{"id":17622,"date":"2025-10-09T08:55:28","date_gmt":"2025-10-09T01:55:28","guid":{"rendered":"https:\/\/icao.telkomuniversity.ac.id\/?page_id=17622"},"modified":"2025-10-09T10:19:56","modified_gmt":"2025-10-09T03:19:56","slug":"information-technology","status":"publish","type":"page","link":"https:\/\/icao.telkomuniversity.ac.id\/en\/information-technology\/","title":{"rendered":"Information Technology"},"content":{"rendered":"\n\n\n<p><p><strong><img data-recalc-dims=\"1\" decoding=\"async\" width=\"900\" height=\"727\" class=\"aligncenter wp-image-16028 size-large lazyload\" data-src=\"https:\/\/i0.wp.com\/icao.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/10\/Banner-Technology-Information-1.png?resize=900%2C727&#038;ssl=1\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 900px; --smush-placeholder-aspect-ratio: 900\/727;\"><\/strong><\/p> <\/p>\n\n\n\n<div style=\"height:65px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">PROFILE<\/h2>\n\n\n\n<p><p><strong>The Bachelor of Information Technology program at Telkom University is a distinguished program that focuses on Cyber Security and Digital Innovation. The program awards the Bachelor of Computer Science (S.Kom) degree, is accredited \u201cExcellent\u201d by LAM INFOKOM, and has also achieved Provisionally Accredited status from IABEE.\u202f\u202f<\/strong>\u00a0<\/p><\/p>\n\n\n\n<p><strong>\u202fThe program has a vision: toward an internationally recognized study program by 2028 that fosters innovation and entrepreneurship in the fields of Cybersecurity and Digital Innovation, emphasizing the achievement of the Sustainable Development Goals (SDGs). There are some missions the program has that are:\u202f<\/strong>&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>&nbsp;Organizing higher education with international quality standards according to the competency standards in the field of Information Technology, focusing on Cybersecurity and Digital Innovation;\u202f\u202f<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>&nbsp;Carrying out research to develop science and technology in the field of Information Technology, particularly in Cybersecurity and Digital Innovation, which contributes to national development and is disseminated through national and international publications;\u202f\u202f<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>&nbsp;Providing community and professional services that promote the Sustainable Development Goals (SDGs), especially in the areas of Cybersecurity and Digital Innovation;\u202f\u202f<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>&nbsp;Collaborating with industry, government, and alumni to foster innovation and entrepreneurship based on Information Technology for the benefit of humanity.\u202f<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Graduate Profiles of Informatics\u202f\u202f<\/strong>&nbsp;<\/td><td><strong>Descriptions\u202f<\/strong>&nbsp;<\/td><\/tr><tr><td><strong>Professional in Information Technolgy Area.\u202f<\/strong>&nbsp;<\/td><td>Professionals who work as <strong>independent freelancers<\/strong>, ready to be hired at any time for <strong>project-based or program-based work<\/strong>, specializing in <strong>Information Technology<\/strong> fields such as <strong>continuous integration<\/strong>, <strong>trade-off analysis<\/strong>, <strong>interface issues<\/strong>, <strong>impact analysis of system development and operation<\/strong>, <strong>Cybersecurity<\/strong>, and the <strong>Internet of Things (IoT)<\/strong>.