{"id":77702,"date":"2022-12-22T11:09:38","date_gmt":"2022-12-22T11:09:38","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=77702"},"modified":"2025-09-24T11:04:11","modified_gmt":"2025-09-24T11:04:11","slug":"mitre-attack-uses-benefits","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/","title":{"rendered":"MITRE ATTACK: Meaning, Uses, and Benefits\u00a0\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"77702\" class=\"elementor elementor-77702\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f014b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f014b5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-03dd3b8\" data-id=\"03dd3b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91aa51d elementor-widget elementor-widget-text-editor\" data-id=\"91aa51d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MITRE ATT&amp;CK (Adversarial Tactics, Techniques, and Common Knowledge) is a knowledge base used by cybersecurity experts, but do you really know what it is and why it matters? Read on to learn everything you need to know about this important security tool.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5c0339d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c0339d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec3c112\" data-id=\"ec3c112\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2580232 elementor-widget elementor-widget-heading\" data-id=\"2580232\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is the MITRE ATTACK Framework?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2281dbd elementor-widget elementor-widget-text-editor\" data-id=\"2281dbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While \u201cMITRE ATTACK\u201d refers to the knowledge base, \u201cMITRE ATTACK\u201d refers to its framework. The\u202fMITRE ATTACK framework is a \u201cglobally-accessible knowledge base of adversary tactics and techniques based on real-world observations\u201d (MITRE) used for threat modeling language. The objective of ATTACK is to provide a common language for describing attacker behavior and to serve as a foundation for developing specific threat models and methodologies.<\/p>\n<p>The framework is designed for <a href=\"https:\/\/www.eccouncil.org\/programs\/\">cybersecurity<\/a> practitioners at all organizational levels, from analysts to executives. Practitioners can use it to inform decisions about detection, prevention, and response strategies. Additionally, the ATTACK framework can be used to\u202fbenchmark&nbsp;<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-mitre-attck-framework-how-to-boost-your-security-backbone\/\" target=\"_blank\">an organization&#8217;s security posture<\/a>&nbsp;against specific adversaries, measure the effectiveness of security controls, and assess gaps in defenses (VMWare, 2022).<\/p>\n<p>The MITRE ATTACK framework consists of three layers (Trellix):<\/p>\n<ul>\n<li><strong>Tactics:<\/strong> the actions used by an adversary to accomplish their objectives<\/li>\n<li><strong>Techniques:<\/strong> the specific methods or tools employed by an adversary to execute a tactic<\/li>\n<li><strong>Procedures:<\/strong> the detailed steps taken by an adversary to carry out a technique<\/li>\n<\/ul>\n<p>The framework is organized by tactics, which are grouped into categories based on their purpose. Each category contains techniques attackers can use to achieve the associated tactic. For each technique, there is a description of the procedure that an adversary may use to carry it out.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52b4c94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52b4c94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c13f4c8\" data-id=\"c13f4c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aa9dc67 elementor-widget elementor-widget-heading\" data-id=\"aa9dc67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is MITRE a Threat Model?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e03bc91 elementor-widget elementor-widget-text-editor\" data-id=\"e03bc91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tATTACK is the knowledge base used for MITRE\u2019s threat modeling language. In general, threat modeling identifies threats, vulnerabilities, and risks so that users can better understand and protect their systems. For example, engineers will consider fire hazards, earthquake risks, and flooding potential when designing a new building to make the structure as safe as possible. In the same way, analysts use threat modeling to identify potential weaknesses and vulnerabilities when developing a new cybersecurity system.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa1bd4f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa1bd4f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-060ae13\" data-id=\"060ae13\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c11c3a elementor-widget elementor-widget-heading\" data-id=\"7c11c3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Technologies Does ATTACK Apply To?