Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • UNC6384 Targets European Diplomatic Entities With Windows Exploit
  • Ribbon Communications Breach Marks Latest Telecom Attack
  • Dark Reading Confidential: Cyber's Role in the Rapid Rise of Digital Authoritarianism
  • Zombie Projects Rise Again to Undermine Security
  • An 18-Year-Old Codebase Left Smart Buildings Wide Open
Skip The Hacker News

The Hacker News

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents
  • CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks
  • Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY
  • Attackers Exploit Windows Server Update Services Flaw to Steal Sensitive Organizational Data
  • Google Launches New AI Security Features on Android to Block Mobile Scams
Skip Krebs on Security

Krebs on Security

  • Aisuru Botnet Shifts from DDoS to Residential Proxies
  • Canada Fines Cybercrime Friendly Cryptomus $176M
  • Email Bombs Exploit Lax Authentication in Zendesk
  • Patch Tuesday, October 2025 ‘End of 10’ Edition
  • DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
Skip The Cyber Post

The Cyber Post

  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
  • ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
  • Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
  • Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me