Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • VMware Aria Operations Bug Exploited, Cloud Resources at Risk
  • Stranger Things Meets Cybersecurity: Lessons from the Hive Mind
  • Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
  • China's Silver Dragon Razes Governments in EU, SE Asia
  • Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
Skip The Hacker News

The Hacker News

  • Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
  • FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
  • 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
  • Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
  • New RFP Template for AI Usage Control and AI Governance 
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Cisco Secure Firewall Management Flaw Allows Remote Code Execution
  • Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
  • RedAlert Mobile Espionage Campaign Exploits Trojanized Rocket Alert App to Spy on Civilians
  • Cisco Secure Firewall Vulnerability Exposes Networks to Authentication Bypass Attacks
  • Threat Actors Intensify Targeting of IP Cameras Across the Middle East Amid Ongoing Conflict
Skip Krebs on Security

Krebs on Security

  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
  • Kimwolf Botnet Swamps Anonymity Network I2P
  • Patch Tuesday, February 2026 Edition
  • Please Don’t Feed the Scattered Lapsus ShinyHunters
Skip The Cyber Post

The Cyber Post

  • Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
  • Our systems have det...
  • Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
  • EP 171: Melody Fraud

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me