
{"id":3858,"date":"2018-08-08T12:00:56","date_gmt":"2018-08-08T12:00:56","guid":{"rendered":"http:\/\/blogs.plymouth.ac.uk\/dcss\/?p=3858"},"modified":"2018-08-08T08:16:27","modified_gmt":"2018-08-08T08:16:27","slug":"seapower-and-strategy-at-university-of-plymouth-cyber-security-awareness-mca","status":"publish","type":"post","link":"https:\/\/blogs.plymouth.ac.uk\/dcss\/2018\/08\/08\/seapower-and-strategy-at-university-of-plymouth-cyber-security-awareness-mca\/","title":{"rendered":"SEAPOWER AND STRATEGY AT UNIVERSITY OF PLYMOUTH, CYBER SECURITY AWARENESS (MCA)"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/06\/SEAPOWER-PLYMOUTH.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3830\" src=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/06\/SEAPOWER-PLYMOUTH.jpg\" alt=\"\" width=\"400\" height=\"400\" srcset=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/06\/SEAPOWER-PLYMOUTH.jpg 400w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/06\/SEAPOWER-PLYMOUTH-150x150.jpg 150w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/06\/SEAPOWER-PLYMOUTH-300x300.jpg 300w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/06\/SEAPOWER-PLYMOUTH-260x260.jpg 260w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2018\/06\/SEAPOWER-PLYMOUTH-160x160.jpg 160w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>About the course<\/p>\n<p>\u2018Cyber technologies have become essential to the operation and management of numerous systems critical to the safety and security of shipping and protection of the marine environment. In some cases, these systems are to comply with international standards and Flag Administration requirements. However, the vulnerabilities created by accessing, interconnecting or networking these systems can lead to cyber risks which should be addressed.\u201d MSC-FAL.1\/Circ.3<\/p>\n<p>Qualification<\/p>\n<p>Cyber Security Awareness (MCA)<\/p>\n<p>&nbsp;<\/p>\n<p>1\u00bd Day Pilot course days<\/p>\n<p>In-house training options also available, please call us for more information.<\/p>\n<p>&nbsp;<\/p>\n<p>Dates 29-30 Aug 2018<\/p>\n<p>&nbsp;<\/p>\n<p>Assessment<\/p>\n<p>An end of course exam will assess students.<\/p>\n<p>Location<\/p>\n<p>Delivered on the University of Plymouth main campus.<\/p>\n<p>&nbsp;<\/p>\n<p>https:\/\/www.plymouth.ac.uk\/business-partners\/partnerships\/dartmouth-centre-seapower-strategy<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>About the course \u2018Cyber technologies have become essential to the operation and management of numerous systems critical to the safety and security of shipping and protection of the marine environment. In some cases, these systems are to comply with international standards and Flag Administration requirements. However, the vulnerabilities created by accessing, interconnecting or networking these&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/2018\/08\/08\/seapower-and-strategy-at-university-of-plymouth-cyber-security-awareness-mca\/\">Continue reading <span class=\"screen-reader-text\">SEAPOWER AND STRATEGY AT UNIVERSITY OF PLYMOUTH, CYBER SECURITY AWARENESS (MCA)<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":3830,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[233,24],"tags":[],"class_list":["post-3858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-courses","category-dcss-news","entry"],"_links":{"self":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/3858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/comments?post=3858"}],"version-history":[{"count":2,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/3858\/revisions"}],"predecessor-version":[{"id":3980,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/3858\/revisions\/3980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media\/3830"}],"wp:attachment":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media?parent=3858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/categories?post=3858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/tags?post=3858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}