Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Black Hat USA
  • Rethinking Vulnerability Management Strategies for Mid-Market Security
  • AI and Quantum Are Forcing a Rethink of Digital Trust
  • Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
  • AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection
Skip The Hacker News

The Hacker News

  • TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
  • Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
  • The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
  • Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
  • Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Windows Tools Abused to Kill AV Ahead of Ransomware Attacks
  • Axios NPM Packages Breached in Ongoing Supply Chain Attack
  • Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline
  • Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence
  • PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data
Skip Krebs on Security

Krebs on Security

  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me