One year of unlimited access to ATT&CK badges and certifications – USD 499
MAD Training and Certification CurriculumÂ
MAD delivers a comprehensive curriculum to ensure holistic threat-informed operationsÂ
The curriculum is constantly growing and currently offers skills training and credentialing programs in the areas of:Â
- ATT&CK Fundamentals Â
- ATT&CK for Cyber Threat Intelligence (CTI)Â
- ATT&CK for Security Operations Center (SOC) Assessments Â
- ATT&CK for Adversary Emulation Methodology Â
- ATT&CK for Threat Hunting and Detection Engineering Â
- ATT&CK Purple Teaming FundamentalsÂ
CYBER RANGES Partnership
MAD subscribers will soon have access to labs running on a next-generation cyber range
CYBER RANGES Corp. delivers world-class cyber security training and capability development exercises using next-generation technology and services for the design, delivery, and management of simulation-based, deep-dive experiences in cyber security. The platform delivers real-world scenarios to better prepare security operators and managers to be able to work with real threats. Â
The partnership between CYBER RANGES and MAD adds access to MAD-developed labs running on the CYBER RANGES platform, enabling learners to practice the skills they learn in the training around Adversary Emulation and Threat Hunting. Going forward, the partnership will bring new hands-on assessments and credentials, offering MAD subscribers new ways to prove their mastery of ATT&CK-based Adversary Emulation and Threat Hunting concepts.Â
CYBER RANGES fully supports MITRE ATT&CK across its entire cyber range architecture. Through its proprietary Injector Engine CYBER RANGES platform can automatically emulate the latest-intel attacks, APTs, and specific tactics and exploits from the MITRE ATT&CK Matrixâ„¢. Â
ATT&CK Fundamentals CredentialÂ
An ATT&CK Fundamentals course and credential created by ATT&CK subject matter expert, Jamie Williams. This is the first and fundamental piece of the MITRE ATT&CK Defenderâ„¢ (MAD) series to educate and affirm that a defender:Â
- Understands the MITRE ATT&CK framework, a globally accessible knowledge base, and a cyber adversary behavior model based on real-world observations.Â
- Is familiar with how the ATT&CK knowledge base documents real-world adversary tactics, techniques, and procedures (TTPs).Â
- Can visualize the various ways to exploit the understanding of adversary TTPs to address current (operational) and future (strategic) threats.Â
- Grasps how ATT&CK enables us to produce measurable and trackable answers to the hard questions we face every day as defenders, such as “how does our decision to ____ make us better/worse at defending against threats?”Â
Module 1: Understanding ATT&CK
1.1 Introduction to ATT&CK 5 minutes
1.2 Matrices/Platforms 3 minutes
1.3 Tactics 2 minutes
1.4 Techniques and Sub-Techniques 4 minutes
1.5 Mitigations 2 minutes
1.6 Data Sources and Detections 4 minutes
1.7 Groups and Software 3 minutes
1.8 How ATT&CK Grows and Evolves 4 minutes
Module 2: Benefits of Using ATT&CK
2.1 Community Perspective 3 minutes
2.2 Common Language 2 minutes
2.3 Quantitative Scorecard 2 minutes
2.4 ATT&CK Navigator 4 minutes
Module 3: Operationalizing ATT&CK
3.1 Cyber Threat Intelligence 3 minutes
3.2 Detection and Analysis 3 minutes
3.3 Threat Emulation 3 minutes
3.4 Assessment and Engineering 3 minutes
3.5 Putting it all Together into Threat-Informed Defense 2 minutes
3.6 Course Summary 1 minute
ATT&CK Cyber Threat Intelligence Certification and Training ProgramÂ
 Â
This is an intermediate-level program to inform and affirm a defender’s mastery in the skill to identify, develop, analyze, and apply ATT&CK-mapped intelligence. Defenders must earn five distinct badges to achieve the ATT&CK for CTI certification:Â
- ATT&CK Cyber Threat Intelligence from Narrative Reporting BadgeÂ
- ATT&CK Cyber Threat Intelligence from Raw Data BadgeÂ
- ATT&CK Cyber Threat Intelligence Storage and Analysis BadgeÂ
- ATT&CK Cyber Threat Intelligence Defensive Recommendations BadgeÂ
- ATT&CK Cyber Threat Intelligence CertificationÂ
