LearnFromHome90% OFF
DCSC-v1 CERTIFICATION


ACTIVE SELF-ALGORITHM FIREWALL BY PT DAVID SISTEM GROUP



SYLLABUS CODE : CLV1 - S6FDSG
LAST MODIFIED JUNE 07, 2020.
Material files that contain the basic foundations of cyber security, such as the implementation of mathematical logic, the role of programming languages in cyber security implementation, introduction of operating systems and unix syntax, software and hardware, understanding and awareness of potential cyber attacks.

• CLV1 - S6FDSG - Part 01   (?? : ??)
• CLV1 - S6FDSG - Part 02   (?? : ??)
• CLV1 - S6FDSG - Part 03   (?? : ??)
• CLV1 - S6FDSG - Part 04   (?? : ??)
• CLV1 - S6FDSG - Part 05   (?? : ??)
• CLV1 - S6FDSG - Part 06   (?? : ??)
• CLV1 - S6FDSG - Part 07   (?? : ??)
• CLV1 - S6FDSG - Part 08   (?? : ??)
• CLV1 - S6FDSG - Part 09   (?? : ??)
• CLV1 - S6FDSG - Part 10   (?? : ??)



SYLLABUS CODE : CLV1 - S7FDSG
LAST MODIFIED JUNE 07, 2020.
File material that discusses cyber threats that are still active in 2020, such as ransomware, web-based exploits, exploits in wireless transmissions, system manipulation, and several other types of exploitation.

• CLV1 - S7FDSG - Part 01   (?? : ??)
• CLV1 - S7FDSG - Part 02   (?? : ??)
• CLV1 - S7FDSG - Part 03   (?? : ??)
• CLV1 - S7FDSG - Part 04   (?? : ??)
• CLV1 - S7FDSG - Part 05   (?? : ??)
• CLV1 - S7FDSG - Part 06   (?? : ??)
• CLV1 - S7FDSG - Part 07   (?? : ??)
• CLV1 - S7FDSG - Part 08   (?? : ??)
• CLV1 - S7FDSG - Part 09   (?? : ??)
• CLV1 - S7FDSG - Part 10   (?? : ??)



SYLLABUS CODE : CLV1 - S8FDSG
LAST MODIFIED JUNE 07, 2020.
File material that discusses the deepweb server configuration, such as how to create a deepweb server, get an .onion link, deepweb server migration by maintaining the .onion url, security inspection and closing process, deepweb database connectivity, deepweb server optimization, reflection with real domains, etc.

• CLV1 - S8FDSG - Part 01   (?? : ??)
• CLV1 - S8FDSG - Part 02   (?? : ??)
• CLV1 - S8FDSG - Part 03   (?? : ??)
• CLV1 - S8FDSG - Part 04   (?? : ??)
• CLV1 - S8FDSG - Part 05   (?? : ??)
• CLV1 - S8FDSG - Part 06   (?? : ??)
• CLV1 - S8FDSG - Part 07   (?? : ??)
• CLV1 - S8FDSG - Part 08   (?? : ??)
• CLV1 - S8FDSG - Part 09   (?? : ??)
• CLV1 - S8FDSG - Part 10   (?? : ??)



SYLLABUS CODE : CLV1 - S9FDSG
LAST MODIFIED JUNE 07, 2020.
The material file contains how to respond to cyber threats and the mitigation process for data protection.

• CLV1 - S9FDSG - Part 01   (?? : ??)
• CLV1 - S9FDSG - Part 02   (?? : ??)
• CLV1 - S9FDSG - Part 03   (?? : ??)
• CLV1 - S9FDSG - Part 04   (?? : ??)
• CLV1 - S9FDSG - Part 05   (?? : ??)
• CLV1 - S9FDSG - Part 06   (?? : ??)
• CLV1 - S9FDSG - Part 07   (?? : ??)
• CLV1 - S9FDSG - Part 08   (?? : ??)
• CLV1 - S9FDSG - Part 09   (?? : ??)
• CLV1 - S9FDSG - Part 10   (?? : ??)

    1. Use of Windows 10 & Debian 10 Operating System in cyber security implementation.
    2. Introduction of Tunneling protocol and functions of the system.
    3. Use of tools & scripts in several sectors.
    4. An early introduction to the importance of cryptography to maximize digital security.
    5. An early introduction to the wireless transmission area.
    6. The importance of PHP, HTML, CSS, & Javascript in the penetration testing field.
    7. The role of mathematical logic in the cyber security area.
    8. An early introduction of structure of the Web and Applications.
    9. An early introduction of network systemization.
    10. The vital role of the deepweb system in cyber security.
    11. Potential of Cyber Security Specialists in the Industry 4.0.
    12. Importance of Virtual Server & Public IPv4 / IPv6 for automation and centralization.
    13. Increased awareness of cyber threats.
    14. The role of Domain, Subdomain, .Onion, & Dynamic DNS on cyber security activities.

