{"id":4781,"date":"2014-10-13T03:38:52","date_gmt":"2014-10-13T03:38:52","guid":{"rendered":"http:\/\/demo.cactusthemes.com\/university2\/?page_id=7"},"modified":"2025-02-25T09:32:28","modified_gmt":"2025-02-25T02:32:28","slug":"school-faculty-of-informatics-information-technology","status":"publish","type":"page","link":"https:\/\/io.telkomuniversity.ac.id\/id\/school-faculty-of-informatics-information-technology\/","title":{"rendered":"Information Technology (Cybersecurity &amp; Digital Innovation)"},"content":{"rendered":"<div class=\"wp-block-stackable-image stk-block-image stk-block stk-10fdfc7\" data-block-id=\"10fdfc7\"><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-14109\" src=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-19-093054.jpg\" width=\"903\" height=\"452\" alt=\"Master Degree of Business Administration\" srcset=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-19-093054.jpg 903w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-19-093054-300x150.jpg 300w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-19-093054-150x75.jpg 150w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-19-093054-768x384.jpg 768w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-19-093054-255x128.jpg 255w\" sizes=\"auto, (max-width: 903px) 100vw, 903px\" \/><\/span><\/figure><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-b392fa5\" data-block-id=\"b392fa5\"><style>.stk-b392fa5 .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-b392fa5 .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text has-text-align-justify\"><span style=\"color: #000000;\" class=\"stk-highlight\">The Undergraduate Information Technology Study Program is a superior study program at Telkom University focusing on the realm of Cyber Security and Digital Innovation, with a Bachelor of Computer (S.Kom) degree and accredited as Superior by LAM INFOKOM and has received Provisionally Accredited IABEE status.<br><br>In this digital era, cyber attacks and digital innovation challenges are constantly evolving, requiring adaptive and advanced solutions. The industry needs professionals who not only understand the latest technology, but can also implement effective security strategies and disruptive innovations.<\/span><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-21fb037\" data-block-id=\"21fb037\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-21fb037-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-2fd7090\" data-v=\"4\" data-block-id=\"2fd7090\"><style>@media screen and (min-width: 768px){.stk-2fd7090 {flex:var(--stk-flex-grow, 1) 1 calc(60% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-2fd7090-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-2fd7090-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-adae775\" id=\"span-style-color-000000-class-stk-highlight-strong-why-choose-a-bachelor-of-information-technology-strong-span\" data-block-id=\"adae775\"><style>.stk-adae775 .stk-block-heading__text{font-size:18px !important;}@media screen and (max-width: 1023px){.stk-adae775 .stk-block-heading__text{font-size:18px !important;}}<\/style><h2 class=\"stk-block-heading__text\"><span style=\"color: #000000;\" class=\"stk-highlight\"><strong>Why Choose a Bachelor of Information Technology?<\/strong><\/span><\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-e91c749\" data-block-id=\"e91c749\"><style>.stk-e91c749 .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-e91c749 .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text has-text-align-justify\"><span style=\"color: #000000;\" class=\"stk-highlight\">The Undergraduate Information Technology Study Program focus on Cyber Security and Digital Innovation providing comprehensive education in the field of cyber security and digital innovation development. The curriculum is designed to hone students&#8217; analytical and technical skills, complemented by practicum and cooperation with industry, so that graduates are ready to face real challenges in the world of work.<br><br>Unlike other programs, this study program emphasizes interdisciplinary learning that combines cybersecurity and digital innovation in one curriculum. Students are not only trained to be security experts, but also innovators, with access to modern laboratories (16 Research Labs and 8 Practicum Labs) and full support from leading industry practitioners (Telkom Group, MNC Finance, Kemenkominfo, and others).<\/span><\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-35d31ad\" data-v=\"4\" data-block-id=\"35d31ad\"><style>@media screen and (min-width: 768px){.stk-35d31ad {flex:var(--stk-flex-grow, 1) 1 calc(40% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-35d31ad-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-35d31ad-inner-blocks\">\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-7ec56de\" data-block-id=\"7ec56de\"><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-7ec56de\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"\/><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-dacbda3\" data-block-id=\"dacbda3\"><style>.stk-dacbda3 .stk-block-icon-list-item__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-dacbda3 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\"><span style=\"color: #000000;\" class=\"stk-highlight\"><strong>Study Length<\/strong> :   4 Years (8 Semester)<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-d78635e\" data-block-id=\"d78635e\"><style>.stk-d78635e .stk-block-icon-list-item__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-d78635e .