Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
  • How Cyber Insurance MGAs Shape Policies for Evolving Cyber Risks
  • Apple Patches More Zero-Days Used in 'Sophisticated' Attack
  • Think Like an Attacker: Cybersecurity Tips From Cato Networks' CISO
  • Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
Skip The Hacker News

The Hacker News

  • Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats
  • FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
  • ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More
  • A Browser Extension Risk Guide After the ShadyPanda Campaign
  • Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Microsoft December 2025 Security Updates Disrupt MSMQ Functionality on IIS
  • ZnDoor Malware Actively Exploits React2Shell to Breach Network Infrastructure
  • PCPcat Malware Leverages React2Shell Vulnerability to Breach 59,000+ Servers
  • xHunt APT Exploits Microsoft Exchange and IIS to Deploy Custom Backdoors
  • Wireshark 4.6.2 Released With Crash Vulnerability Fixes and Protocol Updates
Skip Krebs on Security

Krebs on Security

  • Microsoft Patch Tuesday, December 2025 Edition
  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
  • Is Your Android TV Streaming Box Part of a Botnet?

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me