Could This Be The Best Offer In Cyber Security Skills Development Training...
An Exclusive Partnership between CYBER RANGES and MAD20 Technologies™
A collaborative program for individuals and teams, focused on real-world competencies for immediate impact on cyber operations
Developed by the best. Utilized by the best.
MAD20™’s courses, assessments, and agile certification program focus on skills training and real-world mastery, enabling certified defenders to immediately adopt and leverage the MITRE ATT&CK® knowledge base in their work environment.
Originally developed by MITRE, MAD20 certifies the world's best infosec teams on advanced cyber risk mitigation to combat dynamic and persistent threats.
1 Year Certification and Training Access Fee $499*
👇 + Exclusive CYBER RANGES Bonus Content Worth $250 Available Until 11th Jan 2024👇
Living Certification™ structured to maintain a continuous advantage over time
MAD20™ is changing the game in cyber certifications with an agile Living Certification™ program that promotes defenders to continuously update their knowledge and skills against the latest threats. MAD20™ offers updated certifications when the threat landscape changes, helping certified defenders maintain a continual advantage over adversaries.
The MAD20™ curriculum helps defenders apply ATT&CK® across critical areas of cyber operations, cyber threat intelligence, testing and evaluation, and defensive measures. The curriculum is constantly growing and offers skills training and credentialing in the areas of:
Experience 'The' Trusted Cyber Range...
FAQ's
MAD20 Related
MAD20 now runs MAD(tm) as Living Certification to align it with the progress of the ATT&CK Framework and to keep your Digital badges updated.
For US Veterans: Provide us a Certificate of Release or Discharge from Active Duty (DD214) or a letter from the U.S. Department of Veteran Affairs that states a service-connected condition?
For Students: Provide a valid enrolment certificate of attendance at your university or college as well as a photo ID.
CYBER RANGES Related
A comprehensive curriculum of Video Training and CYBER RANGES' labs ensures holistic threat-informed operations training, professional development and certification
Some of the lead content producers for the MAD20 Program...
👇 What's Included 👇
MAD20™ Module Certification and Roadmap
MITRE ATT&CK® Fundamentals
MITRE’s own ATT&CK subject matter experts produced this course, it is the first and fundamental piece of the MAD20™ online training series.
The First and Fundamental Piece of The MAD20 Online Training Series
Introduces the MITRE ATT&CK framework, a globally accessible knowledge base, and a cyber adversary behavior model based on real-world observations
Familiarizes learners with how the ATT&CK knowledge base documents real-world adversary tactics, techniques, and procedures (TTPs)
Demonstrates the various ways to exploit this understanding of adversary TTPs to address current (operational) and future
(strategic) threats
MITRE ATT&CK® Cyber Threat Intelligence
MITRE’s own ATT&CK subject matter experts produced MAD20™’s ATT&CK for Cyber Threat Intelligence course. This training maybe completed solo or as a team.The authors recommend viewing the video for each module first.
Learn Cyber Threat Intelligence
This training may be completed solo or as a team. The authors recommend viewing the video for each module first. When prompted, pause the video to access the associated exercise documents, complete the exercises, and then view the video to go over the exercise.
This training will:
Introduce learners to MITRE ATT&CK and why it’s useful for CTI and…
- Show learners how to map to ATT&CK from both finished reporting and raw data
- Share why it’s challenging to store ATT&CK-mapped data and what to consider when doing so
- Visualize how to perform CTI analysis using ATT&CK-mapped data
- Familiarize learners with making defensive recommendations based on CTI analysis
Target Audience
- Threat Model Assessor
- Insider Risk & Threat Management
- Enterprise Threat Management Team Member
- Threat & Vulnerability Manager
Course Prerequisites
- Have a solid understanding of the ATT&CK Framework
- Understand security concepts, or have prior CTI field experience
- Complete the ATT&CK Cyber Threat Intelligence course
Course Goals
- Establish a learner’s comfort level with identifying, developing, analyzing, and applying ATT&CK-mapped intelligence
- Increase learner familiarity with data storage considerations
- Familiarize learners with making defensive recommendations based on all analysis described above
- Have a solid understanding of the ATT&CK Framework
- Understand security concepts, or have prior CTI field experience
- Complete the ATT&CK Cyber Threat Intelligence course
MITRE ATT&CK® Security Operations Center Assessment Certification
MITRE’s own ATT&CK subject matter experts produced MAD20’s ATT&CK SOC Assessments course to familiarize learners with how to implement ATT&CK for visibility into where a SOC needs improvements, and inform how to apply ATT&CK to design a rapid, low overhead, and broad SOC Assessment.
Learn How to Conduct Thorough SOC Assessments Mapped to MITRE ATT&CK
Experts from MITRE produced this course to validate a defender’s ability to conduct Security Operations Center (SOC) assessments that are rapid, have low overhead, and are broad enough to help the SOC get on their feet with ATT&CK. The certification affirms mastery at analyzing SOC technologies, like tools and data sources, savviness at interviewing and discussing ATT&CK with SOC personnel, and proficiency at recommending improvements based on the assessment’s results.
