Advanced Persistent Threat Brief: Volt Typhoon
Offered By: Pluralsight
Course Description
Overview
This course provides a high-level overview of the notorious Volt Typhoon.
Volt Typhoon's infiltration of U.S. critical infrastructure represents a paradigm shift in how state-sponsored threat actors could cause widespread disruptive and destructive attacks during times of conflict. In this course, Advanced Persistent Threat Brief: Volt Typhoon, you’ll look at disclosures from US intelligence agencies. First, you’ll dig into how they conduct reconnaissance. Then, you'll gain access to target systems and move laterally towards operational technology networks. Finally, steps will be outlined that you can take to protect your own organization from the activities of this insidious and dangerous threat group. When you're finished with this course, you'll have the ability to understand the allies that detail the tactics, techniques, and procedures of Volt Typhoon.
Volt Typhoon's infiltration of U.S. critical infrastructure represents a paradigm shift in how state-sponsored threat actors could cause widespread disruptive and destructive attacks during times of conflict. In this course, Advanced Persistent Threat Brief: Volt Typhoon, you’ll look at disclosures from US intelligence agencies. First, you’ll dig into how they conduct reconnaissance. Then, you'll gain access to target systems and move laterally towards operational technology networks. Finally, steps will be outlined that you can take to protect your own organization from the activities of this insidious and dangerous threat group. When you're finished with this course, you'll have the ability to understand the allies that detail the tactics, techniques, and procedures of Volt Typhoon.
Syllabus
- Advanced Persistent Threat Brief: Volt Typhoon 8mins
- Resources 0mins
Taught by
Matthew Lloyd Davies
Related Courses
Real-Time Cyber Threat Detection and MitigationNew York University (NYU) via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Cyber Security Advanced Persistent Threat Defender Preview
Udemy Threat Intelligence: Cyber Threats and Kill Chain Methodology
Pluralsight