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edd5712 elementor-widget elementor-widget-text-editor\" data-id=\"edd5712\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe ATTACK framework applies to various technologies,\u202fincluding but not limited to:\n<ul>\n \t<li><strong>Operating systems:<\/strong>\u202fWindows, Linux, macOS<\/li>\n \t<li><strong>Mobile devices:<\/strong>\u202fAndroid, iOS<\/li>\n \t<li><strong>Cloud providers:<\/strong>\u202fAmazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP)<\/li>\n \t<li><strong>Virtualization platforms:<\/strong>\u202fVMware, Xen<\/li>\n \t<li><strong>Container platforms:<\/strong>\u202fDocker, Kubernetes<\/li>\n \t<li><strong>Industrial control systems (ICS):<\/strong>\u202fSiemens Simatic WinCC, GE Proficy iFix<\/li>\n<\/ul>\nEach technology has its own specific MITRE ATTACK techniques that apply to that platform. For example, Windows has techniques such as\u202fProcess Injection\u202fand\u202fPrivilege Escalation that are specific to that operating system. Similarly, Code Injection and App Whitelisting Bypass techniques are specific to the Android platform.\n\nThe MITRE ATTACK framework is constantly updated with new techniques as attackers find new ways to exploit systems. Therefore, as new technologies emerge, the list of MITRE ATTACK applicable technologies will continue to grow.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d74fd5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d74fd5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-82385f8\" data-id=\"82385f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d810660 elementor-widget elementor-widget-heading\" data-id=\"d810660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is MITRE ATT&amp;CK Open Source?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-356294d elementor-widget elementor-widget-text-editor\" data-id=\"356294d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ATTACK is not itself open source, but the information contained within it is freely available to anyone. Anyone can use the ATTACK knowledge base to help improve their security posture (CyberArk, 2021).\u00a0<\/p><p>There are many ways to use MITRE ATTACK. One popular way is to create what are called &#8220;attack simulations.&#8221; In an attack simulation, defenders try to stop an adversary using known techniques from ATTACK. These simulations help defenders practice their responses to real-world threats and learn about any gaps in their defenses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a5c5542 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5c5542\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-87c1054\" data-id=\"87c1054\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-631e688 elementor-widget elementor-widget-heading\" data-id=\"631e688\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Many Tactics and Techniques are There in MITRE ATTACK?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42bdb14 elementor-widget elementor-widget-text-editor\" data-id=\"42bdb14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The current version of MITRE ATTACK includes nine tactics and more than 100 techniques. But that doesn&#8217;t mean there are only nine ways to attack a system or that there are only 100 techniques in existence. There are many more than that.\u00a0<\/p><p>Some common techniques include malware infection, social engineering, password guessing, SQL injection, and denial-of-service attacks. As attackers find new ways to exploit systems and people, new techniques are being created.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0b3d522 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b3d522\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-465cec2\" data-id=\"465cec2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-147f96b elementor-widget elementor-widget-heading\" data-id=\"147f96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Does MITRE ATTACK Help Security Operations?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c82fa13 elementor-widget elementor-widget-text-editor\" data-id=\"c82fa13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe goal of MITRE ATTACK is to provide a common language for discussing cybersecurity threats and to help security practitioners share information about TTPs. It is not meant to be a silver bullet or be used as a sole source of intelligence; practitioners should use it in conjunction with other tools and sources of information.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3fa20e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3fa20e4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f34e3e\" data-id=\"1f34e3e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a747ef elementor-widget elementor-widget-heading\" data-id=\"9a747ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The MITRE ATT&amp;CK Matrix: Tactics and Techniques<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6f62be elementor-widget elementor-widget-text-editor\" data-id=\"c6f62be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The objective of the ATTACK matrix is to better equip defenders to anticipate attacker behavior, identify gaps in their defenses, and implement mitigation strategies. The matrix and MITRE ATT&amp;CK techniques have been widely adopted within the cybersecurity community and are used by practitioners across various industries.\u00a0<\/p><p>The attack MITRE matrix consists of tactics grouped into three categories: initial access, execution, and persistence. Each tactic represents a high-level action that an attacker may take to gain access to a system or maintain access to a system. For each tactic, one or more associated MITRE ATT&amp;CK techniques describe how an attacker may execute that tactic.