this research. We would also like to thank the
reviewers for their valuable input, which has
improved the quality of this paper.
REFERENCES
Adolph, R. M. (2009). Instructional design: The ADDIE
approach. Springer. https://doi.org/10.1007/978-0-387-
09506-6
Azizah, S., Ula, Z. N., Mutiara, D., & Prameswari, M. P.
(2024). Keamanan siber sebagai fondasi pengembangan
aplikasi keuangan mobile: Studi literatur mengenai
cybercrime dan mitigasinya. Akuntansi dan Teknologi
Informasi, 17(2), 221–237.
https://doi.org/10.24123/jati.v17i2.6409
Bertagnolli, C. (2011). Perceived usefulness, perceived ease
of use, and user acceptance of information technology.
Delle vicende dell’agricoltura Ital. Studi e note di C.
Bertagnolli, 13(3), 319–340.
Chai, C. S., Hipiny, I., & Ujir, H. (2023). User acceptance
testing (UAT) of self-service checkout kiosks: A case
study in E-Mart Tabuan Jaya, Kuching, Malaysia.
Proceedings of the 2023 IEEE 7th International
Conference on Information Technology, Information
Systems and Electrical Engineering (ICITISEE), 6–11.
Creasey, J. (2017). A guide for running an effective
penetration testing programme. Crest, (April), 1–64.
Dalimunthe, A., Affandi, M., & Suryanto, E. D. (2021).
Pengembangan modul praktikum teknik digital model
ADDIE. Jurnal Teknologi Informasi & Komunikasi
Dalam Pendidikan, 8(1), 17.
https://doi.org/10.24114/jtikp.v8i1.26777
Fa’izi, M. B. N. (2024). Serangan siber global melonjak 75%
di Q3 2024. Cyberhub.
https://cyberhub.id/berita/serangan-siber-global-
melonjak-di-2024
Fauziah, I., Situmorang, R., & Suprayekti. (2022).
Pengembangan modul hypercontent untuk mata diklat
kode etik dan disiplin pegawai BPK RI. Jurnal
Pembelajaran Inovatif, 5(2), 42–49.
Hadi, A. P., Rudjiono, R., & Zainudin, A. (2024). ADDIE
model dalam pengembangan media informasi untuk
menumbuhkan minat peserta. Go Infotech: Jurnal Ilmiah
STMIK AUB, 30(1), 20–27.
Id-SIRTII/CC. (2024). Lanskap keamanan siber Indonesia.
Id-SIRTII/CC BSSN, 1–141.
Kementerian Ketenagakerjaan Republik Indonesia. (2022).
Standar kompetensi kerja nasional Indonesia bidang uji
keamanan siber (Vol. 01, pp. 1–49).
KKIP. (2023). Ulasan ringkas kajian KKIP tahun 2022:
Kajian strategis pembangunan industri pertahanan
bidang siber dan ekosistemnya. Komite Kebijakan
Industri Pertahanan.
https://www.kkip.go.id/2023/03/15/ulasan-ringkas-
kajian-kkip-tahun-2022-kajian-strategis-pembangunan-
industri-pertahanan-bidang-siber-dan-ekosistemnya/
Kozel, V. M., & Drozdova, I. E. A. (2024). Research of
penetration testing methods. Vestnik Kherson National
Technical University, 3(90), 221–227.
https://doi.org/10.35546/kntu2078-4481.2024.3.28
Li, C. (2015). Penetration testing curriculum development in
practice. Journal of Information Technology Education:
Innovations in Practice, 14(1), 85–99.
https://doi.org/10.28945/2189
Machmudi, M. A., Wahyudiono, S., & Susilo, G. (2023).
Analisis dan rancang bangun e-learning dengan metode
ADDIE model. Go Infotech: Jurnal Ilmiah STMIK
AUB, 29(2), 226–232.
Mustapha, A. M., Zakaria, M. A. Z. M., Yahaya, N.,
Abuhassna, H., Mamman, B., Isa, A. M., & Kolo, M. A.
(2023). Students’ motivation and effective use of self-
regulated learning on learning management system
Moodle environment in higher learning institution in
Nigeria. International Journal of Information and
Education Technology, 13(1), 195–202.
https://doi.org/10.18178/ijiet.2023.13.1.1796
NIST. (2021). Technical guide to information security
testing and assessment (SP 800-115). Gaithersburg,
MD: National Institute of Standards and Technology.
OWASP Foundation. (2021). Penetration testing
methodologies. OWASP Web Security Testing Guide.
https://owasp.org/www-project-web-security-testing-
guide/latest/
Pramono, G. J., & Napitulu, T. A. (2022). User acceptance
in non-profit organization applications: The role of
intention to use, perceived usefulness, and community
commitment. ITEJ (Information Technology
Engineering Journals), 7(1), 53–76.
Shahriar, H., et al. (2023). Technology adoption model-
based comparison of clinical trial software. International
Journal of Applied Research in Public Health
Management, 8(1), 1–24.
Shanley, A., & Johnstone, M. N. (2015). Selection of
penetration testing methodologies: A comparison and
evaluation. Australasian Information Security
Management Conference (AISM), 65–72.
Shrestha, N. (2012). Security assessment via penetration
testing: A network and system administrator’s approach
(Master’s thesis). University of Oslo.
Teerakanok, S., Rassameeroj, I., Khurat, A., &
Visoottiviseth, V. (2022). Lessons learned from
penetration testing hands-on training during COVID-19
pandemic. 6th International Conference on Information
Technology, InCIT 2022, 368–373.
https://doi.org/10.1109/InCIT56086.2022.10067755
Wang, F., & Sahid, S. (2024). Content validation and
content validity index calculation for entrepreneurial
behavior instruments among vocational college students
in China. Multidisciplinary Reviews, 7(9).
Yusoff, M. S. B. (2019). ABC of content validation and
content validity index calculation. Education in
Medicine Journal, 11(2), 49–54.
Yusron, M. (2025). Pembinaan peningkatan kapasitas SDM
tim tanggap insiden siber pemerintah daerah Provinsi
Banten. Jurnal Cahaya Nusantara, 1(2), 86–92.
https://jurnal.cahayapublikasi.com/index.php/jcn/article
/view/87