The Leaders in
Maritime Training

1 2 3

Cyber-Skilled Mariner (CY-MAR)

Individual Course / Program

Length

5 Days

Training Method

Lecture, Discussion, Projects

Individual Course

Yes

Part of Program

No

Course Image

Course Description

This course presents a systemic approach to implementing and managing effective information security in contemporary highly networked Maritime system. Students will learn about the security challenges faced by individuals and organizations in the information age and introduces the complex and dynamic state of information assurance in cyberspace. It is intended to sensitize Maritime stakeholders to the pitfalls and dangers of doing business in a cyber-ecosystem, and to familiarize the student with various organizations and materials that can be turned to for assistance in understanding how to operate and use modern Maritime systems and networks securely with the maritime community and system vendors to the community. Shipboard and shoreside technology and management issues related to managing the elements of Cybersecurity will be addressed.

This course is also approved for Global Information Assurance Certification (GIAC) continuing education credits. GIAC grants approval for continuing education for certification maintenance. Attendance will count for one Continuing Professional Experience (CPE) per hour. There may be some limitations as to how many CPEs that may be counted towards for one course. Anyone interested, should check with GIAC for details at: https://www.giac.org/certifications/renewal

This course is not Eligible for the MATES Program.

What You Will Learn

Upon completion of this course, the students should be able to discuss with their organization's management structure, suppliers, and vendors that will:

  • Identify and critically assess issues and concepts related to the protection of maritime information and information systems.
  • Define security attricubutes confidentiality, integrity, and availability.
  • Describe confidentiality, integrity, and availability requirements for an enterprise environment.
  • Describe how confidentiality, integrity, and availability can be protected.
  • Describe how failures of protections can be detected. Describe how attacks can be detected and mitigated.
  • Use risk management principles to assess threats, vulnerabilities, countermeasures, and impact contributions to risk information system.
  • identify and critically assess the legal, moralm and ethical implications of behavior in an online maritime ecosystem.
  • Analyze and evlauate proposed of extant cubersecurity policies, practices, and procedures in order to assess potential advantages and disadvantages that might flow from implementing them.


Course Dates

Select the course date from the list below

There are no available dates for this course at this time.
Please contact us for upcoming course dates.