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dcf0bdb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dcf0bdb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-691418e\" data-id=\"691418e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b8daf5 elementor-widget elementor-widget-heading\" data-id=\"1b8daf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Are Some Use Cases of the MITRE ATTACK Matrix?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f73009 elementor-widget elementor-widget-text-editor\" data-id=\"3f73009\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One\u202fcommon use case for the matrix is identifying which assets within an organization are most critical and need to be protected. This can help prioritize security spending and ensure that the most critical assets are adequately defended. Additionally, the matrix can be used to assess an organization&#8217;s current security posture and identify gaps (Walkowski, 2021).&nbsp;<\/p>\n<p>The MITRE ATTACK matrix can also be used to create &#8220;playbooks&#8221; for different types of attacks (Anderson, 2020). These playbooks can be used to help incident response teams rapidly identify and respond to attacks. Additionally, the playbooks can train staff on how to respond to various types of attacks.<\/p>\n<p>Finally, threat intelligence analysts can use the matrix to track and analyze trends in<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mitre-framework\/\" target=\"_blank\"> MITRE attack techniques.&nbsp;<\/a>This information can then be used to develop better defenses against future attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8452783 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8452783\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d1cd91f\" data-id=\"d1cd91f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c43aef elementor-widget elementor-widget-heading\" data-id=\"2c43aef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Should an Ethical Hacker Know MITRE ATTACK?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb50382 elementor-widget elementor-widget-text-editor\" data-id=\"eb50382\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you&#8217;re in the security field, it&#8217;s essential to be aware of the\u00a0<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mitre-framework\/\" target=\"_blank\" rel=\"noopener\">MITRE ATTACK framework<\/a>. This is a comprehensive knowledge base of cyberattack techniques that can be used to help plan and defend against real-world threats. Learn from a\u00a0<a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">ethical hacking course<\/a>\u00a0to get\u00a0<a style=\"letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mitre-attck-framework-incident-response\/\" target=\"_blank\" rel=\"noopener\">training in essential skills.<\/a><\/p><p>EC-Council&#8217;s\u00a0<a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker course<\/a> &#8211; the CEH program is the most comprehensive ethical hacking course available today. The CEH curriculum covers all the topics in the MITRE ATTACK framework, making it the ideal training ground for anyone looking to get started in cybersecurity or take their career to the next level.<\/p><p>To learn more about our\u00a0<a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">CEH course<\/a>\u00a0and how we can help you become a certified ethical hacker, <a href=\"https:\/\/www.eccouncil.org\/\">contact EC-Council today<\/a>!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2443b31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2443b31\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f74c49\" data-id=\"2f74c49\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db24f7a elementor-widget elementor-widget-heading\" data-id=\"db24f7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">References<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85dfe0e elementor-widget elementor-widget-text-editor\" data-id=\"85dfe0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Anderson, E. (2020, December 10). MITRE ATTACK for ICS Matrix: What it is and how it\u2019s used. Industrial Defender. <em>https:\/\/www.industrialdefender.com\/blog\/mitre-attack-for-ics-what-it-is-how-its-used<\/em><\/p><p>CyberArk. (n.d.) MITRE ATTACK Framework. CyberArk. <em>http:\/\/www.cyberark.com\/what-is\/mitre-attack\/<\/em><\/p><p>Mitre. (n.d.) MITRE ATTACK. <em>https:\/\/attack.mitre.org\/<\/em><\/p><p>Trellix. What is the MITRE ATTACK framework? <em>https:\/\/www.trellix.com\/en-us\/security-awareness\/cybersecurity\/what-is-mitre-attack-framework.html<\/em><\/p><p>VMWare. (n.d.) What is MITRE ATTACK? <em>https:\/\/www.vmware.com\/no\/topics\/glossary\/content\/mitre-attack.html<\/em><\/p><p>Walkowski, D. (2021, June 10). MITRE ATTACK: What it is, how it works, who uses it and why. F5 Labs. <em>https:\/\/www.f5.com\/labs\/articles\/education\/mitre-attack-what-it-is-how-it-works-who-uses-it-and-why<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6773503 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6773503\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-308e042\" data-id=\"308e042\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15aeac8 elementor-widget elementor-widget-heading\" data-id=\"15aeac8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Author<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30f1da2 elementor-widget elementor-widget-text-editor\" data-id=\"30f1da2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tRyan Clancy is a writer and blogger. With 5+ years of mechanical engineering experience, he&#8217;s passionate about all things engineering and tech. He also loves bringing engineering (especially mechanical) down to a level that everyone can understand. Ryan lives in New York City, and writes about everything engineering and tech.