Standoff Defend
New version
A cyberrange where infosec teams can master their attack detection and investigation skills online 24/7
Train on the virtual IT infrastructure of a typical company
At the Standoff Defend cyberrange, infosec specialists can investigate attacks 24/7 and enhance their expertise with mentor support.

Get attack-ready by learning tactics and techniques you've never encountered before
Your team is in for a lot a great lot of real practice
Controlled attacks
Every month, handle a new attack from Archer—a module for simulating user activity and reproducing APT attack scenarios.
Workshops with mentors
Get professional analysis of the attacks and challenging cases your team encounters while training at the cyberrange.
Mini cyberbattle
Harness your skills with a cyberbattle: detect and investigate a mixture of controlled attacks from Archer and real attacks by white hat hackers.
Knowledge base
Explore a collection of theoretical materials and tasks from our experts, tailored for each member of your team.
Standoff Cyberbones
With the online simulator, you can investigate the most interesting cases from the Standoff Cyberbattle.

.74f510d5.png)
.0d4df44e.png)
Powerful preparation
Realistic experience
Round-the-clock access
Get hands-on practice with up to 15 scenarios of cyberattacks by major APT groups as well as live hacker traffic.
Train within an interconnected infrastructure made up of 1,500+ VMs and 500+ software units, closely resembling the ones you deal with in your everyday work.
Investigate controlled attacks or the most interesting Standoff Cyberbattle cases whenever it suits you.
Utmost preparation for real-world cyberthreats
Top 3 participants who fully investigate the attack by April 23 will win prizes!
Begin your investigation now
https://defend.standoff365.com/en-US/battle/31

Attack by the APT group Charming Kitten
Start training now
Take the first step to upgrade your team's skills


Our products for cyberattack investigation training
For businesses and cybersecurity professionals
Standoff Cyberbones online simulator | Standoff Defend cyberrange | Standoff Cyberbattle | |
---|---|---|---|
Objective | ObjectiveSelf-guided practice in incident investigation using information security tools | ObjectiveComprehensive development of defensive security skills with mentor support | ObjectiveIntensive assessment of the team's readiness for real-time cyberattack response |
Features | Features
| Features
| Features
|
Task types | Task types Tasks based on Standoff Cyberbattle incidents | Task types
| Task types
|
Attack format | Attack format Incidents from past Standoff cyberbattles | Attack format
| Attack format Live hacker attacks |
Training format | Training formatSelf-guided | Training formatIndividual and team-based with mentor support | Training formatTeam-based with optional mentor support |
Duration | Duration6 weeks | Duration6 or 12 months | Duration3–5 days |
Mentor support | Mentor support— | Mentor supportIndividual and team mentoring | Mentor supportOptional |
Number of security tools | Number of security tools5 | Number of security tools5 | Number of security tools5 or more |
Number of team members | Number of team membersUp to 10 | Number of team membersUp to 15 | Number of team membersUp to 15 |
Service manager | Service manager— | Service manager | Service manager |
Supplementary materials | Supplementary materials Quick start guides for security tools | Supplementary materials
| Supplementary materialsOptional |