![[Featured Image] A cybersecurity professional sits at his office shared space with others, working on his computer using MITRE ATT&CK to help prevent security breaches.](https://images.ctfassets.net/wp1lcwdav1p1/H7FYOkgWNRVufTGKTfTwe/b13726de8b6fe851ba30631b53f48dbc/GettyImages-1605481172.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
What Is the MITRE ATT&CK Framework?
Learn about the MITRE ATT&CK Framework for preventing cybersecurity threats, including techniques, procedures, and types of MITRE ATT&CK matrices, as well as careers where you can use this framework.
December 10, 2024
Article

![[Featured image] Coursera learner Donald Collins poses in a gray suit with a purple tie.](https://images.ctfassets.net/wp1lcwdav1p1/5bTkLIfVw0gios0STw5ixI/517c887bc7e0cb9b640bb8861af0f240/BC-4011_Donald-Collins_1500x680.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A group of cybersecurity professionals meet in a conference room to discuss creating a new penetration testing plan.](https://images.ctfassets.net/wp1lcwdav1p1/4W5OJp7Jg42SbCw2FAIfwi/1022d7667d3a69af16a24e0756f4b348/GettyImages-1626156976.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured Image] A college student uses different types of encryption on a laptop in a library.](https://images.ctfassets.net/wp1lcwdav1p1/7yzUitmzQUVJomZT3zEwOG/0917564dd191deeb25ff6167174302f7/GettyImages-143071328.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A computer networking professional is editing a program on the network server with edge computing.](https://images.ctfassets.net/wp1lcwdav1p1/7fS3BpxbLHCxeqsGb7TCZO/b51f9919ba7ec21d244e7253281ae0f7/GettyImages-597257862.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A man receiving a network technician salary is on a phone call while in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/3kuUjXSm7hlA8yjGi0qRe/91f2494b50cc07e6d09dfd58149ccee1/GettyImages-1334004080.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network analyst sits at a desk and uses a laptop to oversee their company's network operations.](https://images.ctfassets.net/wp1lcwdav1p1/7qGlLsEt2jUKBiE2v5101X/1f38d15c7fe5b2989cac78577db434a2/GettyImages-529793821.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network technician is holding a laptop to troubleshoot a problem in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/14vkez8hD7lVlmH3aiw57b/a519fb731a6d08eb79bdaa7de6c6d6cc/GettyImages-1334003865.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network engineer explains Border Gateway Protocol to a new hire who will be working with the company’s internet data management team.](https://images.ctfassets.net/wp1lcwdav1p1/2OqCfKyjK2VSgnA3Gmlwrr/02f46a44d5e132f8b2dd36ece3c7503a/GettyImages-498573129.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A biologist holds a molecular model as he studies complex networks.](https://images.ctfassets.net/wp1lcwdav1p1/6SvyCYRyYD997CfPbUejnv/87f27911229b06bd1e6d599ec06f42cb/GettyImages-168166241.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] Two cybersecurity analysts sit in front of a computer monitor with code on the screen in a bright office.](https://images.ctfassets.net/wp1lcwdav1p1/17kv9Gt5hsV5GyPmTqJjix/c8085f74105e6fc4a6b362e34865ba2b/GettyImages-2028997753.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network manager is at a computer in an office updating new software.](https://images.ctfassets.net/wp1lcwdav1p1/p6otI6BU33KaNZzuZOMUY/dd56f5a89990b86d24003d47a5e5a416/GettyImages-514408465.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)