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\"><span style=\"color: #000000;\" class=\"stk-highlight\"><strong>Accreditation <\/strong>:   Excellent<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-3d41a5d\" data-block-id=\"3d41a5d\"><style>.stk-3d41a5d .stk-block-icon-list-item__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-3d41a5d .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\"><span style=\"color: #000000;\" class=\"stk-highlight\"><strong>Class<\/strong>               :   Regular Class<\/span><\/span><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-9113645 is-style-bar\" data-block-id=\"9113645\"><style>.stk-9113645 hr.stk-block-divider__hr{background:#b6252a !important;border-radius:calc(5px \/ 2) !important;height:5px !important;width:100% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<div class=\"wp-block-stackable-subtitle stk-block-subtitle stk-block stk-f609ecd\" data-block-id=\"f609ecd\"><style>.stk-f609ecd .stk-block-subtitle__text{font-size:24px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-f609ecd .stk-block-subtitle__text{font-size:24px !important;}}<\/style><p class=\"stk-block-subtitle__text stk-subtitle has-text-color has-text-align-center\"><strong>Graduate Profile<\/strong><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignwide stk-block-columns stk-block stk-c9c50d1\" data-block-id=\"c9c50d1\"><style>.stk-c9c50d1 {margin-bottom:35px !important;}.stk-c9c50d1-column{--stk-columns-spacing:8px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-c9c50d1-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-085e0cc\" data-v=\"4\" data-block-id=\"085e0cc\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-085e0cc-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-085e0cc-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-31331b6 is-style-default\" data-v=\"2\" data-block-id=\"31331b6\"><style>.stk-31331b6-container{box-shadow:0 0 0 2px #7878781a !important;}.stk-31331b6 .stk-block-card__image{height:170px !important;}.stk-31331b6 .stk-block-card__image img{object-position:52% 28.999999999999996% !important;}<\/style><div class=\"stk--no-padding stk-container stk-31331b6-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-13561\" src=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/08\/pexels-mikhail-nilov-7988079.jpg\" width=\"1024\" height=\"684\" alt=\"Industrial Engineering\" srcset=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/08\/pexels-mikhail-nilov-7988079.jpg 1024w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/08\/pexels-mikhail-nilov-7988079-300x200.jpg 300w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/08\/pexels-mikhail-nilov-7988079-150x100.jpg 150w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/08\/pexels-mikhail-nilov-7988079-768x513.jpg 768w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/08\/pexels-mikhail-nilov-7988079-255x170.jpg 255w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks has-text-align-center stk-31331b6-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-0dda1f2\" id=\"strong-span-style-color-000000-class-stk-highlight-cloud-computing-developer-span-strong\" data-block-id=\"0dda1f2\"><style>.stk-0dda1f2 .stk-block-heading__bottom-line{height:2px !important;width:190px !important;background-color:#000000 !important;margin-top:9px !important;margin-left:auto !important;margin-right:auto !important;}.stk-0dda1f2 .stk-block-heading__text{font-size:16px !important;font-family:\"Lato\", Sans-serif !important;}@media screen and (max-width: 1023px){.stk-0dda1f2 .stk-block-heading__text{font-size:16px !important;}}<\/style><h2 class=\"stk-block-heading__text\"><strong><span style=\"color: #000000;\" class=\"stk-highlight\">Cloud Computing Developer<\/span><\/strong><\/h2><div class=\"stk-block-heading__bottom-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-53af138\" data-block-id=\"53af138\"><style>.stk-53af138 .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-53af138 .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text has-text-align-center\"><span style=\"color: #000000;\" class=\"stk-highlight\">Design and develop cloud-based solutions to improve scalability, security and operational efficiency, using the latest cloud platforms to realize business and technology needs.