Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • 'PoisonSeed' Attacker Skates Around FIDO Keys
  • Nearly 2,000 MCP Servers Possess No Security Whatsoever
  • 3 Ways Security Teams Can Minimize Agentic AI Chaos
  • Firmware Vulnerabilities Continue to Plague Supply Chain
  • 4 Chinese APTs Attack Taiwan's Semiconductor Industry
Skip The Hacker News

The Hacker News

  • China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
  • CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
  • Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Chinese Threat Actors Operate 2,800 Malicious Domains to Distribute Windows Malware
  • New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users
  • Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets
  • New Surge of Crypto-Jacking Hits Over 3,500 Websites
  • Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools
Skip Krebs on Security

Krebs on Security

  • Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
  • DOGE Denizen Marko Elez Leaked API Key for xAI
  • UK Arrests Four in ‘Scattered Spider’ Ransom Group
  • Microsoft Patch Tuesday, July 2025 Edition
  • Big Tech’s Mixed Response to U.S. Treasury Sanctions

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me