This training will:
Introduce learners to MITRE ATT&CK and…
- Provide tips on how to analyze SOC technologies like tools and data sources
- Share best practices for performing interviews and leading discussions on ATT&CK with SOC personnel
- Educate on how to recommend changes based on assessment results
Target Audience
- Cyber Security Manager
- Cyber Strategy & Management Manager
- Cyber Risk Management Engineer
- Cyber Risk Manager
- Cyber Risk Management – Intern
Course Prerequisites
- Have a solid understanding of the ATT&CK Framework
- Understand information security technology and security operations
- Complete the ATT&CK SOC Assessment training course
Course Goals
- Enable learners to conduct Security Operations Center (SOC) assessments that are rapid, have low overhead, and are broad enough to help the SOC get on their feet with ATT&CK
- Ensure mastery of analyzing SOC technologies
- Teach learners to analyze assessment results and make recommendations
MITRE ATT&CK® Adversary Emulation Methodology Certification
This course prepares you to apply ATT&CK to adversary emulation activities. You will learn foundational adversary emulation concepts, aswell as how to research, implement, and ethically execute adversary TTP’s based on ATT&CK. Additionally, you will be prepared to succeed in earning the MAD20 Adversary Emulation certification.
Learn How to Conduct Adversary Emulation Activities Using ATT&CK®
Experts from MITRE produced this course to develop a practitioner’s ability to conduct adversary emulation activities based on real-world threats. The course takes learners through the exercise of research, planning, TTP implementation, and execution. The certification affirms mastery at researching, implementing, and ethically executing adversary TTPs to help organizations assess and improve cybersecurity.
Course Goals
- Develop familiarity with the Center for Threat Informed Defense (CTID) emulation library
- Learn to research adversary TTPs and construct the TTP outline
- Become proficient in developing an adversary emulation plan and documenting activities
Target Audience
- Cyber Threat Hunting and Adversary Emulation Analyst
- Offensive Security Developer
- Red Team Developer
- Senior Risk Analyst
Course Prerequisites
- Learners should have a solid understanding of the ATT&CK Framework
- Learners should be comfortable building a lab environment
MITRE ATT&CK® Threat Hunting and Detection Engineering
This course teaches students how to utilize knowledge of adversary TTPs as described in the MITRE ATT&CK framework to develop, test, tune, and employ robust analytics to detect and investigate malicious cyberactivity. Students taking this course will learn how to leverage ATT&CK to develop hypotheses, determine data collection requirements, identify and mitigate collection gaps, test and tune analytics using purple-teaming, and conduct a threat-informed hunt.
Learn How to Threat Hunt
The Threat Hunting Fundamentals Badge verifies an understanding of how ATT&CK can be used as a malicious activity model to conduct the six steps of the TTP-based threat hunt methodology.
Experts from MITRE produced this course to teach students how to utilize knowledge of adversary TTPs as described in the MITRE ATT&CK framework to develop, test, tune, and employ robust analytics to detect and investigate malicious cyber activity.
Learners taking this course will learn how to leverage ATT&CK to develop hypotheses, determine data collection requirements, identify and mitigate collection gaps, test and tune analytics using purple teaming, and conduct a threat-informed hunt.
The ability to apply the TTP-based hunting methodology, as demonstrated by successful completion of this program, supports your dedication to securing critical networks and systems against attacks from advanced cyber adversaries.
Target Audience
- Cybersecurity / Information Security Analyst
- (Junior/Senior) Threat Hunter
- Senior Cybersecurity Analyst
- Network Architect
- Computer and Information Systems Manager
Course Prerequisites
- Practitioners should have a solid understanding of the ATT&CK Framework
- Familiarity with Windows, Splunk or ELK, and networking fundamentals
- We highly recommend taking the ATT&CK Threat Hunting course to facilitate success
Course Goals
- Teach learners to execute a six-step TTP-based hunting methodology centered on use of the ATT&CK® Framework
- Learn to effectively identify adversarial behaviors of interest
- Easily articulate hunt-directing hypotheses that inform the development of written analytics that drive information needs and data collection requirements
MITRE ATT&CK® Purple Teaming Methodology
Do you want to learn the exciting discipline of Purple Teaming? In thisMAD20 Purple Teaming Fundamentals course, you’ll learn to do collaborative purple teaming focused on prioritized malicious behaviors. Experts from MITRE show you the actionable defensive rewards that only come when red and blue teams work together.
Learn How to Purple Team
Experts from MITRE produced this course to show you the actionable defensive rewards that only come when red and blue teams work together. This course requires an understanding of all other aspects of the MAD20™ online training series and will hone your ability to:
- Emulate adversarial behavior for the purposes of purple team exercises
- Deliver actionable, robust defensive recommendations such as new data collection requirements, mitigations, system reconfigurations, and analytics.
