MITRE ATT&CK®
Whether you're starting a cybersecurity career, pursuing a certification, or defending against evolving threats, Cybrary's training—built around frameworks like MITRE ATT&CK—has you covered.


Align to the MITRE ATT&CK® Framework




Threat-Informed Security Training
Detect and mitigate threats with tools, techniques, and attack scenarios aligned to real-world kill chains.

Practical Threat Modeling
This course provides an in-depth exploration of advanced threat modeling techniques. It covers essential tools like MITRE ATT&CK Navigator and Deciduous, and guides you through developing detailed threat models for complex environments. Learn to visualize attack paths and conduct thorough threat modeling workshops.

Kerberoasting and Domain Accounts
Kerberos enables secure network communication in Windows environments, while Domain Accounts are a core part of Identity and Access Management. Adversaries can attack both of these and move through an environment largely undetected. Start detecting this covert behavior and begin stopping it in its tracks today.

Match Legitimate Name or Location and Data Encrypted for Impact
Once in your environment, adversaries will try to evade your defenses and may rename their code to look like a legitimate executable. They could also encrypt your data with ransomware. Don't let adversaries hold you over a barrel. Get hands-on and learn to detect and mitigate these techniques today.

Application Shimming and Data from Local System
Application shimming is a powerful feature that allows for backward compatibility across different versions of Windows OS. Adversaries manipulate this feature to bypass controls. They also search local file systems for files of interest. Get the skills to detect this behavior and prevent adversaries from setting up shop in your organization.

Spearphishing Attachment and PowerShell
Phishing is one of the top techniques leveraged in breaches today, and adversaries use it to send malicious attachments to targeted users. PowerShell is a powerful scripting tool that adversaries can exploit to perform recon and run executables. You will detect these adversary techniques and discover ways to mitigate them.

Strengthen Your Defenses
Be prepared to tackle the latest security threats with threat-informed training.
Cybrary’s exclusive course offerings aligned to the MITRE-ATT&CK Framework will empower you to level up your analytical and hands-on skills.
Adopt innovative strategies for conducting threat hunts, emulating adversaries, enhancing detections, and performing CTI analysis.
Get even more tactical, hands-on experience in our Threat Actor Campaign courses focused on detecting real-world adversary techniques.
FAQs
MITRE ATT&CK Defender (MAD) is no longer available on Cybrary, read the help center article to learn more
No. We’ve helped more than 3 million learners, with varying levels of education and experience, develop their cybersecurity skills and reach their career goals.
No. You won’t need any additional hardware or tools. All of our learning activities can be completed from the comfort of your own browser.
You may cancel your automatic renewal at any time. You will continue to have access to your subscription through the end of your current billing period. Please note that we do not provide refunds for any subscriptions purchased.
We do not offer refunds on previous purchases. Cybrary Insider Pro is available in both monthly and annual subscription options. Should you have questions regarding our refund policy, please contact support@cybrary.it.
Empower Your Team, Protect Your Organization
Empower your team to detect and mitigate cybersecurity threats with Cybrary. Request a demo today for access to hands-on practice labs, assessments, custom content, and more.








