Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Black Hat USA
  • Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers
  • Threat Actors Get Crafty With Emojis to Escape Detection
  • AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties
  • Fraud Rockets Higher in Mobile-First Latin America
Skip The Hacker News

The Hacker News

  • New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
  • Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices
  • APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
  • Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)
  • Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Anthropic Launches Claude Mythos Preview Focused on Zero-Day Vulnerability Discovery
  • Hackers Target Adobe Reader Users With Sophisticated Zero-Day Exploit
  • EvilTokens Uses Stolen Microsoft 365 Tokens, AI to Supercharge BEC
  • IBM Security Verify Access Flaws Let Remote Attackers Access Sensitive Data
  • Masjesu Botnet Targets Routers in Commercial DDoS Attacks
Skip Krebs on Security

Krebs on Security

  • Russia Hacked Routers to Steal Microsoft Office Tokens
  • Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me