<br><\/span><\/p><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-6850795\" data-v=\"4\" data-block-id=\"6850795\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-6850795-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-6850795-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-c1e4aef is-style-default\" data-v=\"2\" data-block-id=\"c1e4aef\"><style>.stk-c1e4aef .stk-block-card__image{height:170px !important;}.stk-c1e4aef .stk-block-card__image img{object-position:52% 41% !important;}<\/style><div class=\"stk--no-padding stk-container stk-c1e4aef-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-13479\" src=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/cybersecurity.jpg\" width=\"1024\" height=\"576\" alt=\"Informatics Study Program\" srcset=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/cybersecurity.jpg 1024w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/cybersecurity-300x169.jpg 300w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/cybersecurity-150x84.jpg 150w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/cybersecurity-768x432.jpg 768w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/cybersecurity-255x143.jpg 255w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-c1e4aef-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-bfb7156\" id=\"strong-span-style-color-000000-class-stk-highlight-strong-cyber-security-analyst-strong-span-strong\" data-block-id=\"bfb7156\"><style>.stk-bfb7156 .stk-block-heading__bottom-line{height:2px !important;width:170px !important;margin-top:9px !important;margin-left:auto !important;margin-right:auto !important;}.stk-bfb7156 .stk-block-heading__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-bfb7156 .stk-block-heading__text{font-size:16px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-align-center\"><strong><span style=\"color: #000000;\" class=\"stk-highlight\"><strong>Cyber Security Analyst<\/strong><\/span><\/strong><\/h2><div class=\"stk-block-heading__bottom-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-da693ad\" data-block-id=\"da693ad\"><style>.stk-da693ad .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-da693ad .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text has-text-align-center\"><span style=\"color: #000000;\" class=\"stk-highlight\">Analyze and respond to cybersecurity incidents, and perform digital forensics where required.<\/span><\/p><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-bf919bb\" data-v=\"4\" data-block-id=\"bf919bb\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-bf919bb-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-bf919bb-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-aaad25a is-style-default\" data-v=\"2\" data-block-id=\"aaad25a\"><style>.stk-aaad25a .stk-block-card__image{height:170px !important;}<\/style><div class=\"stk--no-padding stk-container stk-aaad25a-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-13485\" src=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3184465.jpg\" width=\"1024\" height=\"683\" srcset=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3184465.jpg 1024w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3184465-300x200.jpg 300w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3184465-150x100.jpg 150w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3184465-768x512.jpg 768w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3184465-255x170.jpg 255w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-aaad25a-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-f1ef4aa\" id=\"strong-span-style-color-000000-class-stk-highlight-strong-enterprise-architect-strong-span-strong\" data-block-id=\"f1ef4aa\"><style>.stk-f1ef4aa .stk-block-heading__bottom-line{height:2px !important;width:150px !important;margin-top:9px !important;margin-left:auto !important;margin-right:auto !important;}.stk-f1ef4aa .stk-block-heading__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-f1ef4aa .stk-block-heading__text{font-size:16px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-align-center\"><strong><span style=\"color: #000000;\" class=\"stk-highlight\"><strong>Enterprise Architect<\/strong><\/span><\/strong><\/h2><div class=\"stk-block-heading__bottom-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-f6832a1\" data-block-id=\"f6832a1\"><style>.stk-f6832a1 .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-f6832a1 .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text has-text-align-center\"><span style=\"color: #000000;\" class=\"stk-highlight\">Develop and manage the organization&#8217;s overall architecture to ensure that business processes, IT systems and technology are in line with the company&#8217;s vision and strategy.<\/span><\/p><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-a9f1e2c\" data-v=\"4\" data-block-id=\"a9f1e2c\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-a9f1e2c-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-a9f1e2c-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-2c928e0 is-style-default\" data-v=\"2\" data-block-id=\"2c928e0\"><style>.stk-2c928e0 .stk-block-card__image{height:170px !important;}<\/style><div class=\"stk--no-padding stk-container stk-2c928e0-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-13481\" src=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3183197.jpg\" width=\"1024\" height=\"683\" srcset=\"https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3183197.jpg 1024w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3183197-300x200.jpg 300w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3183197-150x100.jpg 150w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3183197-768x512.jpg 768w, https:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2024\/07\/pexels-fauxels-3183197-255x170.jpg 255w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-2c928e0-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-8e38761\" id=\"strong-span-style-color-000000-class-stk-highlight-it-planning-analyst-span-strong\" data-block-id=\"8e38761\"><style>.stk-8e38761 .stk-block-heading__bottom-line{height:2px !important;width:150px !important;margin-left:auto !important;margin-right:auto !important;}.stk-8e38761 .stk-block-heading__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-8e38761 .stk-block-heading__text{font-size:16px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-align-center\"><strong><span style=\"color: #000000;\" class=\"stk-highlight\">IT Planning Analyst<\/span><\/strong><\/h2><div class=\"stk-block-heading__bottom-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-d9108c2\" data-block-id=\"d9108c2\"><style>.stk-d9108c2 .