Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats
  • CTO New Year Resolutions for a More Secure 2026
  • Sunken Ships: Will Orgs Learn From Ivanti EPMM Attacks?
  • When the Cloud Rains on Everyone's IoT Parade
  • Identity Security 2026: Four Predictions & Recommendations
Skip The Hacker News

The Hacker News

  • Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
  • The ROI Problem in Attack Surface Management
  • Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
  • ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories
  • RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption
  • Handala Hackers Breach Telegram Accounts Linked to Israeli Officials
  • Google Tasks Feature Exploited in New Sophisticated Phishing Campaign
  • Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach
  • Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
Skip Krebs on Security

Krebs on Security

  • The Kimwolf Botnet is Stalking Your Local Network
  • Happy 16th Birthday, KrebsOnSecurity.com!
  • Dismantling Defenses: Trump 2.0 Cyber Year in Review
  • Most Parked Domains Now Serving Malicious Content
  • Microsoft Patch Tuesday, December 2025 Edition
Skip The Cyber Post

The Cyber Post

  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
  • Attacks are Evolving: 3 Ways to Protect Your Business in 2026
  • INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty
  • EP 167: Threatlocker
  • ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me