    1. XML External Entities (XXE) Exploitation.
    2. 2.4 GHz & 5.8 GHz wireless transmission exploitation.
    3. Bluetooth and BLE Exploitation.
    4. Ransomware Distribution.
    5. Distributed Denial of Service (DDoS).
    6. Dynamic Cross Site Scripting (XSS).
    7. HTML, CSS, & Javascript Injection.
    8. Database explotation in real domain & deepweb.
    9. Applications exploitation that are used as espionage.
    10. Man in the Middle Attack.
    11. Social Engineering Impersonation.
    12. Deep Information Gathering.
    13. Cross Site Request Forgery (CSRF) Exploitation.
    14. Web cookie Exploitation.

    1. Understanding of the dependencies that needed on the deepweb server.
    2. Get an .onion link (deepweb link).
    3. Selection of a web server such as apache2 or nginx on the deepweb server.
    4. MariaDB implementation on the deepweb server.
    5. PHP7 implementation on the deepweb server.
    6. Security configuration on the deepweb server.
    7. Reflection on a deepweb site with a real domain.
    8. Configuration of .onion links based on v1, v2, & v3.
    9. Deepweb server migration process.
    10. Virtual Host configuration on the deepweb server.
    11. Accessing deepweb site with Chrome & Mozilla.

    1. Dynamic Cross Site Scripting Protection.
    2. Database Exploitation Protection.
    3. Distributed Denial of Service Protection.
    4. Ransomware Protection.
    5. HTML, CSS & Javascript Injection Protection.
    6. Man in the Middle Attack Protection.
    7. Cross Site Request Forgery Protection.
    8. Web-based Cookie Protection.
    9. Wireless Transmission Protection (hardware & software / firmware).
    10. XML External Entities Protection.






    1. Students who are in line with computer science, such as Informatics Engineering, Information Systems, Computer Engineering, and other linear majors.
    2. Vocational students who majored in Computer Science & Networking
    3. High school students who will plan to take a computer science major when entering college
    4. IT employees who have worked in companies or governments
    5. Lecturer of Higher Education who wants to add insight
    6. IT TEAM that works on startup business
    7. People who have an interest in IT development, and want to take the first steps to start a career in the area of IT & cyber security.
    8. People who want to work at PT David Sistem Group as a Deep Inspection Tester

    1. After you register, you will be given a VPN Proxy to be able to access the Materials and Labs that have been provided
    2. You are given 2 months to study the lab modules, virtual labs & interactive videos provided
    3. If during the 2 month learning process, you have questions related to the class material you are taking, we also provide Internal Forum & Customer Support to help you understand faster.
    4. There will be some Case Study & Lab exercise to analyze your progress
    5. After completing the learning process for 2 months, there will be a final exam or certification for 30 hours. Exams are Real Time Practical and the determination of the final exam schedule will be informed to participants
    6. The graduation cut-off value is 70% of the total lab given, and if participants have points above 70% will get a certificate from PT David Sistem Group and will be sent to your location (free).
    7. All participant information that has passed, such as Certificate Numbers & Cert Holders, will be stored in the PT David Sistem Group database. The status you hold after passing the final exam is DCSC-v1, for example: John Doe, DCSC-v1.
    1. You can register on the davidgroup.co.id main page or with a valid affiliate link.
    2. You will be given a notification both via SMS and email, if we have verified your registration form.
    3. If for 1 hour, you have not received a notification, please immediately contact our Customer Support.
    4. After you receive a notification via SMS & Email, you can make payment according to the instructions below:
    5. Please keep the payment receipt
    6. If we have received your payment, you will immediately receive some information data for online class needs through email.
    1. PT David Sistem embed Cheat Detector Analytics in all cyber online classes, to keep the cyber class & DCSC Certification credible.
    2. Some forms of Cheat Actions that will be unilaterally BAN are: distribution of Module Labs & Video Labs, Multi-users to one participant account, distribution of DCSC final exam and some forms of similar actions that direct inflict to other participants and the company.
    3. Cheat Detector Analytics Software works automatically and transparently (seamless).