MITRE ATT&CK®
Whether you're starting a cybersecurity career, pursuing a certification, or defending against evolving threats, Cybrary's training—built around frameworks like MITRE ATT&CK—has you covered.


Align to the MITRE ATT&CK® Framework




Threat-Informed Security Training
Detect and mitigate threats with tools, techniques, and attack scenarios aligned to real-world kill chains.

Exfiltration to Cloud Storage
Cloud storage is fast, affordable, and widely available. Adversaries take advantage of a tool that works well just like we do. It's even better when they can use a cloud storage provider your organization already uses, allowing them to exfiltrate data encrypted via HTTPS to a service that looks like normal traffic. Learn how to detect this today.

Non-Standard Port
Many organizations still don't block unknown outbound ports. This allows adversaries to leverage them for command and control activities. Even if you are blocking these ports adversaries can use standard ports with different protocols to avoid detection. Learn how to detect and thwart this command and control behavior to secure your environment.

Remote System Discovery and Remote Desktop Protocol
Adversaries want to understand your environment and will use Remote System Discovery to do so. They can also leverage the same Remote Desktop Protocol (RDP) you'd use to access systems remotely. And, with the right credentials, they can move laterally through your system. Outwit them by detecting and blocking these techniques today.

SSH Authorized Keys
SSH Authorized Keys are widely used as credentials for remotely accessing Linux-based systems via SSH. Adversaries can manipulate these keys to give themselves persistence in your environment so they can return at will. Get hands-on detecting and mitigating this adversary action today.

Advanced Cyber Threat Intelligence
Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? Learn to leverage existing data sources, reduce false positives, and use models like the Cyber Kill Chain, and the MITRE ATT&CK framework to structure your analysis in this Advanced Cyber Threat Intelligence course.

Lateral Movement: Windows Remote Management
In order to achieve lateral movement, threat actors will use a valid account to access remote systems, such as the Windows Remote Management service. In this way, the threat actor can move around the network and search for valuable information or greater access. Learn more and get hands-on with this technique by detecting it in our virtual lab.

Application Layer Protocol for C2 and Exfil to Cloud
Threat actors like APT29 use Application Layer Protocols for Command and Control (C2) so they can blend in and avoid detection. They also may attempt to steal data and exfiltrate it to a cloud storage service as the end-goal of their attack. In this course, you will learn about these techniques and get practice detecting them in our virtual lab.

Strengthen Your Defenses
Be prepared to tackle the latest security threats with threat-informed training.
Cybrary’s exclusive course offerings aligned to the MITRE-ATT&CK Framework will empower you to level up your analytical and hands-on skills.
Adopt innovative strategies for conducting threat hunts, emulating adversaries, enhancing detections, and performing CTI analysis.
Get even more tactical, hands-on experience in our Threat Actor Campaign courses focused on detecting real-world adversary techniques.
FAQs
MITRE ATT&CK Defender (MAD) is no longer available on Cybrary, read the help center article to learn more
No. We’ve helped more than 3 million learners, with varying levels of education and experience, develop their cybersecurity skills and reach their career goals.
No. You won’t need any additional hardware or tools. All of our learning activities can be completed from the comfort of your own browser.
You may cancel your automatic renewal at any time. You will continue to have access to your subscription through the end of your current billing period. Please note that we do not provide refunds for any subscriptions purchased.
We do not offer refunds on previous purchases. Cybrary Insider Pro is available in both monthly and annual subscription options. Should you have questions regarding our refund policy, please contact support@cybrary.it.
Empower Your Team, Protect Your Organization
Empower your team to detect and mitigate cybersecurity threats with Cybrary. Request a demo today for access to hands-on practice labs, assessments, custom content, and more.






