MAD Adv. Emulation
MITRE ATT&CK Defender — Adversary Emulation Methodology
The most hands-on intensive MAD20 track: Adversary Emulation based on ATT&CK. 30 lectures, 7 hands-on labs, 60+ range scenarios via the ARENAS platform. Covers planning, development and execution of adversary emulation plans. Badge upon completion (21 CPE hours).
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Built for these roles
› Exam format
Course-based with badge: 30 lectures + 7 labs + 60+ range scenarios (ARENAS). No separate exam. 21 CPE hours.
› Recertification
Annual AMF program required to maintain certification. Access to updated course content and exclusive webinars.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 1 domain this cert is centrally about. Passing the exam demonstrates working knowledge of each.
› Prerequisites
MAD ATT&CK Fundamentals (required). Recommended: red team or pentest experience.
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
No certs require this one.
No follow-on certs reference this one yet.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.