Certification Product and Exam Provider

National Standard Certification

Objectives:

As your ArchiMate skills develop your models will become larger and more complex and you will begin to rely on them more in your day to day work

Provided by:

International Association of Software Architect /IASA Chapter Indonesia

Exam Code: IASA1


Objectives:

Understand the fundamentals of information and computer science, including the rudiments of software design and construction with an emphasis on data management

Provided by:

The Wholistic ASEAN Network/TWAN

Exam Code : TWAN1


Objectives:

Security System Architecture is the security architecture is one component of a product’s overall architecture and is developed to provide guidance during the design of the product. It outlines the level of assurance that is required and potential impacts that this level of security could have during the development stages and on the product overall.

Provided by:

International Association of Software Architect/IASA Chapter Indonesia

Exam Code: IASA4


Objectives:

Management of Risk Foundation is suitable for any organization or individual seeing the need for guidance on a controlled approach to identification, assessment and control risk at strategic, programme, project and operational perspectives

Provided by:

The Wholistic ASEAN Network/TWAN

Exam Code: TWAN2


Objectives:

Digital Literacy is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, laptops and desktop PCs for purposes of communication, expression, collaboration and advocacy.

Provided by:

Ikatan Konsultan Teknologi Informatika Indonesia/IKTII

Exam Code: IKTI1


Objectives:

Technopreneurship is not a product but a process of synthesis in engineering the future of a person, an organization, a nation and the world. In a digital, knowledge based society, strategic directions or decision-making processes will be demanding and complex.

Provided by:

Ikatan Konsultan Teknologi Informatika Indonesia/IKTII

Exam Code: IKTI2


Objectives:

Security Governance, Risk, and Compliance is a discipline that aims to synchronize information and activity across governance, risk management and compliance in order to operate more efficiently, enable effective information sharing, more effectively report activities and avoid wasteful overlaps.

Provided by:

Ikatan Konsultan Teknologi Informatika Indonesia/IKTII

Exam Code: IKTI3


Objectives:

Changing the world is possible, but it requires the right preparation and skills. One of the best ways to be prepared is with Adobe Certified Associate (ACA) certification. ACA certification is an industry-recognized credential that can be used to effectively validate one’s skills in Adobe digital-media software. It represents the creative skills in demand today by industry and academia and reflects well when presented on a resumé or college application.

Provided by:

Aliansi Desain Produk Industri Indonesia/ADPII

Exam Code: ADPI1


Objectives:

Working knowledge of the terminology, processes, and components associated with information technology. Experience with the Internet, World Wide Web, hardware and software, networking, security, maintenance, information systems, and the application development process.

Provided by:

Ikatan Profesi Komputer dan Informatika Indonesia/IPKIN

Exam Code: IPKI1


Objectives:

Security Operation Center manages incidents, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated and reported. Security Operation Center monitors applications to identify a possible cyber-attack or intrusion (event) and determines if it is a real, malicious threat (incident), and if it could have a business impact.

Provided by:

Ikatan Profesi Komputer dan Informatika Indonesia/IPKIN

Exam Code: IPKI4


Objectives:

Information system audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.

Provided by:

Ikatan Ahli Informatika Indonesia/IAII

Exam Code: IAII1


Objectives:

Platform Operating System Security a fundamental component of ICT that enables many different applications to be used in a variety of computing hardware. While, the original operating systems for large centralised computing focused their security efforts primarily on separating users, operating systems security has had to adapt to cater for a wider range of technology, such as desktop computers, smartphones and cloud platforms, and the different threats that have evolved as a consequence.

Provided by:

Ikatan Ahli Informatika Indonesia/IAII

Exam Code: IAII6


Objectives:

Acquired ability for learning IT of cyber ethics, Digital literacy, E-literacy, and governance regualtion.
• Cyber Ethics
• Digital Literacy
• E-Literacy
• Governance Regulation

Provided by:

Ikatan Ahli Informatika Indonesia/IAII

Exam Code: IAII3


Objectives:

Android Programming is expected to know basic knowledge of how to design and build applications for the Android platform and writes basic code for the app. Android Programming also performs unit tests for the codes written and also ensures that adequate security measures are taken to protect valuable data used in the app. This test is specially designed to check basic and also application skills of an Android developer – as per Industry Standards

