Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Chinese Cyber Threat Lurks In Critical Asian Sectors for Years
  • Cylake Offers AI-Native Security Without Relying on Cloud Services
  • North Korean APTs Use AI to Enhance IT Worker Scams
  • EU Auto Rules Shift Gears on Cybersecurity Standards
  • Iran's Cyber-Kinetic War Doctrine Takes Shape
Skip The Hacker News

The Hacker News

  • UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
  • ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware
  • Can the Security Platform Finally Deliver for the Mid-Market?
  • Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
  • Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Security Risk Advisors Releases “The Purple Perspective 2026” Report
  • Fake CleanMyMac Site Spreads SHub Stealer, Targets Crypto Wallets
  • BoryptGrab Malware Abuses GitHub to Steal Browser and Crypto Wallet Data
  • Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threats
  • Cyber Espionage Group CL-UNK-1068 Linked to China Targets Asian Infrastructure
Skip Krebs on Security

Krebs on Security

  • How AI Assistants are Moving the Security Goalposts
  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
  • Kimwolf Botnet Swamps Anonymity Network I2P
  • Patch Tuesday, February 2026 Edition
Skip The Cyber Post

The Cyber Post

  • ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
  • Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
  • Our systems have det...
  • Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me