Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber
  • Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA
  • Middle East Cyber Battle Field Broadens — Especially in UAE
  • Trellix Source Code Breach Highlights Growing Supply Chain Threats
  • Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations
Skip The Hacker News

The Hacker News

  • Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks
  • MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
  • The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open
  • Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?
  • Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Salat Malware Abuses QUIC and WebSockets for Stealthy C2 Control
  • Phishing Attack Weaponizes Calendar Invites to Steal Login Credentials
  • Massive DDoS Attack Generates 2.45 Billion Requests Using 1.2 Million IP Addresses
  • FEMITBOT Network Exploits Telegram Mini Apps to Spread Crypto Scams and Android Malware
  • Darkhub Hacking-for-Hire Portal Promotes Crypto Fraud and Spyware Services
Skip Krebs on Security

Krebs on Security

  • Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
  • ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
  • Patch Tuesday, April 2026 Edition
  • Russia Hacked Routers to Steal Microsoft Office Tokens
  • Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me