-
Course
- Security
Security Hot Takes: Critical Infrastructure Advisory-Volt Typhoon
This course discusses how Chinese state-sponsored threat actors gained access to US critical Infrastructure, including energy, transportation, telecommunications and water sectors, and maintained access over several years,
What you'll learn
Cyber threat actors sponsored by the People’s Republic of China, are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical infrastructure in the event of a major crisis or conflict with the United States. In this course, we’ll discuss the tactics, techniques and procedures used by People’s Republic of China state-sponsored actors to gain access to, and maintain persistence on IT networks, and position themselves to be able to disrupt operational technology. We’ll also explore how the threat actors showed exceptional operational security by relying heavily on Living Off The Land techniques, which led to their intrusions going undetected for months, or in some cases, years.
Table of contents
About the authors
Michael Teske is an Author Evangelist with Pluralsight helping people elevate their skills. He has 20+ years of experience in IT Ops, including 17 as an IT instructor at a community college.
More Courses by MichaelMatt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.
More Courses by Matthew