Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
  • ‘Broadside’ Mirai Variant Targets Maritime Logistics Sector
  • Rust Code Delivers Better Security, Also Streamlines DevOps
  • India Rolls Back App Mandate Amid Surveillance Concerns
  • Threat Landscape Grows Increasingly Dangerous for Manufacturers
Skip The Hacker News

The Hacker News

  • ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More
  • How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
  • Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
  • Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks
  • MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks
  • CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation
  • Porsche Cars Disabled After Major Failure in Installed Satellite Security System
  • Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability
  • Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions
Skip Krebs on Security

Krebs on Security

  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
  • Is Your Android TV Streaming Box Part of a Botnet?
  • Mozilla Says It’s Finally Done With Two-Faced Onerep
Skip The Cyber Post

The Cyber Post

  • Gainsight Expands Impacted Customer List Following Salesforce Security Alert
  • ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist
  • ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
  • Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

Anul I - semestrul I

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul I - semestrul I
Practica I
Anul I - semestrul I
Practica I
Principii fundamentale de securitate cibernetică în tehnologia informaţiei
Anul I - semestrul I
Principii fundamentale de securitate cibernetică în tehnologia informaţiei
Securitatea informaţională și tehnologii criptografice
Anul I - semestrul I
Securitatea informaţională și tehnologii criptografice
Protocoale şi interfeţe de comunicare în industrie aferente infrastructurilor critice în energetică, transporturi și servicii
Anul I - semestrul I
Protocoale şi interfeţe de comunicare în industrie aferente infrastructurilor critice în energetică, transporturi și servicii
Spanu Bogdan

Spanu Bogdan

Teacher

Managementul securităţii cibernetice
Anul I - semestrul I
Managementul securităţii cibernetice
Analiza şi clasificarea riscurilor de securitate cibernetică în tehnologiile informaţionale
Anul I - semestrul I
Analiza şi clasificarea riscurilor de securitate cibernetică în tehnologiile informaţionale
Managementul tehnologiei informaţiilor prin prisma amenințărilor hibride
Anul I - semestrul I
Managementul tehnologiei informaţiilor prin prisma amenințărilor hibride

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me