How the MITRE ATT&CK Framework Works

Coursera · Beginner ·🔐 Cybersecurity ·13h ago
Cyber attackers constantly adapt their methods, which makes it critical to understand how real-world attacks unfold. In this video, explore the MITRE ATT&CK framework and learn how it helps organizations map attacker behavior, strengthen defenses, and improve threat detection and response. Discover the framework’s core tactics and techniques, from reconnaissance and initial access to persistence, credential access, and impact. Build a stronger understanding of how cybersecurity teams use MITRE ATT&CK to prioritize risks, improve visibility, and defend against evolving threats. This video is …
Watch on YouTube ↗ (saves to browser)

Chapters (14)

Why the MITRE ATT&CK framework matters
0:08 What is the MITRE ATT&CK framework?
0:35 MITRE ATT&CK tactics and techniques overview
0:55 Reconnaissance and resource development
1:17 Initial access, execution, and persistence
1:47 Privilege escalation and defense evasion
2:09 Credential access, discovery, and lateral movement
2:41 Collection, command and control, exfiltration, and impact
3:18 How attackers move through different phases
3:54 Common MITRE ATT&CK techniques explained
5:00 Why these techniques matter for defenders
5:18 Benefits of the MITRE ATT&CK framework
5:50 How MITRE ATT&CK improves cybersecurity strategy
6:16 Why the framework keeps evolving
The most INSANE attack in JavaScript history?
Next Up
The most INSANE attack in JavaScript history?
Coding with Lewis