Piracy is no longer just a matter of gangs entering your yacht in the middle of the night. The threat of cyber space is building up rapidly, with the potential of posing even bigger risks, to the owners, their family and the crew. Good training can help.
This Cyber Security for Superyacht online course provides you with knowledge about common cyber attacks that the ship’s crew can face. Additionally, the course suggests best practices for the protection against cyber threats. As a result, all aboard are better protected.
This course aligns with:
The ISM Code (MSC.428 (98) Maritime Cyber Risk Management in Safety Management Systems)
MSC-FAL.1/Circ.3 Guidelines on maritime cyber risk management
ISO/IEC 27001 – Information Security Management, 2013
BIMCO Guidelines on Cybersecurity Onboard Ships(v4)
The Assessment consists of multiple-choice questions
After passing the assessment, you will receive a download link for your signed and stamped certificate
You are free to (re)print your certificate anytime
An original hard-copy by mail can be ordered (not included).
Reviews
How it works
1. Sign up
Go digital and save time. Simply sign up and you can start the course immediately.
2. Take the course
You will need a PC, laptop, tablet or smartphone (iOS or Android). You can take the course online or download the course.
3. Assessment
The Assessment consists of multiple-choice questions. Upon successful completion of the assesment you will receive your certificate.
4. Certificate
You will receive a download link for your certificate. You are free to (re)print your certificate anytime. A signed and stamped original hard-copy by mail can be ordered.
FAQ
This course teaches superyacht crew members how to protect their vessels from cyber threats. It focuses on the basics of cyber security for superyacht personnel, ensuring the safety and integrity of the yacht’s communication and IT systems.
The course is designed for superyacht crew members, including captains, engineers, and other staff, who want to understand how to safeguard their vessel’s systems from cyber attacks. It’s especially useful for anyone responsible for maintaining the security of communication and navigation equipment on board.
You’ll learn about the specific cyber threats that superyachts face, how to recognize potential risks, and best practices for protecting the yacht’s systems. Topics include securing sensitive information, handling onboard data securely, and responding to cyber incidents.
While not mandatory, the course is strongly recommended due to the increasing reliance on technology in the maritime sector. It provides essential knowledge for protecting superyachts from potential cyber attacks.
The course takes about 1 hour to complete, but you can go at your own pace as it’s fully online. The duration may vary depending on your English proficiency, with native speakers possibly completing it faster.
Upon finishing the course, you will receive an STCW Cyber Security certificate for Superyacht Crew approved by EC-MT, demonstrating your understanding of cyber risks and your ability to protect the vessel’s systems.
What you will learn
Awareness
Leverage an enhanced awareness of cyber security principles and concepts
Counteract threats
Analyse appropriate types of controls to counteract various threats
Social engineering
Social engineerings such as phishing, malware, spyware, adware and ransomware
Security solutions
Determine software vulnerabilities and security solutions to reduce the risk of exploitation
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.