{"id":3752,"date":"2025-03-14T05:44:43","date_gmt":"2025-03-13T22:44:43","guid":{"rendered":"https:\/\/www.linuxid.net\/istilah\/?p=3752"},"modified":"2025-03-14T05:44:43","modified_gmt":"2025-03-13T22:44:43","slug":"international-information-systems-security-certification-consortium-isc2","status":"publish","type":"post","link":"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/","title":{"rendered":"International Information Systems Security Certification Consortium (ISC)2"},"content":{"rendered":"<h2>Apa Itu (ISC)2?<\/h2>\n<p>(ISC)2, atau International Information Systems Security Certification Consortium, adalah organisasi nirlaba yang menyediakan pelatihan dan sertifikasi keamanan.<\/p>\n<p>Organisasi ini dibentuk pada tahun 1988 oleh sejumlah organisasi keamanan yang ingin menciptakan program sertifikasi standar dan netral dari vendor untuk mengukur kompetensi profesional keamanan. Secara resmi, (ISC)<sup>2<\/sup> didirikan pada tahun 1989.<\/p>\n<h2>Apa Saja Sertifikasi yang Ditawarkan oleh (ISC)2?<\/h2>\n<p>Sertifikasi paling terkenal dari (ISC)2 adalah Certified Information Systems Security Professional (<a href=\"https:\/\/www.linuxid.net\/istilah\/Certified-Information-Systems-Security-Professional\/\">CISSP<\/a>). Sertifikasi ini sering dianggap sebagai <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/quiz\/Quiz-CISSP-practice-exam-questions-and-answers\/\">standar emas dalam sertifikasi keamanan<\/a>. Selain itu, ada juga tiga konsentrasi CISSP yang lebih spesifik:<\/p>\n<ul>\n<li>CISSP-ISSAP (Information Systems Security Architecture Professional)<\/li>\n<li>CISSP-ISSEP (Information Systems Security Engineering Professional)<\/li>\n<li>CISSP-ISSMP (Information Systems Security Management Professional)<\/li>\n<\/ul>\n<p>Selain CISSP, (ISC)<sup>2<\/sup> juga menawarkan beberapa sertifikasi lain, seperti:<\/p>\n<ul>\n<li>Systems Security Certified Practitioner (SSCP)<\/li>\n<li>Certified Authorization Professional (CAP)<\/li>\n<li>Certified Secure Software Lifecycle Professional (<a href=\"https:\/\/www.linuxid.net\/istilah\/CSSLP-certified-secure-software-lifecycle-professional\/\">CSSLP<\/a>)<\/li>\n<li>HealthCare Information Security and Privacy Practitioner (<a href=\"https:\/\/www.techtarget.com\/searchhealthit\/quiz\/Get-started-on-your-HCISPP-training-with-this-practice-quiz\/\">HCISPP<\/a>)<\/li>\n<\/ul>\n<h2>Bagaimana Proses Sertifikasinya?<\/h2>\n<p>Untuk mendapatkan sertifikasi dari (ISC)<sup>2<\/sup>, kandidat harus lulus ujian yang cukup ketat. Semua ujian ini dilakukan secara langsung melalui Pearson VUE di berbagai pusat ujian di seluruh dunia. Durasi ujian bervariasi, misalnya:<\/p>\n<ul>\n<li>CISSP: 6 jam<\/li>\n<li>SSCP: 4 jam<\/li>\n<li>CSSLP: 3 jam<\/li>\n<\/ul>\n<p>Kebanyakan soal ujian berbentuk pilihan ganda. (ISC)<sup>2<\/sup> merekomendasikan calon peserta mengikuti pelatihan resmi yang disediakan oleh penyedia pelatihan resmi (ISC)<sup>2<\/sup>, baik secara online, langsung di kelas, atau melalui pelatihan privat dengan instruktur.<\/p>\n<h2>Keanggotaan (ISC)2<\/h2>\n<p>Setiap orang yang berhasil mendapatkan sertifikasi (ISC)<sup>2<\/sup> otomatis menjadi anggota organisasi ini. Para anggota biasanya adalah profesional keamanan informasi di berbagai perusahaan dengan jabatan seperti:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/CSO-Chief-Security-Officer\/\">Chief Security Officer (CSO)<\/a><\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/Chief-Technology-Officer-CTO\/\">Chief Technology Officer (CTO)<\/a><\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/CIO\/\">Chief Information Officer (CIO)<\/a><\/li>\n<li>Security Manager<\/li>\n<li>Systems Engineer<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/systems-integrator\/\">Systems Integrator<\/a><\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/chief-risk-officer-CRO\/\">Chief Risk Officer (CRO)<\/a><\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/system-administrator\/\">Systems Administrator<\/a><\/li>\n<li>Network Administrator<\/li>\n<\/ul>\n<p>Semua anggota harus mematuhi <b>Kode Etik (ISC)\u00b2<\/b>. Jika ada yang melanggar, baik sengaja maupun tidak, mereka bisa dikenakan proses tinjauan oleh rekan sejawat dan bahkan berisiko kehilangan sertifikasi mereka.<\/p>\n<h2>Konferensi (ISC)2 Security Congress<\/h2>\n<p>Pada tahun 2011, (ISC)<sup>2<\/sup> mulai mengadakan acara tahunan bernama <a href=\"https:\/\/congress.isc2.org\/\" target=\"_blank\" rel=\"noopener\/\">(ISC)2 Security Congress<\/a>. Dalam konferensi ini, peserta bisa mengikuti seminar edukatif tentang tren keamanan terbaru, praktik terbaik, dan tantangan yang dihadapi oleh para pemimpin keamanan. Setiap tahun, acara ini diadakan di kota yang berbeda.<\/p>\n<p>Beberapa organisasi lain yang juga menawarkan sertifikasi keamanan kompetitif meliputi SANS Institute, ISACA, dan CompTIA.