Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Is the FCC's Router Ban the Wrong Fix?
  • Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles
  • Critical Flaw in Langflow AI Platform Under Attack
  • How Organizations Can Use Blunders to Level Up Their Security Programs
  • AI-Powered Dependency Decisions Introduce, Ignore Security Bugs
Skip The Hacker News

The Hacker News

  • LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
  • China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
  • [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
  • Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
  • Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • CISA Adds Critical Aquasecurity Trivy Scanner Vulnerability to KEV Catalog
  • Silver Fox Cyberattack Targets Japanese Businesses with Tax-Themed Phishing Scams
  • TeamPCP Hackers Focus on AI Developers, Planting Malicious Code to Disrupt Projects
  • Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks
  • Red Hat Warns of Malware Embedded in Popular Linux Tool, Opening Doors for Unauthorized Access
Skip Krebs on Security

Krebs on Security

  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me