MAD Threat Hunting
MITRE ATT&CK Defender — Threat Hunting and Detection Engineering
MAD20 track for Threat Hunting and Detection Engineering with ATT&CK. 28 lectures, complete analytics walkthroughs, 60+ range scenarios. Covers systematic development of detection rules and hunting hypotheses based on ATT&CK techniques. Badge upon completion (9 CPE hours).
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Built for these roles
› Exam format
Course-based with badge: 28 lectures + analytics walkthroughs + 60+ range scenarios. No separate exam. 9 CPE hours.
› Recertification
Annual AMF program required to maintain certification. Access to updated course content and exclusive webinars.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 2 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.
› Prerequisites
MAD ATT&CK Fundamentals (required). Recommended: SOC or hunting experience.
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
No certs require this one.
No follow-on certs reference this one yet.
› Careers that commonly pursue this cert
Analyze adversary behavior, track threat actors, and produce actionable intelligence that drives defensive decisions.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.