
























































































































































































































































{"id":455,"date":"2016-09-11T11:27:48","date_gmt":"2016-09-11T04:27:48","guid":{"rendered":"http:\/\/if.itats.ac.id\/?p=455"},"modified":"2016-09-11T11:27:48","modified_gmt":"2016-09-11T04:27:48","slug":"silabus-sekuritas-jaringan","status":"publish","type":"post","link":"https:\/\/itats.ac.id\/teknikinformatika\/silabus-sekuritas-jaringan\/","title":{"rendered":"Silabus Sekuritas Jaringan"},"content":{"rendered":"<p><strong>SILABUS MATA KULIAH<\/strong><\/p>\n<p>Program Studi \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 Teknik Informatika<\/p>\n<p>Kode \/ Nama Mata Kuliah\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 16067311 \/ Sekuritas Jaringan<\/p>\n<p>Jumlah SKS \/ Semseter\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 3 SKS \/ VII<\/p>\n<p>Mata Kuliah Pra Syarat\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 Sistem Operasi, Jaringan Komputer, Pemrograman Jaringan<\/p>\n<p>Capaian Pembelajaran Lulusan\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :<\/p>\n<ol>\n<li style=\"text-align: justify\">Menguasai konsep\u00a0\u00a0 \u00a0dan\u00a0\u00a0 \u00a0teori\u00a0\u00a0 \u00a0dasar\u00a0\u00a0 \u00a0bidang\u00a0\u00a0 \u00a0informatika<\/li>\n<li style=\"text-align: justify\">Mampu menyelesaikan\u00a0\u00a0 \u00a0masalah\u00a0\u00a0 \u00a0bidang\u00a0\u00a0 \u00a0teknologi\u00a0\u00a0 \u00a0informasi\u00a0\u00a0 \u00a0dan\u00a0\u00a0 \u00a0komunikasi\u00a0\u00a0 \u00a0dengan\u00a0\u00a0 \u00a0keahlian\u00a0\u00a0 \u00a0 \u00a0komputasi\u00a0\u00a0 \u00a0berbasis\u00a0\u00a0 \u00a0jaringan<\/li>\n<\/ol>\n<p>Capaian Pemebelajaran Mata Kuliah\u00a0 :<\/p>\n<p style=\"text-align: justify\">Mahasiswa \u00a0mampu\u00a0\u00a0 \u00a0memahami\u00a0\u00a0 \u00a0konsep\u00a0\u00a0 \u00a0keamanan\u00a0\u00a0 \u00a0informasi,\u00a0\u00a0 \u00a0baik\u00a0\u00a0 \u00a0yang\u00a0\u00a0 \u00a0terdapat\u00a0\u00a0 \u00a0pada\u00a0\u00a0 \u00a0suatu\u00a0\u00a0 \u00a0komputer\u00a0\u00a0 \u00a0 maupun \u00a0 yang\u00a0\u00a0 \u00a0 sedang\u00a0 \u00a0\u00a0 ditransmisikan \u00a0 pada suatu \u00a0 jaringan. \u00a0 Berdasarkan \u00a0 konsep-\u00ad\u2010 konsep \u00a0\u00a0 \u00a0tersebut, \u00a0\u00a0 \u00a0mahasiswa \u00a0\u00a0 \u00a0mampu \u00a0\u00a0 \u00a0mengaplikasikannya, \u00a0\u00a0 \u00a0baik\u00a0\u00a0 \u00a0\u00a0 secara \u00a0\u00a0 \u00a0individu \u00a0\u00a0 \u00a0maupun\u00a0\u00a0 \u00a0secara\u00a0\u00a0 \u00a0berkelompok\u00a0\u00a0 \u00a0dalam\u00a0\u00a0 \u00a0tim<\/p>\n<table width=\"659\">\n<tbody>\n<tr>\n<td width=\"262\"><strong>POKOK BAHASAN<\/strong><\/td>\n<td width=\"246\"><strong>ALAT\/BAHAN\/SUMBER BELAJAR<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"262\">Konsep \u00a0Dasar\u00a0\u00a0 \u00a0Keamanan:\u00a0\u00a0 \u00a0security\u00a0\u00a0 \u00a0property\u00a0\u00a0 \u00a0(confidentiality,\u00a0\u00a0 \u00a0integrity,\u00a0\u00a0 \u00a0availability,\u00a0\u00a0 \u00a0dll)<\/td>\n<td width=\"246\">LCD-Projector, Laptop \/ &#8211; \/ Information \u00a0 Security \u00a0 The\u00a0\u00a0 \u00a0 Complete\u00a0\u00a0 \u00a0 Reference, \u00a0 Second \u00a0 Edition \u00a0 by \u00a0 Mark<\/td>\n<\/tr>\n<tr>\n<td width=\"262\">Jenis-\u00ad\u2010Jenis\u00a0\u00a0 \u00a0Algoritma\u00a0\u00a0 \u00a0Enkripsi:\u00a0\u00a0 \u00a0enkripsi\u00a0\u00a0 \u00a0klasik,\u00a0\u00a0 \u00a0blok,\u00a0\u00a0 \u00a0stream,\u00a0\u00a0 \u00a0simetrik,\u00a0\u00a0 \u00a0asimetrik.