This course discusses how Chinese state-sponsored threat actors gained access to US critical Infrastructure, including energy, transportation, telecommunications and water sectors, and maintained access over several years,
Cyber threat actors sponsored by the People’s Republic of China, are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical infrastructure in the event of a major crisis or conflict with the United States. In this course, we’ll discuss the tactics, techniques and procedures used by People’s Republic of China state-sponsored actors to gain access to, and maintain persistence on IT networks, and position themselves to be able to disrupt operational technology. We’ll also explore how the threat actors showed exceptional operational security by relying heavily on Living Off The Land techniques, which led to their intrusions going undetected for months, or in some cases, years.
Cyber threat actors sponsored by the People’s Republic of China, are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical infrastructure in the event of a major crisis or conflict with the United States. In this course, we’ll discuss the tactics, techniques and procedures used by People’s Republic of China state-sponsored actors to gain access to, and maintain persistence on IT networks, and position themselves to be able to disrupt operational technology. We’ll also explore how the threat actors showed exceptional operational security by relying heavily on Living Off The Land techniques, which led to their intrusions going undetected for months, or in some cases, years.