Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Nation-State Actor Embraces AI Malware Assembly Line
  • Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform
  • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
  • Software Development Practices Help Enterprises Tackle Real-Life Risks
  • LatAm Now Faces 2x More Cyberattacks Than US
Skip The Hacker News

The Hacker News

  • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
  • Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
  • ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
  • Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
  • Where Multi-Factor Authentication Stops and Credential Abuse Starts
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data
  • Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware
  • PoC Exploit for Cisco SD-WAN 0-Day Vulnerability Now Released, Actively Exploited in the Wild
  • RingH23 Threat Actors Target MacCMS and CDN Infrastructure with New Arsenal
  • DPRK Hackers Target Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
Skip Krebs on Security

Krebs on Security

  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
  • Kimwolf Botnet Swamps Anonymity Network I2P
  • Patch Tuesday, February 2026 Edition
  • Please Don’t Feed the Scattered Lapsus ShinyHunters
Skip The Cyber Post

The Cyber Post

  • Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
  • Our systems have det...
  • Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
  • EP 171: Melody Fraud

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me