Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Torq Moves SOCs Beyond SOAR With AI-Powered Hyper Automation
  • 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
  • Out-of-the-Box Expectations for 2026 Reveal a Grab-Bag of Risk
  • Tenable Tackles AI Governance, Shadow AI Risks, Data Exposure
  • OpenClaw AI Runs Wild in Business Environments
Skip The Hacker News

The Hacker News

  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Top 10 Best DNS Filtering Solutions 2026
  • Best E-Signature Solutions For Secure Digital Signing In 2026
  • SCADA Flaw Enables DoS Condition, Impacting Availability of Affected Systems
  • Metasploit Update Introduces 7 Exploit Modules Affecting Popular Enterprise Platforms
  • TAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk
Skip Krebs on Security

Krebs on Security

  • Kimwolf Botnet Lurking in Corporate, Govt. Networks
  • Patch Tuesday, January 2026 Edition
  • Who Benefited from the Aisuru and Kimwolf Botnets?
  • The Kimwolf Botnet is Stalking Your Local Network
  • Happy 16th Birthday, KrebsOnSecurity.com!
Skip The Cyber Post

The Cyber Post

  • Badges, Bytes and Blackmail
  • ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
  • Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
  • Winning Against AI-Based Attacks Requires a Combined Defensive Approach
  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

Management Induction of Maritime Cyber Security

  1. Courses
  2. CyberWorldTrain
  3. Management Induction of Maritime Cyber Security

This module introduces students to the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Students will be exposed to multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to mitigate potential cybersecurity problems.

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me