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-d9108c2 .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text has-text-align-center\"><span style=\"color: #000000;\" class=\"stk-highlight\">Responsible for analyzing and developing IT strategic plans that support the organization&#8217;s business objectives, including resource allocation, implementation scheduling, and evaluation of new technologies.<\/span><\/p><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-30c3b25 is-style-bar\" data-block-id=\"30c3b25\"><style>.stk-30c3b25 hr.stk-block-divider__hr{background:#b6252a !important;border-radius:calc(5px \/ 2) !important;height:5px !important;width:100% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<div class=\"wp-block-stackable-subtitle stk-block-subtitle stk-block stk-65db521\" data-block-id=\"65db521\"><style>.stk-65db521 .stk-block-subtitle__text{font-size:24px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-65db521 .stk-block-subtitle__text{font-size:24px !important;}}<\/style><p class=\"stk-block-subtitle__text stk-subtitle has-text-color has-text-align-center\"><strong><span style=\"color: #000000;\" class=\"stk-highlight\">Vision<\/span><\/strong><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-d751e4c\" data-block-id=\"d751e4c\"><style>.stk-d751e4c .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-d751e4c .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text has-text-align-center\"><span style=\"color: #000000;\" class=\"stk-highlight\">To become an International Standard Study Program in 2028 in developing innovation and entrepreneurship in the field of Cybersecurity and Digital Innovation that promotes sustainable development goals.<\/span><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-subtitle stk-block-subtitle stk-block stk-efd52df\" data-block-id=\"efd52df\"><style>.stk-efd52df .stk-block-subtitle__text{font-size:24px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-efd52df .stk-block-subtitle__text{font-size:24px !important;}}<\/style><p class=\"stk-block-subtitle__text stk-subtitle has-text-color has-text-align-center\"><strong>Mission<\/strong><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-13fb0a3\" data-block-id=\"13fb0a3\"><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-13fb0a3\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"\/><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-4592324\" data-block-id=\"4592324\"><style>.stk-4592324 .stk-block-icon-list-item__text{font-size:16px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-4592324 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text has-text-color\"><span style=\"color: #000000;\" class=\"stk-highlight\">Organizing international quality higher education in accordance with competency standards in the field of Information Technology that focuses on the realm of Cybersecurity and Digital Innovation.<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-feecee3\" data-block-id=\"feecee3\"><style>.stk-feecee3 .stk-block-icon-list-item__text{font-size:16px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-feecee3 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text has-text-color\"><span style=\"color: #000000;\" class=\"stk-highlight\">Carrying out research in the context of developing science and technology in the field of Information Technology, especially in the realm of Cybersecurity and Digital Innovation which is beneficial for national development, and disseminating research results in the form of national and international publications.<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-48da804\" data-block-id=\"48da804\"><style>.stk-48da804 .stk-block-icon-list-item__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-48da804 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\"><span style=\"color: #000000;\" class=\"stk-highlight\">Organizing community service and professional communities by promoting sustainable development goals, especially in the realm of Cybersecurity and Digital Innovation.<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-c33ed01\" data-block-id=\"c33ed01\"><style>.stk-c33ed01 .stk-block-icon-list-item__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-c33ed01 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\"><span style=\"color: #000000;\" class=\"stk-highlight\">Collaborate with industry, government, and alumni in order to develop Information Technology-based innovation or entrepreneurship that benefits humanity.