Pre-requisites:Â
- Practitioners should have a solid understanding of the ATT&CK FrameworkÂ
- An understanding of security concepts, previous training, or prior CTI field experienceÂ
- We highly recommend taking the ATT&CK Cyber Threat Intelligence course to facilitate successÂ
Training ModulesÂ
ATT&CK subject matter experts, Adam Pennington, Amy Robertson, and Jaclyn Lasky, produced MITRE ATT&CK Defender’s ATT&CK for Cyber Threat Intelligence course. This training may be completed solo or as a team. This training will:Â
- Introduce learners to ATT&CK and why it’s useful for CTI
- Show learners how to map to ATT&CK from both finished reporting and raw dataÂ
- Share why it’s challenging to store ATT&CK-mapped data and what to consider when doing so
- Visualize how to perform CTI analysis using ATT&CK-mapped data
- Familiarize learners with making defensive recommendations based on CTI analysis
Module 1: Mapping to ATT&CK from Narrative Reports
1.1 Introduction: Challenges, Advantages and the Process of Mapping to ATT&CK 15 minutes
1.2 Finding and Researching the Behavior 8 minutes
1.3 Translating the Behavior into a Tactic 10 minutes
1.4 Identifying Techniques or Sub-Techniques 12 minutes
1.5 Mapping to a Narrative Point 10 minutes
1.6 Hedging Your Biases 10 minutes
Module 2: Mapping to ATT&CK from Raw DataÂ
2.1 The Process of Mapping from Raw Data 5 minutes
2.2 Identify and Research Behaviors 5 minutes
2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques 4 minutes
2.4 Raw Data to Narrative Reporting 8 minutes
Module 3: Storing and Analyzing ATT&CK-Mapped DataÂ
3.1 Storing and Displaying ATT&CK-Mapped Data 3 minutes
3.2 Expressing and Storing ATT&CK-Mapped Data 3 minutes
3.3 Analyzing ATT&CK-Mapped Data 5 minutes
3.4 Exercise 3: Comparing Layers in ATT&CK Navigator 1 minute
Module 4: Making Defensive Recommendations from ATT&CK-Mapped DataÂ
4.1 | The Defensive Recommendations Process | 5 minutes |
4.2 | How Techniques and Sub-Techniques are Being Used | 8 minutes |
4.3 | Researching Organizational Capabilities & Constraints & Determine Trade-Offs | 9 minutes |
4.4 | Make Defensive Recommendations | 12 minutes |
ATT&CK Security Operations Center Assessments Certification and Training ProgramÂ
Â
This is an intermediate level program that educates and endorses mastery in the skill to conduct Security Operations Center (SOC) assessments that are rapid, have low overhead, and are broad enough to help the SOC get on their feet with ATT&CK. The certification affirms your mastery at analyzing SOC technologies, like tools and data sources, savviness at interviewing and discussing ATT&CK with SOC personnel, and recommend improvements based on the assessments’ results. Defenders must earn four distinct badges to achieve the ATT&CK for SOC Assessments certification:Â
- ATT&CK FundamentalsÂ
- ATT&CK Security Operations Center Assessment FundamentalsÂ
- ATT&CK Security Operations Center Assessment AnalysisÂ
- ATT&CK Security Operations Center Assessment SynthesisÂ
Pre-requisites:Â
- Practitioners should have a solid understanding of the ATT&CK FrameworkÂ
- An understanding of information security technology and security operationsÂ
- We highly recommend taking the ATT&CK SOC Assessments course to facilitate successÂ
Training ModulesÂ
ATT&CK subject matter experts, Andy Applebaum and Dr. Clem Skorupka produced the ATT&CK SOC Assessments course to familiarize learners with how to implement ATT&CK for visibility into where a SOC needs improvements and inform how to apply ATT&CK to design a rapid, low overhead, and broad SOC Assessment. This training will:Â
- Provide tips on how to analyze SOC technologies like tools and data sourcesÂ
- Share best practices for performing interviews and leading discussions on ATT&CK with SOC personnelÂ
- Educate on how to recommend changes based on assessment resultsÂ
Module 1: Mapping to ATT&CK from Narrative ReportsÂ
1.1 Introduction: Bringing ATT&CK into the SOC 8 minutes
1.2 A Methodology for Assessments 9 minutes
1.3 Framing an Assessment 10 minutes
