Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Operation Red Card 2.0 Leads to 651 Arrests in Africa
  • Attackers Now Need Just 29 Minutes to Own a Network
  • Lazarus Group Picks a New Poison: Medusa Ransomware
  • As Cybersecurity Firms Chase AI, VC Market Skyrockets
  • Spitting Cash: ATM Jackpotting Attacks Surged in 2025
Skip The Hacker News

The Hacker News

  • Manual Processes Are Putting National Security at Risk
  • Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker
  • SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
  • CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability
  • RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • CISA Issues Alert on Active Exploitation of FileZen Vulnerability
  • Critical SolarWinds Serv-U Vulnerabilities Enable Remote Root Access
  • Cybercriminals Exploit Fake Avast Website to Steal Users Credit Card Information
  • Android RAT SURXRAT Grants Hackers Full Device Control and Data Exfiltration
  • Threat Actors Exploit Apache ActiveMQ Vulnerability to Gain RDP Access, Deploy LockBit Ransomware
Skip Krebs on Security

Krebs on Security

  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
  • Kimwolf Botnet Swamps Anonymity Network I2P
  • Patch Tuesday, February 2026 Edition
  • Please Don’t Feed the Scattered Lapsus ShinyHunters
  • Who Operates the Badbox 2.0 Botnet?
Skip The Cyber Post

The Cyber Post

  • Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
  • Our systems have det...
  • AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
  • Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
  • ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me