Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Black Hat USA
  • Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
  • Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication
  • Claude Source Code Leak Highlights Big Supply Chain Missteps
  • Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
Skip The Hacker News

The Hacker News

  • UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
  • Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
  • New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
  • Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
  • Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover
  • Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2
  • Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer
  • Kimsuky Uses Malicious LNK Files to Drop Python Backdoor
  • CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild
Skip Krebs on Security

Krebs on Security

  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me