Security Hot Takes: Critical Infrastructure Advisory-Volt Typhoon
Offered By: Pluralsight
Course Description
Overview
This course discusses how Chinese state-sponsored threat actors gained access to US critical Infrastructure, including energy, transportation, telecommunications and water sectors, and maintained access over several years,
Cyber threat actors sponsored by the People’s Republic of China, are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical infrastructure in the event of a major crisis or conflict with the United States. In this course, we’ll discuss the tactics, techniques and procedures used by People’s Republic of China state-sponsored actors to gain access to, and maintain persistence on IT networks, and position themselves to be able to disrupt operational technology. We’ll also explore how the threat actors showed exceptional operational security by relying heavily on Living Off The Land techniques, which led to their intrusions going undetected for months, or in some cases, years.
Cyber threat actors sponsored by the People’s Republic of China, are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical infrastructure in the event of a major crisis or conflict with the United States. In this course, we’ll discuss the tactics, techniques and procedures used by People’s Republic of China state-sponsored actors to gain access to, and maintain persistence on IT networks, and position themselves to be able to disrupt operational technology. We’ll also explore how the threat actors showed exceptional operational security by relying heavily on Living Off The Land techniques, which led to their intrusions going undetected for months, or in some cases, years.
Syllabus
- Critical Infrastructure Advisory-Volt Typhoon 16mins
- Additional Resources 0mins
Taught by
Matthew Lloyd Davies
Related Courses
Cyber-Physical Systems SecurityGeorgia Institute of Technology via Udacity Challenges and solutions in Future Power Networks
EMMA ICS/SCADA Fundamentals
Cybrary Cybersecurity: Keeping the Lights On - Practical Challenges in Utilities - Keynote
New York University (NYU) via YouTube Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture
New York University (NYU) via YouTube