<\/td><\/tr><tr><td>Freelancer in Information Technology Area<\/td><td>Professionals who work as <strong>independent freelancers<\/strong>, ready to be hired at any time for <strong>project-based or program-based work<\/strong>, specializing in <strong>Information Technology<\/strong> fields such as <strong>continuous integration<\/strong>, <strong>trade-off analysis<\/strong>, <strong>interface issues<\/strong>, <strong>impact analysis of system development and operation<\/strong>, <strong>Cybersecurity<\/strong>, and the <strong>Internet of Things (IoT)<\/strong>.<\/td><\/tr><tr><td><strong>Entrepreneurs in <strong>Information Technolgy<\/strong><\/strong> <strong>Area\u202f<\/strong>&nbsp;<\/td><td>Entrepreneurs in the field of <strong>Information Technology<\/strong> who apply their creativity and innovation to build independent businesses or create job opportunities for others in <strong>IT-based ventures<\/strong>, particularly in <strong>Cybersecurity<\/strong> and the <strong>Internet of Things (IoT)<\/strong>, as well as working as <strong>IT Consultants<\/strong>.<\/td><\/tr><tr><td><strong>Academics in <strong>Information Technolgy<\/strong><\/strong> <strong>Area\u202f<\/strong>&nbsp;<\/td><td>Academics in the field of <strong>Information Technology<\/strong> who focus on becoming <strong>lecturers, researchers, or laboratory staff<\/strong> in higher education institutions and research organizations, specializing in areas related to <strong>Cybersecurity<\/strong> and the <strong>Internet of Things (IoT)<\/strong>.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">CURRICULUM<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK1AAB3 Mathematical Logic<\/td><td>3<\/td><td>1<\/td><\/tr><tr><td>CBK1BAB4 Computational Thinking &amp; Introduction to<br>Programming<\/td><td>4<\/td><td>1<\/td><\/tr><tr><td>CBK1CAB3 Calculus<\/td><td>3<\/td><td>1<\/td><\/tr><tr><td>CBK1DAB2 Intrduction to Information Technology<\/td><td>2<\/td><td>1<\/td><\/tr><tr><td>UBKXBCB2 Pancasila Education<\/td><td>2<\/td><td>1<\/td><\/tr><tr><td>UBKXCCB2 Indonesian Language<\/td><td>2<\/td><td>1<\/td><\/tr><tr><td>CBK1EAB3 Character Education<\/td><td>3<\/td><td>1<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK1FAB3 Statistics and Data Analytics<\/td><td>3<\/td><td>2<\/td><\/tr><tr><td>CBK1GAB3 Linear Algebra and Matrices<\/td><td>3<\/td><td>2<\/td><\/tr><tr><td>CBK1HAB4 Programming Algorithm<\/td><td>4<\/td><td>2<\/td><\/tr><tr><td>CBK1IAB3 Discrete Mathematics<\/td><td>3<\/td><td>2<\/td><\/tr><tr><td>UCKXADB2 English 1<\/td><td>2<\/td><td>2<\/td><\/tr><tr><td>CBK1JAB2 Information Technology Maintenance and<br>Administration<\/td><td>2<\/td><td>2<\/td><\/tr><tr><td>UAKXxCB2 Religion<\/td><td>2<\/td><td>2<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK2AAB2 Probability Theory<\/td><td>2<\/td><td>3<\/td><\/tr><tr><td>CBK2BAB4 Data Structure<\/td><td>4<\/td><td>3<\/td><\/tr><tr><td>CBK2CAB3 Multimedia System<\/td><td>3<\/td><td>3<\/td><\/tr><tr><td>CBK2DAB3 Management of Information Technology<br>Services<\/td><td>3<\/td><td>3<\/td><\/tr><tr><td>CBK2EAB3 Computer Organization and Architecture<\/td><td>3<\/td><td>3<\/td><\/tr><tr><td>CBK2FAB3 Information Technology Professionality<\/td><td>3<\/td><td>3<\/td><\/tr><tr><td>CBK2GAB2 ICT Global Insight<\/td><td>2<\/td><td>3<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK2HAB4 Computer Network<\/td><td>4<\/td><td>4<\/td><\/tr><tr><td>CBK2IAB3 Human and Computer Interaction            <\/td><td>3<\/td><td>4<\/td><\/tr><tr><td>UCKXBDB2 Entrepreneurship<\/td><td>2<\/td><td>4<\/td><\/tr><tr><td>CBK2JAB3 Operating System<\/td><td>3<\/td><td>4<\/td><\/tr><tr><td>CBK2KAB3 