Advanced Persistent Threat Brief: Volt Typhoon
Offered By: Pluralsight
Course Description
Overview
This course provides a high-level overview of the notorious Volt Typhoon.
Volt Typhoon's infiltration of U.S. critical infrastructure represents a paradigm shift in how state-sponsored threat actors could cause widespread disruptive and destructive attacks during times of conflict. In this course, Advanced Persistent Threat Brief: Volt Typhoon, you’ll look at disclosures from US intelligence agencies. First, you’ll dig into how they conduct reconnaissance. Then, you'll gain access to target systems and move laterally towards operational technology networks. Finally, steps will be outlined that you can take to protect your own organization from the activities of this insidious and dangerous threat group. When you're finished with this course, you'll have the ability to understand the allies that detail the tactics, techniques, and procedures of Volt Typhoon.
Volt Typhoon's infiltration of U.S. critical infrastructure represents a paradigm shift in how state-sponsored threat actors could cause widespread disruptive and destructive attacks during times of conflict. In this course, Advanced Persistent Threat Brief: Volt Typhoon, you’ll look at disclosures from US intelligence agencies. First, you’ll dig into how they conduct reconnaissance. Then, you'll gain access to target systems and move laterally towards operational technology networks. Finally, steps will be outlined that you can take to protect your own organization from the activities of this insidious and dangerous threat group. When you're finished with this course, you'll have the ability to understand the allies that detail the tactics, techniques, and procedures of Volt Typhoon.
Syllabus
- Advanced Persistent Threat Brief: Volt Typhoon 8mins
- Resources 0mins
Taught by
Matthew Lloyd Davies
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network