Standoff Defend

New version

A cyberrange where infosec teams can master their attack detection and investigation skills online 24/7

Train on the virtual IT infrastructure of a typical company

At the Standoff Defend cyberrange, infosec specialists can investigate attacks 24/7 and enhance their expertise with mentor support.

screenshots

Get attack-ready by learning tactics and techniques you've never encountered before

Your team is in for a lot a great lot of real practice

Controlled attacks

Every month, handle a new attack from Archer—a module for simulating user activity and reproducing APT attack scenarios.

Workshops with mentors

Get professional analysis of the attacks and challenging cases your team encounters while training at the cyberrange.

Mini cyberbattle

Harness your skills with a cyberbattle: detect and investigate a mixture of controlled attacks from Archer and real attacks by white hat hackers.

Knowledge base

Explore a collection of theoretical materials and tasks from our experts, tailored for each member of your team.

Standoff Cyberbones

With the online simulator, you can investigate the most interesting cases from the Standoff Cyberbattle.

Powerful preparation

Realistic experience

Round-the-clock access

Get hands-on practice with up to 15 scenarios of cyberattacks by major APT groups as well as live hacker traffic.

Train within an interconnected infrastructure made up of 1,500+ VMs and 500+ software units, closely resembling the ones you deal with in your everyday work.

Investigate controlled attacks or the most interesting Standoff Cyberbattle cases whenever it suits you.

Utmost preparation for real-world cyberthreats

Enterprise-level domain infrastructure
Emulation of external attacks
Dynamic modeling of user activity
In-depth vulnerability analysis
Centralized collection of security events
Start investigating the APT group attack right now

Top 3 participants who fully investigate the attack by April 23 will win prizes!

Competition details

Begin your investigation now

https://defend.standoff365.com/en-US/battle/31

Attack by the APT group Charming Kitten
Investigate

Attack by the APT group Charming Kitten

Investigate the attack based on the activities of a real APT group Study the most up-to-date techniques and tactics of threat actors to be prepared for real-life cyberattacks

Start training now

01
Request to sign up
Fill out the form, and we'll contact you within five days to clarify your team's needs and goals.
02
Discuss the terms
Based on your needs and goals, choose to sign up for 6 or 12 months of access to training.
03
Go through the initial test
Each participant will undergo a knowledge assessment so we can evaluate the team's readiness and provide relevant tasks.

Take the first step to upgrade your team's skills

Our products for cyberattack investigation training

For businesses and cybersecurity professionals

Standoff Cyberbones online simulatorStandoff Defend cyberrangeStandoff Cyberbattle
ObjectiveSelf-guided practice in incident investigation using information security toolsComprehensive development of defensive security skills with mentor supportIntensive assessment of the team's readiness for real-time cyberattack response
Features
  • Use of different security tools 
  • Analysis of attacks from past Standoff cyberbattles
  • Use of different security tools 
  • Analysis of attacks from past Standoff cyberbattles
  • Investigation of live attacks
  • Mentor support
  • Investigation of controlled attacks simulating APT scenarios
  • Access to the defensive security knowledge base
  • Use of different security tools 
  • Investigation of live attacks
  • Mentor support (optional)
  • Response to live attacks (optional)
Task types
Tasks based on Standoff Cyberbattle incidents
  • Tasks based on Standoff Cyberbattle incidents
  • Detection and investigation of live attacks (a custom cyberbattle)
  • 15 APT scenarios with attack chains consisting of 8–25 steps
  • Detection and investigation of live attacks
  • Response to live attacks (optional)
Attack format
Incidents from past Standoff cyberbattles
  • Incidents from past Standoff cyberbattles
  • Live hacker attacks
  • Controlled attacks
Live hacker attacks
Training formatSelf-guidedIndividual and team-based with mentor supportTeam-based with optional mentor support
Duration6 weeks6 or 12 months3–5 days
Mentor supportIndividual and team mentoringOptional
Number of security tools555 or more
Number of team membersUp to 10Up to 15Up to 15
Service manager
Supplementary materials
Quick start guides for security tools
  • Quick start guides for security tools
  • Knowledge base with theoretical and practical materials
  • Personalized recommendations
Optional