Artificial Intelligence<\/td><td>3<\/td><td>4<\/td><\/tr><tr><td>CBK2LAB4 Database Management System<\/td><td>4<\/td><td>4<\/td><\/tr><tr><td>CBK2MAB1 Information Technology for the<br>Communities<\/td><td>1<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:38px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK3AAB3 Advanced Database<\/td><td>3<\/td><td>5<\/td><\/tr><tr><td>CBK3BAB3 Project Management<\/td><td>3<\/td><td>5<\/td><\/tr><tr><td>CBK3CAB4 Object Oriented Programming                <\/td><td>4<\/td><td>5<\/td><\/tr><tr><td>CBK3DAB3 Web Programming<\/td><td>3<\/td><td>5<\/td><\/tr><tr><td>CBK3EAB3 Platform &amp; IoT Programming<\/td><td>3<\/td><td>5<\/td><\/tr><tr><td>CBK3FAB3 Software Engineering<\/td><td>3<\/td><td>5<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK3GAB3 Mobile Application<\/td><td>3<\/td><td>6<\/td><\/tr><tr><td>CBK3HAB3 Cloud Computing and Virtualisation <\/td><td>3<\/td><td>6<\/td><\/tr><tr><td>CBK3IAB3 System Integration Architecture<\/td><td>3<\/td><td>6<\/td><\/tr><tr><td>UBKXACB2 Civic Education<\/td><td>2<\/td><td>6<\/td><\/tr><tr><td>CBK3KAB3 Project Management<\/td><td>3<\/td><td>6<\/td><\/tr><tr><td>CBK3LAB3 Penetration Testing and Ethical Hacking  <\/td><td>3<\/td><td>6<\/td><\/tr><tr><td>CBK3MAB2 Research Methodology and Scientific Writing<\/td><td>2<\/td><td>6<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK4AAA2 Proposal Writing<\/td><td>2<\/td><td>7<\/td><\/tr><tr><td>CBK4BAB3 Co-op<\/td><td>3<\/td><td>7<\/td><\/tr><tr><td>CBK4AAC3 Project Information Technology<\/td><td>3<\/td><td>7<\/td><\/tr><tr><td>CBK4xBB3 Compulsory Elective I<\/td><td>3<\/td><td>7<\/td><\/tr><tr><td>CBK4xBB3 Compulsory Elective II<\/td><td>3<\/td><td>7<\/td><\/tr><tr><td>CBK4CAB2 English II<\/td><td>2<\/td><td>7<\/td><\/tr><tr><td>CBK4xBB3 Elective I<\/td><td>3<\/td><td>7<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:38px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Course<\/strong><\/td><td><strong>Credits<\/strong><\/td><td><strong>Semester<\/strong><\/td><\/tr><tr><td>CBK4BAA4 Final Project<\/td><td>4<\/td><td>8<\/td><\/tr><tr><td>CBK4xBB3 Elective I<\/td><td>3<\/td><td>8<\/td><\/tr><tr><td>CBK4xBB3 Elective II<\/td><td>3<\/td><td>8<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:63px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">For more information please <a href=\"https:\/\/bit.telkomuniversity.ac.id\/\" data-type=\"URL\" data-id=\"https:\/\/bif.telkomuniversity.ac.id\/\">click here.<\/a><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>PROFILE The Bachelor of Information Technology program at Telkom University is a distinguished program that focuses on Cyber Security and Digital Innovation. The program awards the Bachelor of Computer Science (S.Kom) degree, is accredited \u201cExcellent\u201d by LAM INFOKOM, and has also achieved Provisionally Accredited status from IABEE.\u202f\u202f\u00a0 \u202fThe program has a vision: toward an internationally [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"class_list":["post-17622","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/17622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/comments?post=17622"}],"version-history":[{"count":12,"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/17622\/revisions"}],"predecessor-version":[{"id":17647,"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/17622\/revisions\/17647"}],"wp:attachment":[{"href":"https:\/\/icao.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media?parent=17622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}