Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Attackers Exploit Zero-Day in End-of-Life D-Link Routers
  • Phishers Exploit Office 365 Users Who Let Their Guard Down
  • DDoSia Powers Affiliate-Driven Hacktivist Attacks
  • Cyberattacks Likely Part of Military Operation in Venezuela
  • Lack of MFA Is Common Thread in Vast Cloud Credential Heist
Skip The Hacker News

The Hacker News

  • Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
  • n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions
  • The Future of Cybersecurity Includes Non-Human Employees
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Hackers Using Malicious QR Codes for Phishing via HTML Table
  • Critical n8n Vulnerability Allows Authenticated Remote Code Execution
  • Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns with Multiple Malware
  • CrazyHunter Ransomware Targets Healthcare Sector Using Sophisticated Evasion Tactics
  • Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information
Skip Krebs on Security

Krebs on Security

  • The Kimwolf Botnet is Stalking Your Local Network
  • Happy 16th Birthday, KrebsOnSecurity.com!
  • Dismantling Defenses: Trump 2.0 Cyber Year in Review
  • Most Parked Domains Now Serving Malicious Content
  • Microsoft Patch Tuesday, December 2025 Edition
Skip The Cyber Post

The Cyber Post

  • EP 168: LoD
  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
  • Attacks are Evolving: 3 Ways to Protect Your Business in 2026
  • INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty
  • EP 167: Threatlocker

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me