MAD CTI
MITRE ATT&CK Defender — Cyber Threat Intelligence
MAD20 track for applying the ATT&CK framework in Cyber Threat Intelligence. 18 lectures, focus on identification, development, analysis and application of ATT&CK-mapped threat intelligence. Badge upon course completion (13 CPE hours).
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Built for these roles
› Exam format
Course-based with badge: 18 lectures + hands-on. No separate exam. 13 CPE hours.
› Recertification
Annual AMF program required to maintain certification. Access to updated course content and exclusive webinars.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 1 domain this cert is centrally about. Passing the exam demonstrates working knowledge of each.
› Prerequisites
MAD ATT&CK Fundamentals (required). Recommended: CTI experience.
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
No certs require this one.
No follow-on certs reference this one yet.
› Careers that commonly pursue this cert
Analyze adversary behavior, track threat actors, and produce actionable intelligence that drives defensive decisions.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.