- Seamlessly integrate knowledge from Adversary Emulation, Threat Hunting, CTI, and Purple Teaming fundamentals to develop a comprehensive strategy.
Target Audience
Course Prerequisites
Course Goals
- Deliver actionable recommendations to your organization based on the observable and perceived threat landscape and organization characteristic
- Effectively communicate defensive recommendations to your organization based on comprehensive Red Team and Blue Team techniques
- Interact with Red Teams and Blue Teams within your organization to develop such strategies
👇 + Exclusive CYBER RANGES Bonus Content Worth $250 Available Until 11th Jan 2024👇
Are you ready to test your expertise and become the smartest Cyber Fighter in the room?
Exclusive Bonus Content
BONUS - 1 Months Complementary Access to CYBER RANGES MITRE ATT&CK Simulations (worth $250+)
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations, as developed and maintained by MITRE*.
The ATT&CK® knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
Our partnership with MITRE Engenuity gives users access to a range of MITRE ATT&CK simulation-based training based around next-generation CYBER RANGES technology. Explore the full range of MITRE based scenarios and playlists and learn vital skills that have been developed around the MITRE ATT&CK Framework.
Full list of content below purchase area.
BONUS - 1 Months Complementary Access to CYBER RANGES MITRE ATT&CK Simulations (worth $250+)
MITRE ATT&CK Hacking Challenges – Easy
MITRE ATT&CK – Solar Eclipse
MITRE ATT&CK – Long Live French Fries
MITRE ATT&CK – Blue Patches
MITRE ATT&CK – Dirty! Dirty! Dirty!
MITRE ATT&CK – Mail from Charlie
MITRE ATT&CK – Awesome Rubber
MITRE ATT&CK – PeaHP
MITRE ATT&CK – Logs Assemble
MITRE ATT&CK – This is Tragic
MITRE ATT&CK – Zero Fun
MITRE ATT&CK – Eternal Regret
MITRE ATT&CK – Judith
MITRE ATT&CK – Romance is Dead?
MITRE ATT&CK – Cats Love Mice
MITRE ATT&CK – A Shocking Revelation
MITRE ATT&CK Hacking Challenges – Medium
MITRE ATT&CK – Are you a keeper?
MITRE ATT&CK – Venus
MITRE ATT&CK – Sharing is Caring
MITRE ATT&CK – We really love our Admins
MITRE ATT&CK – Adam
MITRE ATT&CK – Slyther
MITRE ATT&CK – Secrets
MITRE ATT&CK – Cross
MITRE ATT&CK – Why so legacy?
MITRE ATT&CK – Broadcasts
MITRE ATT&CK – Champion014
MITRE ATT&CK – Kerby
MITRE ATT&CK – Malfoy and Friends
MITRE ATT&CK – Drooper Trooper
MITRE ATT&CK – Shadow Banned
MITRE ATT&CK Hacking Challenges – Advanced
MITRE ATT&CK – Continuous Jake
MITRE ATT&CK – November
MITRE ATT&CK – Monday Blues
MITRE ATT&CK – Billy the Kid
MITRE ATT&CK – What’s up Dave
MITRE ATT&CK – Homebot
MITRE ATT&CK – Stacking Keys
MITRE ATT&CK – Jim
MITRE ATT&CK – Need Some Prints
MITRE ATT&CK – Bye Bye Salt
MITRE ATT&CK – Get the formats right!
MITRE ATT&CK – Maximiliano
MITRE ATT&CK – Chains
MITRE ATT&CK – Cryptic
MITRE ATT&CK Fundamentals
MITRE ATT&CK Framework Basics Part 1
MITRE ATT&CK Framework Basics Part 2
MITRE ATT&CK Framework Basics Part 3
Introduction to Mitre ATT&CK Navigator Part 1
Introduction to Mitre ATT&CK Navigator Part 2
Introduction to Mitre ATT&CK Navigator Part 3
Cyber Threat Intelligence with Mitre ATT&CK
Cyber Threat Hunting with Sigma and MITRE ATT&CK
Atomic Red Tests With MITRE ATT&CK
Atomic Red Team with MITRE ATT&CK – Initial Access
Atomic Red Team with MITRE ATT&CK – Execution
Atomic Red Team with MITRE ATT&CK – Persistence
Atomic Red Team with MITRE ATT&CK – Privilege Esc
Atomic Red Team with MITRE ATT&CK -Defense Evasion
Atomic Red Team & MITRE ATT&CK-Credential Access
Atomic Red Team with MITRE ATT&CK-Lateral Movement
Atomic Red Team with MITRE ATT&CK – Discovery
Atomic Red Team with MITRE ATT&CK – Collection
Atomic Red Team & MITRE ATT&CK-Command and Control