MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
MITRE Attack Navigator is a web-based tool for annotating and exploring ATT&CK matrices. It can be used to visualize defensive coverage, red/blue team planning, the frequency of detected techniques, and more.
The MITRE Cyber Analytics Repository (CAR) is a collection of analytics for detecting adversary behaviors based on the MITRE ATT&CK model. CAR provides pseudocode and code implementations for various tools (e.g., Splunk, EQL) and data sources. CAR also defines a data model and a sensor framework for observable data.
Search Katie Nickels on google. Everything she shared on Cyber Threat Intelligence (CTI) is valuable.
She is the Director of Intelligence at Red Canary and a Nonresident Senior Fellow at the Atlantic Council. She has worked on cyber threat intelligence (CTI), network defense, and incident response for nearly a decade for the U.S. Department of Defense (DoD), MITRE, Raytheon, and ManTech.
FREE Certification Courses
Picus Security
Link: academy.picussecurity.com
AttackIQ
Link: academy.attackiq.com
Cybrary
Link: www.cybrary.it
MITRE ATT&CK Defender (MAD)
MAD is a training and credentialing program for cybersecurity operations and individuals looking to strengthen their threat-informed defense approach to security. This is the official website for MITRE ATT&CK Certification exam.
Link: mad.mitre-engenuity.org
Miscellaneous
Suggested video on MITRE ATT&CK Fundamentals.
TTP based Threat Hunting (PDF).
MITRE ATT&CK for Dummies (PDF).