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>MITRE ATT&amp;CK (Adversarial Tactics, Techniques, and Common Knowledge) is a knowledge base used by cybersecurity experts, but do you really know what it is and why it matters? Read on to learn everything you need to know about this important security tool. What is the MITRE ATTACK Framework? While \u201cMITRE ATTACK\u201d refers to the knowledge&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80310,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12083],"tags":[],"class_list":{"0":"post-77702","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethical-hacking"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Mitre Attack Framework Explained<\/title>\n<meta name=\"description\" content=\"Understand the mitre attack model or the mitre threat model. What is mitre att&amp;ck framework used for, its benefits, techniques, and use cases.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE ATTACK: Meaning, Uses, and Benefits\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Understand the mitre attack model or the mitre threat model. What is mitre att&amp;ck framework used for, its benefits, techniques, and use cases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T11:09:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T11:04:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/12\/Know-Everything-about-MITRE-ATTCK-feature-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"MITRE ATTACK: Meaning, Uses, and Benefits\u00a0\u00a0\",\"datePublished\":\"2022-12-22T11:09:38+00:00\",\"dateModified\":\"2025-09-24T11:04:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/\"},\"wordCount\":1279,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Know-Everything-about-MITRE-ATTCK-feature.jpg\",\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/\",\"name\":\"What is Mitre Attack Framework Explained\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Know-Everything-about-MITRE-ATTCK-feature.jpg\",\"datePublished\":\"2022-12-22T11:09:38+00:00\",\"dateModified\":\"2025-09-24T11:04:11+00:00\",\"description\":\"Understand the mitre attack model or the mitre threat model. What is mitre att&ck framework used for, its benefits, techniques, and use cases.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Know-Everything-about-MITRE-ATTCK-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Know-Everything-about-MITRE-ATTCK-feature.jpg\",\"width\":521,\"height\":521,\"caption\":\"What is the MITRE ATTACK Framework\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/mitre-attack-uses-benefits\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ethical Hacking\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MITRE ATTACK: Meaning, Uses, and Benefits\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Mitre Attack Framework Explained","description":"Understand the mitre attack model or the mitre threat model. What is mitre att&ck framework used for, its benefits, techniques, and use cases.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/","og_locale":"en_US","og_type":"article","og_title":"MITRE ATTACK: Meaning, Uses, and Benefits\u00a0\u00a0","og_description":"Understand the mitre attack model or the mitre threat model. What is mitre att&ck framework used for, its benefits, techniques, and use cases.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-12-22T11:09:38+00:00","article_modified_time":"2025-09-24T11:04:11+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/12\/Know-Everything-about-MITRE-ATTCK-feature-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"MITRE ATTACK: Meaning, Uses, and Benefits\u00a0\u00a0","datePublished":"2022-12-22T11:09:38+00:00","dateModified":"2025-09-24T11:04:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/"},"wordCount":1279,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/12\/Know-Everything-about-MITRE-ATTCK-feature.jpg","articleSection":["Ethical Hacking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/","name":"What is Mitre Attack Framework Explained","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/12\/Know-Everything-about-MITRE-ATTCK-feature.jpg","datePublished":"2022-12-22T11:09:38+00:00","dateModified":"2025-09-24T11:04:11+00:00","description":"Understand the mitre attack model or the mitre threat model. What is mitre att&ck framework used for, its benefits, techniques, and use cases.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/12\/Know-Everything-about-MITRE-ATTCK-feature.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/12\/Know-Everything-about-MITRE-ATTCK-feature.jpg","width":521,"height":521,"caption":"What is the MITRE ATTACK Framework"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/mitre-attack-uses-benefits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Ethical Hacking","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/"},{"@type":"ListItem","position":4,"name":"MITRE ATTACK: Meaning, Uses, and Benefits\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=77702"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77702\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80310"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=77702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=77702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=77702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}