Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Black Hat USA
  • Inconsistent Privacy Labels Don't Tell Users What They Are Getting
  • Apple Breaks Precedent, Patches DarkSword for iOS 18
  • Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
  • Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication
Skip The Hacker News

The Hacker News

  • $285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
  • 36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
  • Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
  • China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
  • Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Hackers Launch Social Engineering Offensive Against Key Node.js Maintainers
  • Top 10 Best Privileged Access Management (PAM) Solutions 2026
  • Top 10 Best Identity And Access Management (IAM) Companies 2026
  • LinkedIn Hidden Code Secretly Scans Users’ Computers for Installed Software
  • Anthropic Ends Claude Subscription Access for Third-Party Tools Like OpenClaw
Skip Krebs on Security

Krebs on Security

  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me