Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • How a Large Bank Uses AI Digital Twins for Threat Hunting
  • Microsoft Proposes Better Identity, Guardrails for AI Agents
  • AI in the SOC: What Could Go Wrong?
  • Trivy Supply Chain Attack Targets CI/CD Secrets
  • Ransomware's New Era: Moving at AI Speed
Skip The Hacker News

The Hacker News

  • Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
  • 5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents
  • TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
  • The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
  • U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • DarkSword Exploit Chain Leaked Online, Posing Risk to Millions of iPhones
  • Tycoon2FA Operators Resume Cloud Account Phishing Following Infrastructure
  • TeamPCP Unleashes Iran-Targeted CanisterWorm Kubernetes Wiper
  • Dell Wyse Management Flaws Could Lead to Full System Compromise
  • Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution
Skip Krebs on Security

Krebs on Security

  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts
Skip The Cyber Post

The Cyber Post

  • 54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security
  • CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks
  • ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
  • 54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
  • Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me