Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • EnCase Driver Weaponized as EDR Killers Persist
  • Agentic AI Site 'Moltbook' Is Riddled With Security Risks
  • Cyber Success Trifecta: Education, Certifications & Experience
  • Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
  • Ransomware Gang Goes Full 'Godfather' With Cartel
Skip The Hacker News

The Hacker News

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Cyberattackers Use Fake RTO Challan Alerts to Spread Android Malware
  • ShadowSyndicate Leverages Server Transition Technique in Latest Ransomware Attacks
  • n8n Vulnerability Allows Remote Attackers to Hijack Systems via Malicious Workflow Execution
  • Moxa Switches Vulnerability Enables Unauthorized Access through Authentication Bypass
  • Cybersecurity Alert: Fake Traffic Ticket Portals Target Personal, Credit Card Data
Skip Krebs on Security

Krebs on Security

  • Please Don’t Feed the Scattered Lapsus ShinyHunters
  • Who Operates the Badbox 2.0 Botnet?
  • Kimwolf Botnet Lurking in Corporate, Govt. Networks
  • Patch Tuesday, January 2026 Edition
  • Who Benefited from the Aisuru and Kimwolf Botnets?
Skip The Cyber Post

The Cyber Post

  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • EP 170: Phrack
  • Badges, Bytes and Blackmail
  • ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
  • Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Year I - Semester I

  1. Courses
  2. Master Courses - Cyber Security
  3. EN - CYBER SECURITY AND RISK MANGEMENT
  4. Year I - Semester I
Information technologies management through the lense of hybrid threats
Year I - Semester I
Information technologies management through the lense of hybrid threats

Analysis and classification of cybersecurity risks in information technologies
Year I - Semester I
Analysis and classification of cybersecurity risks in information technologies
Cybersecurity management
Year I - Semester I
Cybersecurity management
⁠Industrial communication protocols and interfaces for critical infrastructure in energy, transport, and services
Year I - Semester I
⁠Industrial communication protocols and interfaces for critical infrastructure in energy, transport, and services
Information security and cryptographic technologies
Year I - Semester I
Information security and cryptographic technologies
Fundamental principles of cybersecurity in information technology
Year I - Semester I
Fundamental principles of cybersecurity in information technology
Traineeship I
Year I - Semester I
Traineeship I

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me