Provided by:

Asosiasi Open Source Indonesia/AOSI

Exam Code: AOSI1


Objectives:

Can identify the licensing of open source systems and make decisions on their use, based on an understanding of the legal, economical and technical issues. Can find open source projects related to a given development problem. Can install from source code an open source project and start using it. Can choose the correct license, development model, and development community for open

Provided by:

Asosiasi Open Source Indonesia/AOSI

Exam Code: AOSI2


Objectives:

Certified Software Test Engineer is intended to establish standards for initial qualification and provide direction for the testing function through an aggressive educational program and indicates a professional level of competence in the principles and practices of quality control in the IT profession. Certified Software Test Engineer become members of a recognized professional group and receive recognition of their competence by business and professional associates, potentially more rapid career advancement, and greater acceptance in the role as advisor to management.

Provided by:

Asosiasi Piranti Lunak Telematika Indonesia/ASPILUKI

Exam Code: ASPI1


Objectives:

Structure of important algorithms. Understand use algorithms with appropriate data structures, to solve real life problems. How algorithms and data structures can be used to design system at scale.

Provided by:

Asosiasi Pendidikan Tinggi Ilmu Komputer Indonesia/APTIKOM

Exam Code: APTI2


Objectives:

Describe the advantages, disadvantages, and appropriate uses of various database management systems. Design a database system based on user requirements. Create entity-relationship diagrams that accurately describe a database structure. Understand and successfully utilize basic database design concepts such as primary and foreign keys, normalizing, bridge tables, alternate primary keys, and strong versus weak entities

Provided by:

Asosiasi Pendidikan Tinggi Ilmu Komputer Indonesia/APTIKOM

Exam Code: APTI1


Objectives:

Computer Science is the systematic study of the feasibility, structure, expression, and mechanization of the methodical processes that underlie the acquisition, representation, processing, storage, communication of, and access to information.
Computer Science is all about using software to build new and ideally better things.

Provided by:

Asosiasi Pendidikan Tinggi Ilmu Komputer Indonesia/APTIKOM

Exam Code: APTI3


Objectives:

Computer Science is the systematic study of the feasibility, structure, expression, and mechanization of the methodical processes that underlie the acquisition, representation, processing, storage, communication of, and access to information.
Computer Science is all about using software to build new and ideally better things.

Provided by:

Asosiasi Pendidikan Tinggi Ilmu Komputer Indonesia/APTIKOM

Exam Code: APTI4


Objectives:

Cyber Literacy builds upon fundamental cyber skills developed in Cyber Literacy and challenges to go deeper into the world of cyberspace.
Understand will utilize a microcontroller to construct complex systems that bring together a variety of components on each build and also will realize the significant real world connections as they discuss the liberal arts/humanities crossovers that exist with today’s technologies.

Provided by:

Asosiasi Pendidikan Tinggi Ilmu Komputer Indonesia/APTIKOM

Exam Code: APTI5


Objectives:

The skills and experience needed to succeed in e-commerce and online business as a practitioner, manager, leader or entrepreneur.
The skills and knowledge you need for e-commerce (buying and selling over the Internet) and online business (conducting business using Internet technology).
Best practices and learn to take on a more meaningful role as a practitioner, manager or leader. Boost your skills and qualifications with lectures and readings, case studies, exercises and assignments.

Provided by:

Pusat Riset Dan Edukasi Sistem Teknologi Informasi PERBANAS/Prestasi PERBANAS

Exam Code: PRES1


Objectives:

Integrate new tactics and strategies with traditional marketing tools and practices aimed at acquiring new customers, building customer loyalty, providing superior customer service, developing new products, improving profitability and conducting market research. Study the value of and methods for determining the return on investment for digital marketing programs, as well as online visitor and buyer behavior.
Build effective online marketing strategies for customer acquisition, conversion and retention.

