Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • New Cyber Blueprint Aims to Guide Organizations on AI Journey
  • Dark Web Vendors Shift to Third Parties, Supply Chains
  • Criminals Sending QR Codes in Phishing, Malware Campaigns
  • IDE Extensions Pose Hidden Risks to Software Supply Chain
  • Attackers Impersonate Top Brands in Callback Phishing
Skip The Hacker News

The Hacker News

  • Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
  • Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Malicious SEO Plugins on WordPress Can Lead to Site Takeover
  • Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations
  • Instagram Now Rotating TLS Certificates Daily with 1-Week Validity
  • SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
  • Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence
Skip Krebs on Security

Krebs on Security

  • Big Tech’s Mixed Response to U.S. Treasury Sanctions
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
  • Patch Tuesday, June 2025 Edition
  • Proxy Services Feast on Ukraine’s IP Address Exodus

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me