- Course
Security Hot Takes: Critical Infrastructure Advisory-Volt Typhoon
This course discusses how Chinese state-sponsored threat actors gained access to US critical Infrastructure, including energy, transportation, telecommunications and water sectors, and maintained access over several years,
- Course
Security Hot Takes: Critical Infrastructure Advisory-Volt Typhoon
This course discusses how Chinese state-sponsored threat actors gained access to US critical Infrastructure, including energy, transportation, telecommunications and water sectors, and maintained access over several years,
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Cyber threat actors sponsored by the People’s Republic of China, are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical infrastructure in the event of a major crisis or conflict with the United States. In this course, we’ll discuss the tactics, techniques and procedures used by People’s Republic of China state-sponsored actors to gain access to, and maintain persistence on IT networks, and position themselves to be able to disrupt operational technology. We’ll also explore how the threat actors showed exceptional operational security by relying heavily on Living Off The Land techniques, which led to their intrusions going undetected for months, or in some cases, years.