The Leaders in
Maritime Training

1 2 3

Cyber-Skilled Mariner (CY-MAR)

Individual Course / Program


5 Days

Training Method

Lecture, Discussion, Projects

Individual Course


Part of Program


Course Image

Course Description

This course presents a systemic approach to implementing and managing effective information security in contemporary highly networked Maritime system. Students will learn about the security challenges faced by individuals and organizations in the information age and introduces the complex and dynamic state of information assurance in cyberspace. It is intended to sensitize Maritime stakeholders to the pitfalls and dangers of doing business in a cyber ecosystem, and to familiarize the student with various organizations and materials that can be turned to for assistance in understanding how to operateand use modern Maritime systems and networks securely with the maritime community and system vendors to the community. Shipboard and shoreside technology and management issues related to manageing the elemtns of Cybersecurity will be addressed.

What You Will Learn

Upon completion of this course, the students should be able to discuss with their organization's management structure, suppliers, and vendors that will:

  • Identify and critically assess issues and concepts related to the protection of maritime information and information systems.
  • Define security attricubutes confidentiality, integrity, and availability.
  • Describe confidentiality, integrity, and availability requirements for an enterprise environment.
  • Describe how confidentiality, integrity, and availability can be protected.
  • Describe how failures of protections can be detected. Describe how attacks can be detected and mitigated.
  • Use risk management principles to assess threats, vulnerabilities, countermeasures, and impact contributions to risk information system.
  • identify and critically assess the legal, moralm and ethical implications of behavior in an online maritime ecosystem.
  • Analyze and evlauate proposed of extant cubersecurity policies, practices, and procedures in order to assess potential advantages and disadvantages that might flow from implementing them.

Course Dates

Select the course date from the list below

MITAGS - Linthicum Heights, MD


You must have an account to register for courses