The Master of Digital Forensics and Data Security study program focuses on two main skills on the subject of learning in the field of computer science, namely:

a. Fundamental theory of digital forensics specific to computing (supported by courses such as
forensic management of digital evidence, theoretical foundation of computing, multimedia forensics) and
for computer networks (supported by courses such as digital forensic applications, network
security, network forensics) .

b. Cyber ​​security in data (supported by security principle, applied cryptography, data
communication and forensics security courses )

This study program aims to produce professionals in the field of digital forensics and data security who can utilize technology and expertise to deal with social problems in the fields of science, law and crime, especially in digital crimes.

Semester 1

Kode MKCourse NameNama MKBobot SKS
TeoriPraktik
CMI6A4Security principlePrinsip Dasar Keamanan40
CMI6B3Digital Forensic FrameworkKerangka Kerja Forensik Digital30
CMI6C3Vulnerability of computer architecture and network systemKerentanan Arsitektur Sistem Komputer dan Jaringan30
CMI6D2ProjectProyek20
CII623Research MethodMETODOLOGI RISET30
Total Semester 1150

 

Semester 2

Kode MKCourse NameNama MKBobot SKS
TeoriPraktik
CMI6E3Usable security & privacysekuritas dan privasi untuk pengguna Teknologi Informasi30
CMI6F3Forensics & security challengesTantangan bidang forensik  dan keamanan30
CMI6G3Advanced Digital ForensicForensik digital lanjut30
CMI6H3Applied CryptographyKriptografi terapan30
CII643Project implementation-1IMPLEMENTASI PROYEK 130
Total Semester 2150

 

Semester 3

Kode MKCourse NameNama MKBobot SKS
TeoriPraktik
CII713Project implementation-2IMPLEMENTASI PROYEK II30
 Selected Advanced Topic** (Bisa dilihat di Tabel)MK topik pilihan30
CMI7A0Capstone Fieldwork & SeminarKerja Lapangan & Seminar Capstone00
 Selected Supporting Topic** (Bisa dilihat di Tabel)MK topik pendukung30
Total Semester 390

 

Semester 4

Kode MKCourse NameNama MKBobot SKS
TeoriPraktik
CII733ThesisTESIS30
Total Semester 430

 

Selected Advanced Topic (PILIHAN)

Kode MKCourse NameNama MKBobot SKS
TeoriPraktik
CMI7B3Forensic data analysisAnalisis Data Forensik30
CMI7C3Investigative and Intelligence Analysis: Theory and Methods (OSINT)Analisis Investigasi dan Intelijen: Teori dan Metode  (OSINT)30
CMI7D3IoT securityKeamanan IoT30

 

Selected Supporting Topic (PILIHAN)

Kode MKCourse NameNama MKBobot SKS
TeoriPraktik
CMI7E3Provable securitySekuritas yang dapat dibuktikan30
CMI7F3Cyber crime & cyber lawKejahatan dan hukum pada dunia siber30
CMI7G3Cyber forensic data collectionPengumpulan data forensik  pada dunia siber30
 Courses on Magister Informatics (S2 IF) 30

 

Course NameDescription
Basic Principles of SecurityThis course discusses the basic components of security (confidentiality, integrity, availability, authentication, and non-repudiation), access control, basic cryptography and its implementation, basic protocol design, and case studies, and basic methods used in digital forensics, and basic concept of attack and how to prevent it.
Digital Forensic FrameworkThis course provides insight into the digital forensic framework. This framework covers digital forensic activities on computer, mobile, network, CCTV, social media and other relevant digital devices. Students will learn how the investigation process must be carried out in accordance with forensic rules accepted by applicable laws and regulations as well as best practices that have been accepted by the forensic community in general. This course is project based, where at the end of the course students will be asked to produce a validation/verification test for one of the digital forensic frameworks using data from their own experimental results.
Computer System and Network Architecture VulnerabilitiesThis course provides insight into how system component security can impact system security, methods for ensuring component design confidentiality can be compromised, and ways to learn information about component functionality with limited information about its design and implementation.
ProjectThis course is intended for students in the first semester. With the aim of providing guidance for students in preparing research proposals that will be used in their thesis.
Research MethodologyThis course discusses methods for planning a research systematically
Security and privacy for Information Technology usersThis course discusses the general description of policies as well as methods or techniques that must be taken when a security situation arises, the impact of the usefulness or lack of these methods on the security and privacy of a system, both for human factors, computer science, and assurance of system security quality.
Forensic and security challengesThis course discusses the challenges of cybersecurity and digital forensics to create an effective cybercrime defense, analysis, and investigation. This course also includes technical and socio-economic perspectives for utilizing information and communication technologies and in discussing challenges in cyber security, cyber crime and cyber forensics. In addition, this course also discusses dangerous activities based on motivation as well as the ability of attackers on the technological and human elements needed by the enemy to carry out criminal operations. Preparation of a framework that can be used by students to develop effective mitigation against harmful cyber activities.
Advanced digital forensicsThis course discusses advanced digital forensic methods such as: Mobile device forensics, Operating system & file system forensics, Network forensics, Wireless security & forensics, Multimedia forensics, Social media, e-Mail and others.
Applied cryptographyThis course discusses several mathematical aspects that support cryptography, practical aspects of cryptography, such as pseudo random number generation, symmetric cryptography (stream and block ciphers), operating modes, hash functions, message and entity authentication protocols, implementation of public key encryption and digital signatures.
Project Implementation 1This course is intended for students in the second semester. With the aim of providing guidance for students in the implementation of the research proposals that have been submitted so that they are in line with the making of the thesis.
Project Implementation 2This course is intended for students in the third semester. With the aim of providing guidance for students in the continued implementation of the research proposals that have been submitted so that they are in line with the making of theses and the preparation of scientific articles for thesis publication.
Fieldwork & Capstone SeminarsThis course is intended for the implementation of knowledge and skills related to the knowledge acquired by students during lecture activities. In practice, students are required to develop themselves, develop scientific innovations as well as contribute to helping solve problems in various companies / agencies and industries related to cyber security and digital forensics.
ThesisThis course is intended for students in the fourth semester. With the aim of providing guidance for students in the continued implementation of the research proposals that have been submitted so that they are in line with the making of theses and the preparation of scientific articles for thesis publication. Scientific works or products are obtained from the results of research or solving a problem that is carried out systematically through analytical activities (proposed solutions and results).