Provided by:

Pusat Riset Dan Edukasi Sistem Teknologi Informasi PERBANAS/Prestasi PERBANAS

Exam Code: PRES2


Objectives:

Social Engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

Provided by:

Pusat Riset Dan Edukasi Sistem Teknologi Informasi PERBANAS/Prestasi PERBANAS

Exam Code: PRES3


Objectives:

Computer network is about the implementation, design principles and goals of a Computer Network and touches upon the various routing algorithms used in CN (such as link-state and distance vector).
talks about resource control and content distribution in Networking Applications.
deals with the operations and management of computer networks encompassing SDN's (Software Defined Networks).

Provided by:

Asosiasi Penyelenggara Jasa Internet Indonesia/APJII

Exam Code: APJI1


Objectives:

In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access.

Provided by:

Asosiasi Penyelenggara Jasa Internet Indonesia/APJII

Exam Code: APJI4


Objectives:

Intrusion prevention complements an Intrusion detection configuration by proactively inspecting a system’s incoming traffic to weed out malicious requests. A typical Intrusion prevention configuration uses web application firewalls and traffic filtering solutions to secure applications.
An Intrusion prevention prevents attacks by dropping malicious packets, blocking offending IPs and alerting security personnel to potential threats.

Provided by:

Asosiasi Penyelenggara Jasa Internet Indonesia/APJII

Exam Code: APJI5


Objectives:

Forensics Investigator is a specially trained professional who works with law enforcement agencies, as well as private firms, to retrieve information from computers and other types of data storage devices. Equipment can often be damaged either externally or internally corrupted by hacking or viruses.
Forensics Investigator is working to test the security of a information systems.

Provided by:

Asosiasi Keamanan Siber Indonesia/AKSI

Exam Code: AKSI13


Objectives:

Vulnerability analysis, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.

Provided by:

Asosiasi Keamanan Siber Indonesia/AKSI

Exam Code: AKSI14


Objectives:

Emergency response is action taken in response to an unexpected and dangerous occurence in an attempt to mitigate its impact on security information and technology.
Emergency response may refer to services provided by emergency and rescue services agencies, as well as the plans made and actions taken within an organziation to respond to emergencies. Emergency response plans are an important component of workplace

Provided by:

Asosiasi Keamanan Siber Indonesia/AKSI

Exam Code: AKSI9


Objectives:

Develop critical thinking, analytical reasoning, and technical writing skills to effectively work in the field. This is accomplished through utilizing industry standard tools and techniques to investigate labs and cases based upon real-world investigations.
Understand about various areas of cyber investigations, including digital evidence gathering, reporting, examinations, and court presentations.
Understand to solve cases from start to finish with digital forensics.

Provided by:

Asosiasi Keamanan Siber Indonesia/AKSI

Exam Code: AKSI10


Objectives:

Track bad guys with callback Word documents
Track web attackers
Block attackers from successfully attacking servers
Block web attackers from automatically discovering pages and input fields
Understand the legal limits and restrictions of Active Defense
Obfuscate DNS entries
Create non-attributable Active Defense Servers
Combine geolocation with existing Java applications
Create online social media profiles for cyber deception.

Provided by:

Asosiasi Keamanan Siber Indonesia/AKSI

Exam Code: AKSI11


Objectives:

Cloud computing & Cloud Technology is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to configurable computing resources, which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users with various capabilities to store and process their data in either privately owned, or third-party data centers that may be located far from the user–ranging in distance from across a city to across the world. Cloud computing relies on sharing of resources to achieve coherence and economy of scale, similar to a utility over an electricity network

Provided by:

Perhimpunan Arsitek Sistem dan Teknologi Informasi/PASTI

Exam Code: PAST1


Objectives:

• Complete Data Governance and Information Classification Plan
• Risk Management Framework to materially reduce cybersecurity risk
• Improve institutional user competence though Security Education,Training, and Awareness
• Consolidate Security Operations for Networks and System Common Services
• Cyber Threat Intelligence Analysis, Dissemination and Remediation
• Optimize Services, Establish Security Metrics, Promote Compliance, Achieve Continuous Diagnostics and Mitigation.

Provided by:

Perhimpunan Arsitek Sistem dan Teknologi Informasi/PASTI

Exam Code: PAST2


Objectives:

Enterprise Architecture is the conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to determine how an organization can most effectively achieve its current and future objectives. Enterprise Architecture is a well-defined practice for conducting enterprise analysis, design, planning, and implementation, using a holistic approach at all times, for the successful development and execution of strategy. Enterprise architecture applies architecture principles and practices to guide organizations through the business, information, process, and technology changes necessary to execute their strategies. These practices utilize the various aspects of an enterprise to identify, motivate, and achieve these changes.

