Piracy is no longer just a matter of gangs entering your yacht in the middle of the night. The threat of cyber space is building up rapidly, with the potential of posing even bigger risks, to the owners, their family and the crew. Good training can help.
This Cyber Security for Superyacht online course provides you with knowledge about common cyber attacks that the ship’s crew can face. Additionally, the course suggests best practices for the protection against cyber threats. As a result, all aboard are better protected.
This course aligns with:
The ISM Code (MSC.428 (98) Maritime Cyber Risk Management in Safety Management Systems)
MSC-FAL.1/Circ.3 Guidelines on maritime cyber risk management
ISO/IEC 27001 – Information Security Management, 2013
BIMCO Guidelines on Cybersecurity Onboard Ships(v4)
The Assessment consists of multiple-choice questions
After passing the assessment, you will receive a download link for your signed and stamped certificate
You are free to (re)print your certificate anytime
An original hard-copy by mail can be ordered (not included).
Reviews
How it works
1. Sign up
Go digital and save time. Simply sign up and you can start the course immediately.
2. Take the course
You will need a PC, laptop, tablet or smartphone (iOS or Android). You can take the course online or download the course.
3. Assessment
The Assessment consists of multiple-choice questions. Upon successful completion of the assesment you will receive your certificate.
4. Certificate
You will receive a download link for your certificate. You are free to (re)print your certificate anytime. A signed and stamped original hard-copy by mail can be ordered.
FAQ
Yes, this training is fully online, and you can join anytime.
The course will help you to (learn to) better understand the risks of Cyber Security. This may be required by the employer.
This course is relevant for anyone who will be working on a yacht or superyacht.
Our online STCW courses are all in English (except specific language courses).
The ISM Code (MSC.428 (98) Maritime Management of Cyber Risks in Security Management Systems).
MSC-FAL.1/Circ.3 Guidelines for maritime cyber risk management.
ISO/IEC 27001 – Information security management, 2013.
BIMCO guidelines for cyber security on board ships(v4)
This course has been approved by Emergency Control Maritime Training BV (dba STCW.online), a maritime training institute based in Rotterdam.
No flag state approval is required for this course.
The average time to complete the course is 1 hour.
It also depends on your English language proficiency. Native speakers may need less time.
This course includes the following elements:
In this course you will learn about Cyber Security in the maritime industry.
What the current state of Cyber Security in the maritime industry is.
You will learn about the world of Cyber Security and possible attacks.
You will learn about risk situations that can occur on a Superyacht.
Examples of how it works in practice and a final assignment to be completed with a passing grade.
What you will learn
Awareness
Leverage an enhanced awareness of cyber security principles and concepts
Counteract threats
Analyse appropriate types of controls to counteract various threats
Social engineering
Social engineerings such as phishing, malware, spyware, adware and ransomware
Security solutions
Determine software vulnerabilities and security solutions to reduce the risk of exploitation
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.