<\/span><\/span><\/div><\/li>\n<\/ul><\/div>\n\n\n\n<div class=\"wp-block-stackable-subtitle stk-block-subtitle stk-block stk-ec742ef\" data-block-id=\"ec742ef\"><style>.stk-ec742ef .stk-block-subtitle__text{font-size:24px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-ec742ef .stk-block-subtitle__text{font-size:24px !important;}}<\/style><p class=\"stk-block-subtitle__text stk-subtitle has-text-color has-text-align-center\"><strong>Purpose<\/strong><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-2053508\" data-block-id=\"2053508\"><style>.stk-2053508 {margin-bottom:65px !important;}<\/style><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-2053508\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"\/><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-5978cc5\" data-block-id=\"5978cc5\"><style>.stk-5978cc5 .stk-block-icon-list-item__text{font-size:16px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-5978cc5 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text has-text-color\"><span style=\"color: #000000;\" class=\"stk-highlight\">Organizing international quality higher education in accordance with competency standards in the field of Information Technology that focuses on the realm of Cybersecurity and Digital Innovation.<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-7b35aca\" data-block-id=\"7b35aca\"><style>.stk-7b35aca .stk-block-icon-list-item__text{font-size:16px !important;color:#000000 !important;}@media screen and (max-width: 1023px){.stk-7b35aca .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text has-text-color\"><span style=\"color: #000000;\" class=\"stk-highlight\">Carrying out research in the context of developing science and technology in the field of Information Technology, especially in the realm of Cybersecurity and Digital Innovation which is beneficial for national development, and disseminating research results in the form of national and international publications.<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-80c5579\" data-block-id=\"80c5579\"><style>.stk-80c5579 .stk-block-icon-list-item__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-80c5579 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\"><span style=\"color: #000000;\" class=\"stk-highlight\">Organizing community service and sustainable professional communities by promoting sustainable development goals, especially in the realm of Cybersecurity and Digital Innovation.<\/span><\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-eb59572\" data-block-id=\"eb59572\"><style>.stk-eb59572 .stk-block-icon-list-item__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-eb59572 .stk-block-icon-list-item__text{font-size:16px !important;}}<\/style><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\"><span style=\"color: #000000;\" class=\"stk-highlight\">Collaborating with industry, government, and alumni in order to develop Information Technology-based entrepreneurship that benefits the community.<\/span><\/span><\/div><\/li>\n<\/ul><\/div>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-edb2972\" data-block-id=\"edb2972\"><style>.stk-edb2972 hr.stk-block-divider__hr{background:#e0353b !important;height:4px !important;width:100% !important;}.stk-edb2972 {margin-bottom:45px !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-677484d\" data-block-id=\"677484d\"><style>.stk-677484d .stk-block-text__text{font-size:16px !important;}@media screen and (max-width: 1023px){.stk-677484d .stk-block-text__text{font-size:16px !important;}}<\/style><p class=\"stk-block-text__text\"><span style=\"color: #000000;\" class=\"stk-highlight\">For more information: <a href=\"https:\/\/bit.telkomuniversity.ac.id\/\">HERE<\/a><\/span><\/p><\/div>\n\n\n<p><a href=\"https:\/\/io.telkomuniversity.ac.id\/id\/registration\/\" target=\"_blank\" rel=\"noopener\">How to apply\u00a0please click\u00a0<span style=\"text-decoration: underline; color: #ff0000;\">here!<\/span><\/a><\/p>\n<p><a href=\"https:\/\/io.telkomuniversity.ac.id\/id\/admission\/\" target=\"_blank\" rel=\"attachment noopener wp-att-131\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-131 size-full\" src=\"http:\/\/io.telkomuniversity.ac.id\/wp-content\/uploads\/2014\/11\/reg.jpg\" alt=\"reg\" width=\"258\" height=\"196\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>The Undergraduate Information Technology Study Program is a superior study program at Telkom University focusing on the realm of Cyber Security and Digital Innovation, with a Bachelor of Computer (S.Kom) degree and accredited as Superior by LAM INFOKOM and has received Provisionally Accredited IABEE status. In this digital era, cyber attacks and digital innovation challenges [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4781","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/pages\/4781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/comments?post=4781"}],"version-history":[{"count":10,"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/pages\/4781\/revisions"}],"predecessor-version":[{"id":14561,"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/pages\/4781\/revisions\/14561"}],"wp:attachment":[{"href":"https:\/\/io.telkomuniversity.ac.id\/id\/wp-json\/wp\/v2\/media?parent=4781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}