Provided by:

International Association of Software Architect /IASA Chapter Indonesia

Exam Code: IASA2


Objectives:

IT Governance is the framework of processes and decision making structure within an organization applied through clearly defined policies and procedures relative to oversight of technology assets across the enterprise. The primary focus of IT governance is the stewardship of IT resources on behalf of various stakeholders. IT Governance is critical to a business to assure that the investments in IT generate business value on an on-going basis. As business processes and technology are integrated, businesses are compelled to provide IT governance in order to manage their financial, operational and compliance risks.

Provided by:

International Association of Software Architect /IASA Chapter Indonesia

Exam Code: IASA3


INTERNATIONAL STANDARD CERTIFICATION

Microsoft Office Specialist (MOS) is an internationally recognised qualification that validates your ability to use specific Microsoft Office applications, helping you stand out in today's competitive job market.

PRODUCT

• Microsoft Office 2010
• Microsoft Office 2013
• Microsoft Office 2016

Microsoft Technology Associate or MTA exams are exams that provide professional based certifications on Microsoft products and they provide the fundamentals for Databases (MSSQL Server), Development (Visual Studio) and IT Infrastructure (Windows, Windows Server).

PRODUCT

• Windows Server Administration Fundamentals
• Security Fundamentals
• Networking Fundamentals
• Mobility and Device Fundamentals
• Cloud Fundamentals
• Database Fundamentals
• Software Development Fundamentals
• HTML5 App Development Fundamentals
• Software Testing Fundamentals

The Adobe Certified Associate (ACA) certification allows you to demonstrate proficiency in Adobe digital communications tools. Become a Certified Associate and stand apart from your peers, boost your confidence, and expand your career opportunities.

PRODUCT

• Visual Communication Using Adobe Photoshop
• Interactive Media Using Adobe Flash Professional
• Graphic Design & Illustration Using Adobe Illustrator
• Web Authoring Using Adobe Dreamweaver
• Video Communication Using Adobe Premiere
• Print & Digital Media Publication Using Adobe InDesign

Available on Creative Suite 6 and Creative Cloud Version

The Autodesk Certification program enables experienced users to receive special recognition for their knowledge of Autodesk software applications.

PRODUCT

• Autodesk Revit
• Autodesk Inventor
• Autodesk Autocad
• Autodesk Maya
• Autodesk 3Dmax
• Autodesk Fusion360

EC-Council is a global leader in InfoSec Cyber Security certification programs like Certified Ethical Hacker and Computer Hacking Forensic Investigator. Ec Council provide the CSCU Certification purposed to provide individuals with the necessary knowledge and skills to protect their information assets.

PRODUCT

• Certified Secure Computer User v2 / CSCU v2

ASSOCIATION AND EXAM PROVIDER

Description

A Language Learning Network That Focuses on The Creative Development of Human Capital

Chairman: Eddie Mohammad

Description

Enterprise Architecture & IT Governance

Chairman: Prof. Richardus Eko Indrajit

Description

Project Management & Business

Chairman: DR. K C Chan

Description

IT Consultant

Chairman: Teddy Sukardi

Description

Design Product

Chairman: Dr. Adhi Nugraha

Description

IT Professional

Chairman: Eko K Budiardjo

Description

International Certification

Chairman: Widjojo Adi Hardono

Description

Informatics Expert

Chairman: Dr. Bambang Hariyanto

Description

Open Source

Chairman: Ifik Arifin

Description

Software Development

Chairman: Djarot Subiantoro

Description

IT Education

Chairman: Prof. Ir. Zainal Arifin Hasibuan, MSc., PhD.

Description

E-Commerce & E-Business

Chairman:

Description

Internet & Infrastructure

Chairman: Jamalul Izza

Description

Computer & Internet Security

Chairman:

Description

IT Architecture

Chairman:

Description

E-Learning & E-Education

Chairman:

Description

Multimedia & Design

Chairman: Bambang Eka Purnama, M.Kom