408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/media\/457"}],"wp:attachment":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}