Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • [Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
  • AI Rising: Do We Know Enough About the Data Populating It?
  • Top Cyber Industry Defenses Spike CO2 Emissions
  • Asia Fumbles With Throttling Back Telnet Traffic in Region
  • SolarWinds WHD Attacks Highlight Risks of Exposed Apps
Skip The Hacker News

The Hacker News

  • Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
  • Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
  • Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
  • SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • GitGuardian Raises $50M Series C to Address Non-Human Identities Crisis and AI Agent Security Gap
  • Microsoft Launches Extended Security Update Program for Windows 10 Users
  • MSHTML Framework Zero-Day Opens Door to Network-Based Security Bypass
  • VoidLink Framework Introduces On-Demand Tool Generation with Native Windows Plugin Support
  • Microsoft Office Word 0-Day Vulnerability Enables Attackers to Bypass Security Feature
Skip Krebs on Security

Krebs on Security

  • Patch Tuesday, February 2026 Edition
  • Please Don’t Feed the Scattered Lapsus ShinyHunters
  • Who Operates the Badbox 2.0 Botnet?
  • Kimwolf Botnet Lurking in Corporate, Govt. Networks
  • Patch Tuesday, January 2026 Edition
Skip The Cyber Post

The Cyber Post

  • Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
  • From Ransomware to Residency: Inside the Rise of the Digital Parasite
  • Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
  • Our systems have det...
  • TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me