0% found this document useful (0 votes)
130 views2 pages

File PDF

The document lists 30 names organized into 10 groups of 3 people each. Each group is associated with a different topic related to cybersecurity: 1) Windows Operating System, 2) Linux Operating System, 3) Network Protocol and Service, 4) Network Infrastructure, 5) Network Attacks, 6) Protecting Network, 7) Cryptography, 8) Security Monitoring, 9) Intrusion Data Analysis, 10) Incident Response handling.

Uploaded by

Fess
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views2 pages

File PDF

The document lists 30 names organized into 10 groups of 3 people each. Each group is associated with a different topic related to cybersecurity: 1) Windows Operating System, 2) Linux Operating System, 3) Network Protocol and Service, 4) Network Infrastructure, 5) Network Attacks, 6) Protecting Network, 7) Cryptography, 8) Security Monitoring, 9) Intrusion Data Analysis, 10) Incident Response handling.

Uploaded by

Fess
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

A Christian Yonanda 1

Anindia Purwosunu 1 Windows Operating System


Dian Citra Buana 1
Gonewaje 1
Achmad Dharma Setiawan 2
Arsyadi Akbar 2
Dian Yustika Rini 2 Linux Operating System
Imam Mustofa 2
Ade Rahmad 3
Arta Tri Narta 3 Network Protocol and Service
Dika Kurnia Nanda 3
Sholahul Fajri 3
Ahmad Mirza Rizky Pramanda 4
Bella Ariska 4
Eko Wahyudi Setiawan 4 Network Infrastructure
Sigit Wijaya Pramono 4
Ahmad Ridwan 5
Bella Pertiwi 5 Network Attacks
Emilio Fajriyan 5
Siti Rosita 5
Aidil Fitri Yansya 6
Bramantio Rizki Nugroho 6 Protecting Network
Epriyadi 6
Windra Rezkia 6
Alan Prayoga 7
Catur Herdi Martin 7 Cryptography
Erma Novita Satyariza 7
Yogi Ogra Fratama 7
Amirul Mutakim 8
Dedy Kurniawan 8
Fahron 8 Security Monitoring
Yulmi hidayat 8
Angga Okvian 9
Deri Ansyah 9 Intrusion Data Analysis
Farhan Agung Famerdi 9
Yunisari Damayanti 9
Anggit Mardian 10
Dian Ariska Saputra 10 Incident Response handling
Frengki Suwito 10
Muhammad Alfath Islami 10
Hyoga Harakusuma 1
Martha Nadia 1 Windows Operating System
Novarlian 1
Riky 1
Kevin 2
Maulana Ramadhan 2
Orlando Dacosta 2 Linux Operating System
Robby Prabowo 2
Kgs. Rahmat Saleh 3
Muhamad Afif Tomi 3 Network Protocol and Service
Padli Januari 3
Romy Setiawan 3
Leni Andriani 4
Muhammad Ardiansyah 4
Pandito Dewa Putra 4 Network Infrastructure
Rouzan Fiqri Abdullah 4
Levi Alamandra Pratama 5
Muhammad Arinda Vebriandi 5 Network Attacks
Prandeo Regawa 5
Saras Dhilarofii Russandwi 5
Lisa Dwijayanti 6
Muhammad Daniel Apriansyah 6 Protecting Network
Pratikto Aditia Wiguna 6
Sherly Permata Sari 6
M Reyhan Fuadhi 7
Muhammad Fajar 7 Cryptography
Prayitno Fidiantoro 7
Ardian Marzah 7
Rop'iyansyah 8
Muhammad Redho Kurniawan 8
Ragil Zoliansyah 8 Security Monitoring
Reni Triasa 8
M S Hadi Prasetyo 9
Muhammad Wahyudi 9 Intrusion Data Analysis
Ramdani Agusman 9
Sarinah Agi Dia Savitri 9
M Indra Saputra 10
Nadya Lukita 10 Incident Response handling
Ricky Zulfika Candra 10
Ade Irani Sapitri 10

You might also like