Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
  • Cities Hosting Major Events Need More Focus on Wireless, Drone Defense
  • The Case for Why Better Breach Transparency Matters
  • Claude Code Security Shows Promise, Not Perfection
  • Marquis v. SonicWall Lawsuit Ups the Breach Blame Game
Skip The Hacker News

The Hacker News

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
  • Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
  • Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
  • DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Fake Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software
  • Hackers Exploit Windows File Explorer and WebDAV to Distribute Malware
  • Trump Bans Anthropic AI in Federal Agencies Amid Growing Security Concerns
  • Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics
  • Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk
Skip Krebs on Security

Krebs on Security

  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
  • Kimwolf Botnet Swamps Anonymity Network I2P
  • Patch Tuesday, February 2026 Edition
  • Please Don’t Feed the Scattered Lapsus ShinyHunters

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me