Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Black Hat USA
  • Storm-1175 Deploys Medusa Ransomware at 'High Velocity'
  • Grafana Patches AI Bug That Could Have Leaked User Data
  • RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever
  • Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends
Skip The Hacker News

The Hacker News

  • Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
  • [Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk
  • Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
  • Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign
  • The Hidden Cost of Recurring Credential Incidents
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • CUPS Vulnerabilities Could Allow Remote Attackers to Achieve Root-Level Code Execution
  • BPFDoor Variants Hide with Stateless C2 and ICMP Relay Tactics
  • Windmill Developer Platform Flaws Expose Users to RCE Attacks, Proof-of-Concept Published
  • Kubernetes Flaws Let Hackers Jump From Containers to Cloud Accounts
  • GPUBreach Attack Could Lead to Full System Takeover and Root Shell Access
Skip Krebs on Security

Krebs on Security

  • Russia Hacked Routers to Steal Microsoft Office Tokens
  • Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me