Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • TAG-140 Targets Indian Government Via 'ClickFix-Style' Lure
  • Bert Blitzes Linux & Windows Systems
  • DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms
  • Ransomware Attack Triggers Widespread Outage at Ingram Micro
  • 'Hunters International' RaaS Group Closes Its Doors
Skip The Hacker News

The Hacker News

  • Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms
  • CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
  • SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
  • ⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
  • Manufacturing Security: Why Default Passwords Must Go
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • DNN Vulnerability Exposes NTLM Credentials via Unicode Normalization Bypass
  • SAP July 2025 Patch Day: Fixes for 27 Flaws, Including 7 Critical
  • Call of Duty Gamers Hacked via RCE Exploit Allowing Player-to-Player Attacks
  • NordDragonScan Targets Windows Users to Steal Login Credentials
  • macOS SMBClient Flaw Enables Remote Code Execution and Kernel Crashes
Skip Krebs on Security

Krebs on Security

  • Big Tech’s Mixed Response to U.S. Treasury Sanctions
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
  • Patch Tuesday, June 2025 Edition
  • Proxy Services Feast on Ukraine’s IP Address Exodus

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me