Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
  • ‘Broadside’ Mirai Variant Targets Maritime Logistics Sector
  • Rust Code Delivers Better Security, Also Streamlines DevOps
  • India Rolls Back App Mandate Amid Surveillance Concerns
  • Threat Landscape Grows Increasingly Dangerous for Manufacturers
Skip The Hacker News

The Hacker News

  • ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More
  • How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
  • Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
  • Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks
  • MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks
  • CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation
  • Porsche Cars Disabled After Major Failure in Installed Satellite Security System
  • Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability
  • Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions
Skip Krebs on Security

Krebs on Security

  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
  • Is Your Android TV Streaming Box Part of a Botnet?
  • Mozilla Says It’s Finally Done With Two-Faced Onerep
Skip The Cyber Post

The Cyber Post

  • Gainsight Expands Impacted Customer List Following Salesforce Security Alert
  • ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist
  • ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
  • Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

Anul I - semestrul II

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul I - semestrul II
Practică II
Anul I - semestrul II
Practică II
Cadrul naţional şi european de reglementare al securităţii cibernetice
Anul I - semestrul II
Cadrul naţional şi european de reglementare al securităţii cibernetice
Infracţiuni informatice în legislaţia penală română
Anul I - semestrul II
Infracţiuni informatice în legislaţia penală română
Siguranța tehnicilor de programare și securitatea aplicațiilor și sistemelor informatice
Anul I - semestrul II
Siguranța tehnicilor de programare și securitatea aplicațiilor și sistemelor informatice
Securitatea cibernetică a dispozitivelor mobile și riscurile asociate IoT
Anul I - semestrul II
Securitatea cibernetică a dispozitivelor mobile și riscurile asociate IoT
Managementul securității organizaționale
Anul I - semestrul II
Managementul securității organizaționale
Sisteme de conducere a proceselor industriale şi protecţie cibernetică (SCADA, PLC, DPC)
Anul I - semestrul II
Sisteme de conducere a proceselor industriale şi protecţie cibernetică (SCADA, PLC, DPC)

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me