
Attack by the APT group Charming Kitten
Investigate the attack based on the activities of a real APT group Study the most up-to-date techniques and tactics of threat actors to be prepared for real-life cyberattacks
New version
The cyberrange where infosec teams can master their attack detection and investigation skills online 24/7
At the Standoff Defend cyberrange, infosec specialists can investigate attacks 24/7 and enhance their expertise with mentor support.
Every month, handle a new attack from Archer—a module for simulating user activity and reproducing APT attack scenarios.
Get professional analysis of the attacks and challenging cases your team encounters while training at the cyberrange.
Explore a collection of theoretical materials and tasks from our experts, tailored for each member of your team.
With the online simulator, you can investigate the most interesting cases from the Standoff Cyberbattle.
Supercharge your skills with the PRO version, which includes response mode and a mini cyberbattle featuring white hat hackers.
Get hands-on practice with up to 15 scenarios of cyberattacks by major APT groups as well as live hacker traffic.
Train within an interconnected infrastructure made up of 1,500+ VMs and 500+ software units, closely resembling the ones you deal with in your everyday work.
Investigate controlled attacks or the most interesting Standoff Cyberbattle cases whenever it suits you.
Investigate the attack based on the activities of a real APT group Study the most up-to-date techniques and tactics of threat actors to be prepared for real-life cyberattacks
For businesses and cybersecurity professionals
Standoff Cyberbones online simulator | Standoff Defend cyberrange | Standoff Cyberbattle | |
---|---|---|---|
Objective | ObjectiveSelf-guided practice in incident investigation using information security tools | ObjectiveComprehensive development of defensive security skills with mentor support | ObjectiveIntensive assessment of the team's readiness for real-time cyberattack response |
Features | Features
| Features
| Features
|
Task types | Task types Tasks based on Standoff Cyberbattle incidents | Task types
| Task types
|
Attack format | Attack format Incidents from past Standoff cyberbattles | Attack format
| Attack format Live hacker attacks |
Training format | Training formatSelf-guided | Training formatIndividual and team-based with mentor support | Training formatTeam-based with optional mentor support |
Duration | Duration3 or 12 months | Duration6 or 12 months | Duration3–5 days |
Mentor support | Mentor supportExpert support via Telegram bot | Mentor supportIndividual and team mentoring | Mentor supportOptional |
Number of security tools | Number of security tools5 | Number of security tools5 | Number of security tools5 or more |
Number of team members | Number of team membersFrom 5 to 15 | Number of team membersUp to 15 | Number of team membersUp to 15 |
Service manager | Service manager— | Service manager | Service manager |
Supplementary materials | Supplementary materials Quick start guides for security tools | Supplementary materials
| Supplementary materialsOptional |