The Master of Digital Forensics and Data Security study program focuses on two main skills on the subject of learning in the field of computer science, namely:
a. Fundamental theory of digital forensics specific to computing (supported by courses such as
forensic management of digital evidence, theoretical foundation of computing, multimedia forensics) and
for computer networks (supported by courses such as digital forensic applications, network
security, network forensics) .
b. Cyber security in data (supported by security principle, applied cryptography, data
communication and forensics security courses )
This study program aims to produce professionals in the field of digital forensics and data security who can utilize technology and expertise to deal with social problems in the fields of science, law and crime, especially in digital crimes.
Semester 1
Kode MK | Course Name | Nama MK | Bobot SKS | |
Teori | Praktik | |||
CMI6A4 | Security principle | Prinsip Dasar Keamanan | 4 | 0 |
CMI6B3 | Digital Forensic Framework | Kerangka Kerja Forensik Digital | 3 | 0 |
CMI6C3 | Vulnerability of computer architecture and network system | Kerentanan Arsitektur Sistem Komputer dan Jaringan | 3 | 0 |
CMI6D2 | Project | Proyek | 2 | 0 |
CII623 | Research Method | METODOLOGI RISET | 3 | 0 |
Total Semester 1 | 15 | 0 |
Semester 2
Kode MK | Course Name | Nama MK | Bobot SKS | |
Teori | Praktik | |||
CMI6E3 | Usable security & privacy | sekuritas dan privasi untuk pengguna Teknologi Informasi | 3 | 0 |
CMI6F3 | Forensics & security challenges | Tantangan bidang forensik dan keamanan | 3 | 0 |
CMI6G3 | Advanced Digital Forensic | Forensik digital lanjut | 3 | 0 |
CMI6H3 | Applied Cryptography | Kriptografi terapan | 3 | 0 |
CII643 | Project implementation-1 | IMPLEMENTASI PROYEK 1 | 3 | 0 |
Total Semester 2 | 15 | 0 |
Semester 3
Kode MK | Course Name | Nama MK | Bobot SKS | |
Teori | Praktik | |||
CII713 | Project implementation-2 | IMPLEMENTASI PROYEK II | 3 | 0 |
Selected Advanced Topic** (Bisa dilihat di Tabel) | MK topik pilihan | 3 | 0 | |
CMI7A0 | Capstone Fieldwork & Seminar | Kerja Lapangan & Seminar Capstone | 0 | 0 |
Selected Supporting Topic** (Bisa dilihat di Tabel) | MK topik pendukung | 3 | 0 | |
Total Semester 3 | 9 | 0 |
Semester 4
Kode MK | Course Name | Nama MK | Bobot SKS | |
Teori | Praktik | |||
CII733 | Thesis | TESIS | 3 | 0 |
Total Semester 4 | 3 | 0 |
Selected Advanced Topic (PILIHAN)
Kode MK | Course Name | Nama MK | Bobot SKS | |
Teori | Praktik | |||
CMI7B3 | Forensic data analysis | Analisis Data Forensik | 3 | 0 |
CMI7C3 | Investigative and Intelligence Analysis: Theory and Methods (OSINT) | Analisis Investigasi dan Intelijen: Teori dan Metode (OSINT) | 3 | 0 |
CMI7D3 | IoT security | Keamanan IoT | 3 | 0 |
Selected Supporting Topic (PILIHAN)
Kode MK | Course Name | Nama MK | Bobot SKS | |
Teori | Praktik | |||
CMI7E3 | Provable security | Sekuritas yang dapat dibuktikan | 3 | 0 |
CMI7F3 | Cyber crime & cyber law | Kejahatan dan hukum pada dunia siber | 3 | 0 |
CMI7G3 | Cyber forensic data collection | Pengumpulan data forensik pada dunia siber | 3 | 0 |
Courses on Magister Informatics (S2 IF) | 3 | 0 |
Course Name | Description |
Basic Principles of Security | This course discusses the basic components of security (confidentiality, integrity, availability, authentication, and non-repudiation), access control, basic cryptography and its implementation, basic protocol design, and case studies, and basic methods used in digital forensics, and basic concept of attack and how to prevent it. |
Digital Forensic Framework | This course provides insight into the digital forensic framework. This framework covers digital forensic activities on computer, mobile, network, CCTV, social media and other relevant digital devices. Students will learn how the investigation process must be carried out in accordance with forensic rules accepted by applicable laws and regulations as well as best practices that have been accepted by the forensic community in general. This course is project based, where at the end of the course students will be asked to produce a validation/verification test for one of the digital forensic frameworks using data from their own experimental results. |
Computer System and Network Architecture Vulnerabilities | This course provides insight into how system component security can impact system security, methods for ensuring component design confidentiality can be compromised, and ways to learn information about component functionality with limited information about its design and implementation. |
Project | This course is intended for students in the first semester. With the aim of providing guidance for students in preparing research proposals that will be used in their thesis. |
Research Methodology | This course discusses methods for planning a research systematically |
Security and privacy for Information Technology users | This course discusses the general description of policies as well as methods or techniques that must be taken when a security situation arises, the impact of the usefulness or lack of these methods on the security and privacy of a system, both for human factors, computer science, and assurance of system security quality. |
Forensic and security challenges | This course discusses the challenges of cybersecurity and digital forensics to create an effective cybercrime defense, analysis, and investigation. This course also includes technical and socio-economic perspectives for utilizing information and communication technologies and in discussing challenges in cyber security, cyber crime and cyber forensics. In addition, this course also discusses dangerous activities based on motivation as well as the ability of attackers on the technological and human elements needed by the enemy to carry out criminal operations. Preparation of a framework that can be used by students to develop effective mitigation against harmful cyber activities. |
Advanced digital forensics | This course discusses advanced digital forensic methods such as: Mobile device forensics, Operating system & file system forensics, Network forensics, Wireless security & forensics, Multimedia forensics, Social media, e-Mail and others. |
Applied cryptography | This course discusses several mathematical aspects that support cryptography, practical aspects of cryptography, such as pseudo random number generation, symmetric cryptography (stream and block ciphers), operating modes, hash functions, message and entity authentication protocols, implementation of public key encryption and digital signatures. |
Project Implementation 1 | This course is intended for students in the second semester. With the aim of providing guidance for students in the implementation of the research proposals that have been submitted so that they are in line with the making of the thesis. |
Project Implementation 2 | This course is intended for students in the third semester. With the aim of providing guidance for students in the continued implementation of the research proposals that have been submitted so that they are in line with the making of theses and the preparation of scientific articles for thesis publication. |
Fieldwork & Capstone Seminars | This course is intended for the implementation of knowledge and skills related to the knowledge acquired by students during lecture activities. In practice, students are required to develop themselves, develop scientific innovations as well as contribute to helping solve problems in various companies / agencies and industries related to cyber security and digital forensics. |
Thesis | This course is intended for students in the fourth semester. With the aim of providing guidance for students in the continued implementation of the research proposals that have been submitted so that they are in line with the making of theses and the preparation of scientific articles for thesis publication. Scientific works or products are obtained from the results of research or solving a problem that is carried out systematically through analytical activities (proposed solutions and results). |