Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Cyber Then & Now: Inside a 2-Decade Industry Evolution
  • Commvault: Vulnerability Patch Works as Intended
  • Insight Partners Data Breach: Bigger Impact Than Anticipated
  • How Security Has Changed the Hacker Marketplace
  • SonicWall Issues Patch for Exploit Chain in SMA Devices
Skip The Hacker News

The Hacker News

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Cyberattackers Targeting IT Help Desks for Initial Breach
  • New Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources
  • Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks
  • Threat Actors Target Job Seekers with Three New Unique Adversaries
  • Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms
Skip Krebs on Security

Krebs on Security

  • Pakistani Firm Shipped Fentanyl Analogs, Scams to US
  • xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs
  • Alleged ‘Scattered Spider’ Member Extradited to U.S.
  • DOGE Worker’s Code Supports NLRB Whistleblower
  • Whistleblower: DOGE Siphoned NLRB Case Data
Skip The Cyber Post

The Cyber Post

  • Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware
  • Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures
  • Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization
  • Entra ID Data Protection: Essential or Overkill?
  • Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches

Anul I - semestrul I

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul I - semestrul I
Practica I
Anul I - semestrul I
Practica I
Principii fundamentale de securitate cibernetică în tehnologia informaţiei
Anul I - semestrul I
Principii fundamentale de securitate cibernetică în tehnologia informaţiei
Securitatea informaţională și tehnologii criptografice
Anul I - semestrul I
Securitatea informaţională și tehnologii criptografice
Protocoale şi interfeţe de comunicare în industrie aferente infrastructurilor critice în energetică, transporturi și servicii
Anul I - semestrul I
Protocoale şi interfeţe de comunicare în industrie aferente infrastructurilor critice în energetică, transporturi și servicii
Spanu Bogdan

Spanu Bogdan

Teacher

Managementul securităţii cibernetice
Anul I - semestrul I
Managementul securităţii cibernetice
Analiza şi clasificarea riscurilor de securitate cibernetică în tehnologiile informaţionale
Anul I - semestrul I
Analiza şi clasificarea riscurilor de securitate cibernetică în tehnologiile informaţionale
Managementul tehnologiei informaţiilor prin prisma amenințărilor hibride
Anul I - semestrul I
Managementul tehnologiei informaţiilor prin prisma amenințărilor hibride

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me