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apa Itu (ISC)2? (ISC)2, atau International Information Systems Security Certification Consortium, adalah organisasi nirlaba yang menyediakan pelatihan dan sertifikasi keamanan. Organisasi ini dibentuk pada tahun 1988 oleh sejumlah organisasi keamanan yang ingin menciptakan program sertifikasi standar dan netral dari vendor untuk mengukur kompetensi profesional keamanan. Secara resmi, (ISC)2 didirikan pada tahun 1989. Apa Saja Sertifikasi [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[236],"tags":[95],"class_list":["post-3752","post","type-post","status-publish","format-standard","hentry","category-it-management","tag-careers-and-certifications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apa itu International Information Systems Security Certification Consortium (ISC)2? - Istilah Komputer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apa itu International Information Systems Security Certification Consortium (ISC)2? - Istilah Komputer\" \/>\n<meta property=\"og:description\" content=\"Apa Itu (ISC)2? (ISC)2, atau International Information Systems Security Certification Consortium, adalah organisasi nirlaba yang menyediakan pelatihan dan sertifikasi keamanan. Organisasi ini dibentuk pada tahun 1988 oleh sejumlah organisasi keamanan yang ingin menciptakan program sertifikasi standar dan netral dari vendor untuk mengukur kompetensi profesional keamanan. Secara resmi, (ISC)2 didirikan pada tahun 1989. Apa Saja Sertifikasi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/\" \/>\n<meta property=\"og:site_name\" content=\"Istilah Komputer\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-13T22:44:43+00:00\" \/>\n<meta name=\"author\" content=\"adhit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"adhit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/\",\"url\":\"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/\",\"name\":\"Apa itu International Information Systems Security Certification Consortium (ISC)2? - Istilah Komputer\",\"isPartOf\":{\"@id\":\"https:\/\/linuxid.net\/istilah\/#website\"},\"datePublished\":\"2025-03-13T22:44:43+00:00\",\"author\":{\"@id\":\"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/linuxid.net\/istilah\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"International Information Systems Security Certification Consortium (ISC)2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/linuxid.net\/istilah\/#website\",\"url\":\"https:\/\/linuxid.net\/istilah\/\",\"name\":\"Istilah Komputer\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/linuxid.net\/istilah\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d\",\"name\":\"adhit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1778403130\",\"contentUrl\":\"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1778403130\",\"caption\":\"adhit\"},\"sameAs\":[\"https:\/\/linuxid.net\/istilah\"],\"url\":\"https:\/\/www.linuxid.net\/istilah\/author\/xsandradietsax\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apa itu International Information Systems Security Certification Consortium (ISC)2? - Istilah Komputer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/","og_locale":"id_ID","og_type":"article","og_title":"Apa itu International Information Systems Security Certification Consortium (ISC)2? - Istilah Komputer","og_description":"Apa Itu (ISC)2? (ISC)2, atau International Information Systems Security Certification Consortium, adalah organisasi nirlaba yang menyediakan pelatihan dan sertifikasi keamanan. Organisasi ini dibentuk pada tahun 1988 oleh sejumlah organisasi keamanan yang ingin menciptakan program sertifikasi standar dan netral dari vendor untuk mengukur kompetensi profesional keamanan. Secara resmi, (ISC)2 didirikan pada tahun 1989. Apa Saja Sertifikasi [&hellip;]","og_url":"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/","og_site_name":"Istilah Komputer","article_published_time":"2025-03-13T22:44:43+00:00","author":"adhit","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"adhit","Estimasi waktu membaca":"2 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/","url":"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/","name":"Apa itu International Information Systems Security Certification Consortium (ISC)2? - Istilah Komputer","isPartOf":{"@id":"https:\/\/linuxid.net\/istilah\/#website"},"datePublished":"2025-03-13T22:44:43+00:00","author":{"@id":"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d"},"breadcrumb":{"@id":"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.linuxid.net\/istilah\/international-information-systems-security-certification-consortium-isc2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/linuxid.net\/istilah\/"},{"@type":"ListItem","position":2,"name":"International Information Systems Security Certification Consortium (ISC)2"}]},{"@type":"WebSite","@id":"https:\/\/linuxid.net\/istilah\/#website","url":"https:\/\/linuxid.net\/istilah\/","name":"Istilah Komputer","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/linuxid.net\/istilah\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d","name":"adhit","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/image\/","url":"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1778403130","contentUrl":"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1778403130","caption":"adhit"},"sameAs":["https:\/\/linuxid.net\/istilah"],"url":"https:\/\/www.linuxid.net\/istilah\/author\/xsandradietsax\/"}]}},"_links":{"self":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/posts\/3752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/comments?post=3752"}],"version-history":[{"count":0,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/posts\/3752\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/media?parent=3752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/categories?post=3752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/tags?post=3752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}