Cyber-Skilled Mariner

  • Length5 Days

Course Description

This course presents a systemic approach to implementing and managing effective information security in contemporary highly networked Maritime system. Students will learn about the security challenges faced by individuals and organizations in the information age and introduces the complex and dynamic state of information assurance in cyberspace. It is intended to sensitize Maritime stakeholders to the pitfalls and dangers of doing business in a cyber-ecosystem, and to familiarize the student with various organizations and materials that can be turned to for assistance in understanding how to operate and use modern Maritime systems and networks securely with the maritime community and system vendors to the community. Shipboard and shoreside technology and management issues related to managing the elements of Cybersecurity will be addressed.

This course is also approved for Global Information Assurance Certification (GIAC) continuing education credits. GIAC grants approval for continuing education for certification maintenance. Attendance will count for one Continuing Professional Experience (CPE) per hour. There may be some limitations as to how many CPEs that may be counted towards for one course. Anyone interested, should check with GIAC for details at: https://www.giac.org/certifications/renewal

This course is not Eligible for the MATES Program.

What You Will Learn

Upon completion of this course, the students should be able to discuss with their organization's management structure, suppliers, and vendors that will:

  • Identify and critically assess issues and concepts related to the protection of maritime information and information systems.
  • Define security attricubutes confidentiality, integrity, and availability.
  • Describe confidentiality, integrity, and availability requirements for an enterprise environment.
  • Describe how confidentiality, integrity, and availability can be protected.
  • Describe how failures of protections can be detected. Describe how attacks can be detected and mitigated.
  • Use risk management principles to assess threats, vulnerabilities, countermeasures, and impact contributions to risk information system.
  • identify and critically assess the legal, moralm and ethical implications of behavior in an online maritime ecosystem.
  • Analyze and evlauate proposed of extant cubersecurity policies, practices, and procedures in order to assess potential advantages and disadvantages that might flow from implementing them.

Available Dates - BALTIMORE

No available course sessions at this time. Please check back at a later date.

Available Dates - SEATTLE

No available course sessions at this time. Please check back at a later date.