1.4 Scoping an Assessment 6 minutes
Module 2: Mapping to ATT&CK from Raw DataÂ
2.1 Setting a Coverage Rubric 12 minutes
2.2 Working with Data Sources Part 1 10 minutes
2.3 Working with Data Sources Part 2 7 minutes
2.4 Analyzing Analytics 14 minutes
2.5 Breaking Down Tools 13 minutes
Module 3: Storing and Analyzing ATT&CK-Mapped DataÂ
3.1 Interviewing Staff 14 minutes
3.2 Communicating with ATT&CK 14 minutes
3.3 Compiling a Final Heatmap Part 1 13 minutes
3.4 Compiling a Final Heatmap Part 2 9 minutes
3.5 Proposing Recommendations Part 1 12 minutes
3.6 Proposing Recommendations Part 2 13 minutes
3.7 SOC Assessments Demo 1 13 minutes
3.8 SOC Assessments Demo 2 11 minutes
ATT&CK Adversary Emulation Methodology Certification and Training Program
  Â
The program educates and validates a practitioner’s ability to conduct adversary emulation activities based on real-world threats. The defender learns and proves mastery at researching, implementing, and ethically executing adversary TTPs to help organizations assess and improve cybersecurity. Defenders must earn five distinct badges to achieve theAdversary Emulation Methodology certification:Â
- ATT&CK FundamentalsÂ
- ATT&CK Adversary Emulation FundamentalsÂ
- ATT&CK Adversary Emulation TTP ResearchÂ
- ATT&CK Adversary Emulation PlanningÂ
- ATT&CK Adversary Emulation TTP ImplementationÂ
- ATT&CK Adversary Emulation Execution
Pre-requisites:Â
- Practitioners should have a solid understanding of the ATT&CK FrameworkÂ
- Competent with basic Windows and Linux command-line toolsÂ
- We highly recommend taking the ATT&CK Adversary Emulation Fundamentals course to facilitate success
- (Recommended) Familiarity with common red team tools and techniques (example: Metasploit)Â
- (Recommended) An understanding of cyber threat intelligence practices through the ATT&CK Cyber Threat intelligence courseÂ
ATT&CK Threat Hunting and Detection Engineering Certification and Training Program
The program enables defenders to demonstrate foundational knowledge that supports the execution of a six-step TTP-based hunting methodology centered on the use of the ATT&CK Framework. It is designed for practitioners who can apply a solid understanding of the ATT&CK Framework, adversarial behaviors of interest, and possess the ability to articulate hunt-directing hypotheses that inform the development of written analytics that drive information needs and data collection requirements. The credential verifies the ability to apply the TTP-based hunting methodology and supports dedication to securing critical networks and systems against attacks from advanced cyber adversaries.Â
Defenders must earn six distinct badges to achieve the Threat Hunting and Detection Engineering Certification: Â
- ATT&CK Threat Hunting FundamentalsÂ
- ATT&CK Threat Hunting HypothesesÂ
- ATT&CK Threat Hunting Data Collection RequirementsÂ
- ATT&CK Threat Hunting Addressing Data Collection GapsÂ
- ATT&CK Threat Hunting Tuning AnalyticsÂ
- ATT&CK Threat Hunting ApplicationÂ
Purple Teaming Methodology Certification and Training ProgramÂ
The program enables defenders to demonstrate foundational knowledge on how to effectively prepare for, execute, and leverage purple teaming. It is designed for practitioners who want to run or strengthen their purple team. The credential verifies the ability to run a collaborative purple team which deviates from a traditional approach, facilitates collaboration between red and blue team to advance the capabilities and defenses of the blue team. While delivering actionable robust defensive recommendations, such as new data collection requirements, mitigations, system reconfigurations, and analytics. Defenders must earn six distinct badges to achieve the Purple Teaming Methodology Certification:Â
- ATT&CK Adversary Emulation FundamentalsÂ
- ATT&CK Threat Hunting FundamentalsÂ
- ATT&CK Cyber Threat Intelligence (CTI) Defense RecommendationsÂ
- ATT&CK Purple Teaming FundamentalsÂ
Stay Informed
Sign up for news about MITRE Engenuity and the critical technical challenges facing our nation and world.