Features Threat Library Pricing Why CyberThreatBase
MITRE ATT&CK® Framework v14  ·  185+ Techniques

Master Every
Cyber Attack
Technique Known.

The cyber threat intelligence platform for anyone entering or advancing in cybersecurity. 185+ MITRE ATT&CK techniques — with AI-powered analysis, real-world case studies, and career guidance.

185+
TECHNIQUES
14
TACTIC GROUPS
7
ANALYSIS TABS
LEARNING DEPTH
THREATLENS — TECHNIQUE BROWSER
◆  FREE ACCESS
📨
Phishing
T1566 · Initial Access
CRITICAL
🧠
OS Credential Dumping
T1003 · Credential Access
CRITICAL
🔒
Data Encrypted for Impact
T1486 · Impact
CRITICAL
🔒  PRO — 182 MORE
💉
Process Injection
T1055 · Privilege Escalation
🔒
🌳
Rootkit
T1014 · Defense Evasion
🔒
Unlock All 185+ Techniques
From £2.99 per month  ·  Cancel anytime
BUILT ON THE FRAMEWORK USED BY
MITRE CORPORATION CISA NCSC UK NATO CCDCOE SANS INSTITUTE NIST

Capabilities

Everything a serious security professional needs

From your first CVE to your first threat hunt. CyberThreatBase is the platform that grows with your career.

🧠
AI-Powered Analysis
Every technique generates expert analysis — attack mechanics, detection logic, and mitigation strategy. Accurate, contextual, and written at practitioner level.
🌍
Real-World Case Studies
Learn from actual breaches — SolarWinds, Colonial Pipeline, Log4Shell, WannaCry. Understand how attacks unfolded and why defences failed.
🔵
Blue Team Detection Rules
Actionable SIEM queries, Windows Event IDs, and behavioural indicators for every technique. Ready for Splunk, Microsoft Sentinel, or Elastic.
⛓️
Complete ATT&CK Kill Chain
All 185+ techniques across all 14 MITRE tactics. Filterable, searchable, and cross-referenced — Reconnaissance through to Impact.
🛡️
Mitigation Playbooks
For every attack, a concrete defence. Specific tools, exact configuration steps, and CIS Control mappings — actionable from day one.
💼
Career Intelligence
UK and US salary benchmarks, certification paths — OSCP, SANS, CompTIA — and job market analysis for every security role in 2025.

Pricing

Simple, transparent pricing.

Less than a coffee a week. More valuable than most paid courses.

FREE
Free

Start exploring immediately. No credit card, no commitment.

  • 5 complete technique analyses
  • AI overview and attack chain
  • Real-world case studies
  • Detection basics
  • All 185+ techniques
  • Full mitigation playbooks
  • Attacker tools database
  • Career and salary guides
Most Popular
PRO
£ 2.99 /month

Everything you need to go from beginner to job-ready security analyst.

  • All 185+ techniques
  • AI analysis on every technique
  • Full attack chain walkthroughs
  • Blue team detection rules
  • Complete mitigation playbooks
  • Attacker tools database
  • Career and salary guides
  • 7-day free trial included
ENTERPRISE
Custom

For SOC teams, training academies, and organisations deploying at scale.

  • Everything in Pro
  • Unlimited team members
  • Team progress dashboards
  • Custom learning pathways
  • API access for integrations
  • SSO and SAML authentication
  • Dedicated account manager
  • Invoice and PO billing

🔒  Secure checkout  ·  Cancel anytime  ·  7-day money-back guarantee  ·  Prices in GBP

What You'll Learn

The knowledge that gets you hired — and promoted

Cybersecurity is one of the fastest-growing, highest-paying sectors in the UK and globally. CyberThreatBase gives you the practical knowledge employers actually test for.

185+
ATTACK TECHNIQUES COVERED
14
MITRE TACTIC CATEGORIES
£28k+
STARTING SALARY IN THE UK
3.5M
GLOBAL JOBS UNFILLED IN CYBER

UK & US Salary Ranges by Role

SOC ANALYST (TIER 1)
£28–38k
$50–70k US
ENTRY LEVEL
SOC ANALYST (TIER 2)
£38–55k
$70–100k US
MID LEVEL
PENETRATION TESTER
£45–80k
$85–140k US
MID–SENIOR
INCIDENT RESPONDER
£50–100k
$90–160k US
MID–SENIOR

Salary data based on 2024–2025 UK and US job market figures. Individual salaries vary by employer, location, and experience.

What You'll Actually Learn

🧠
How Real Attacks Work

Every technique is explained from first principles — what the attacker does, why it works, and what they gain. Not theory. Not textbook definitions. The mechanics that matter in real incidents.

Attack chains Attacker tools Case studies
🔵
How to Detect & Stop Them

For every attack, a practical defence. Specific Windows Event IDs, SIEM queries, EDR behavioural rules, and compensating controls — content you can actually use in a SOC or architecture review.

SIEM queries Event IDs EDR rules
🌍
Lessons from Real Breaches

SolarWinds. Colonial Pipeline. Log4Shell. WannaCry. Each technique is anchored in a real-world incident — what happened, how the attack unfolded, and exactly why the defences failed.

Named APT groups Ransomware ops Nation-state TTPs
🎓
Certification-Ready Knowledge

The MITRE ATT&CK framework is core to CompTIA CySA+, GIAC GCIH, GCFA, and SANS FOR508. CyberThreatBase covers every technique those exams test, at the depth they actually need.

CompTIA CySA+ GIAC GCIH SANS FOR508
💼
Career & Salary Intelligence

For every technique, understand which roles use it, which certifications prove your knowledge of it, and what those roles pay in the UK and US — so you can build a clear path forward.

Role maps Cert pathways Salary data
🚀
Skills That Get You Hired

Employers don't test textbook knowledge — they test whether you can explain how a phishing attack becomes a ransomware deployment, and what you would have done to stop it. That's what this teaches.

Interview prep Practical skills SOC-ready

Get Started Today

Your adversaries study every day.
So should you.

Start building the threat intelligence knowledge that gets you hired. Free to begin, no card required.

No credit card required  ·  Cancel anytime  ·  iOS and Android app coming soon

Welcome back, Analyst 👋

Your cyber threat intelligence command centre. Track your progress and continue where you left off.

TECHNIQUES REVIEWED
0
of 185 available
TACTICS COVERED
0/14
kill-chain categories
CURRENT PLAN
Free
Upgrade to Pro →
MEMBER SINCE
Today
founding member
Learning Progress
0% complete
Continue Learning
📋
You haven't explored any techniques yet.
Start with Phishing →
Recommended Certifications
C+
CompTIA CySA+
Blue Team · Intermediate
OS
OSCP
Offensive · Advanced
GC
GIAC GCIH
Incident Response
Quick Start

Threat Library

185+ MITRE ATT&CK techniques — select one to explore

5 Free 180+ Pro
Showing all techniques
⚔️
Select a technique

Choose any technique from the list to view full AI-powered analysis, real-world case studies, detection rules and career guidance.

💡 Start with Phishing (T1566) — present in over 80% of major breaches
🔒
Pro Technique

Unlock all 185+ techniques with complete AI analysis, detection playbooks, mitigation guides and career intelligence.

7-day free trial  ·  Cancel anytime