<\/td>\n<td width=\"246\">LCD-Projector, Laptop \/ &#8211; \/ Cryptography \u00a0\u00a0\u00a0\u00a0\u00a0 and\u00a0\u00a0 \u00a0 Network \u00a0\u00a0\u00a0\u00a0\u00a0 Security: \u00a0\u00a0\u00a0\u00a0\u00a0 Principles \u00a0\u00a0\u00a0\u00a0\u00a0 and\u00a0\u00a0 \u00a0 Practice \u00a0\u00a0\u00a0\u00a0\u00a0 (6th\u00a0\u00a0 \u00a0 \u00a0Edition) \u00a0\u00a0\u00a0\u00a0\u00a0 by\u00a0\u00a0 \u00a0William\u00a0\u00a0 \u00a0Stallings\u00a0\u00a0 \u00a0(Mar\u00a0\u00a0 \u00a016,\u00a0\u00a0 \u00a02013).<\/td>\n<\/tr>\n<tr>\n<td width=\"262\">Integritas \u00a0 Data \u00a0 :\u00a0 \u00a0\u00a0 Hash \u00a0 function, \u00a0 Message \u00a0 Authentication \u00a0 Code, \u00a0 Digital\u00a0\u00a0 \u00a0 Signature, \u00a0 Digital\u00a0\u00a0 \u00a0Certificate,\u00a0\u00a0 \u00a0Public\u00a0\u00a0 \u00a0Key\u00a0\u00a0 \u00a0Infrastructure<\/td>\n<td width=\"246\">LCD-Projector, Laptop \/ &#8211; \/ Cryptography \u00a0\u00a0\u00a0\u00a0\u00a0 and\u00a0\u00a0 \u00a0 Network \u00a0\u00a0\u00a0\u00a0\u00a0 Security: \u00a0\u00a0\u00a0\u00a0\u00a0 Principles \u00a0\u00a0\u00a0\u00a0\u00a0 and\u00a0\u00a0 \u00a0 Practice \u00a0\u00a0\u00a0\u00a0\u00a0 (6th\u00a0\u00a0 \u00a0 \u00a0Edition) \u00a0\u00a0\u00a0\u00a0\u00a0 by\u00a0\u00a0 \u00a0William\u00a0\u00a0 \u00a0Stallings\u00a0\u00a0 \u00a0(Mar\u00a0\u00a0 \u00a016,\u00a0\u00a0 \u00a02013).<\/td>\n<\/tr>\n<tr>\n<td width=\"262\">Keamanan \u00a0 \u00a0Pada\u00a0\u00a0 \u00a0 Program \u00a0 \u00a0Komputer: \u00a0 \u00a0kelemahan \u00a0 \u00a0string, \u00a0 \u00a0buffer \u00a0 \u00a0overflow, \u00a0 \u00a0SQL \u00a0 \u00a0injection,<\/p>\n<p>manajemen \u00a0memori\u00a0\u00a0 \u00a0dinamik,\u00a0\u00a0 \u00a0dll.<\/td>\n<td width=\"246\">LCD-Projector, Laptop \/ &#8211; \/ Cryptography \u00a0\u00a0\u00a0\u00a0\u00a0 and\u00a0\u00a0 \u00a0 Network \u00a0\u00a0\u00a0\u00a0\u00a0 Security: \u00a0\u00a0\u00a0\u00a0\u00a0 Principles \u00a0\u00a0\u00a0\u00a0\u00a0 and\u00a0\u00a0 \u00a0 Practice \u00a0\u00a0\u00a0\u00a0\u00a0 (6th\u00a0\u00a0 \u00a0 \u00a0Edition) \u00a0\u00a0\u00a0\u00a0\u00a0 by\u00a0\u00a0 \u00a0William\u00a0\u00a0 \u00a0Stallings\u00a0\u00a0 \u00a0(Mar\u00a0\u00a0 \u00a016,\u00a0\u00a0 \u00a02013).<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify\"><a href=\"http:\/\/if.itats.ac.id\/wp-admin\/upload.php?item=445\">Download Silabus<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SILABUS MATA KULIAH Program Studi \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 Teknik Informatika Kode \/ Nama Mata Kuliah\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 16067311 \/ Sekuritas Jaringan Jumlah SKS \/ Semseter\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 3 SKS \/ VII Mata Kuliah Pra Syarat\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 :\u00a0\u00a0\u00a0 Sistem Operasi, Jaringan Komputer, Pemrograman Jaringan Capaian Pembelajaran Lulusan\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Menguasai konsep\u00a0\u00a0 \u00a0dan\u00a0\u00a0 \u00a0teori\u00a0\u00a0 \u00a0dasar\u00a0\u00a0 \u00a0bidang\u00a0\u00a0 \u00a0informatika Mampu menyelesaikan\u00a0\u00a0 \u00a0masalah\u00a0\u00a0 \u00a0bidang\u00a0\u00a0 \u00a0teknologi\u00a0\u00a0&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[44],"tags":[62,63,64,65,66],"class_list":["post-455","post","type-post","status-publish","format-standard","hentry","category-silabus","tag-digital-signatur","tag-jaringan-komputer","tag-public-key","tag-sekuritas","tag-sistem-operasi"],"_links":{"self":[{"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/posts\/455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/comments?post=455"}],"version-history":[{"count":0,"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/posts\/455\/revisions"}],"wp:attachment":[{"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/media?parent=455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/categories?post=455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itats.ac.id\/teknikinformatika\/wp-json\/wp\/v2\/tags?post=455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}