Standoff Cyberbones

Explore the most interesting incidents detected during the Standoff Cyberbattle

Start training

Online simulator for incident investigation

With Standoff Cyberbones, infosec specialists can better understand how to detect and respond to cyberthreats and apply this experience later at work

  • Real cases

    Learn how attackers could act by examining strategies used by top teams of white hat hackers at the Standoff Cyberbattle

  • Training 24/7

    Explore Standoff Cyberbattle cases for free, or upgrade to the PRO version for businesses

  • Easy access

    To start tackling tasks, just register on the Standoff 365 Platform and set up your VPN connection

Getting started

Gain experience by tackling tasks

Investigate incidents according to the instructions provided, using cutting-edge security tools trusted by major companies

Start training now

Standoff Cyberbones (free version)
Investigate

Standoff Cyberbones (free version)

An online simulator that offers a collection of real-life cases from the Standoff Cyberbattle

Up for something more challenging?

The Standoff Cyberbones PRO version features 70+ diverse tasks based on Standoff Cyberbattle incidents and offers complex attack chains to investigate

Learn more about getting access to incident investigation training for businesses

Get in touch

If you have any questions about Standoff Cyberbones or the Standoff 365 Platform, we are just an email away

hello@standoff365.com

Our products for cyberattack investigation training

For businesses and cybersecurity professionals

Standoff Cyberbones online simulatorStandoff Defend cyberrangeStandoff Cyberbattle
ObjectiveSelf-guided practice in incident investigation using information security toolsComprehensive development of defensive security skills with mentor supportIntensive assessment of the team's readiness for real-time cyberattack response
Features
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Investigation of live attacks
  • Mentor support
  • Investigation of controlled attacks simulating APT scenarios
  • Access to the defensive security knowledge base
  • Use of different security tools
  • Investigation of live attacks
  • Mentor support (optional)
  • Response to live attacks (optional)
Task types
Tasks based on Standoff Cyberbattle incidents
  • Tasks based on Standoff Cyberbattle incidents
  • 15 APT scenarios with
attack chains consisting of
8–25 steps
  • PRO version:
  • Detection and investigation of live attacks (a custom cyberbattle)
  • Response mode
  • Detection and investigation of live attacks
  • Response to live attacks (optional)
Attack format
Incidents from past Standoff cyberbattles
  • Incidents from past Standoff cyberbattles
  • Live hacker attacks
  • Controlled attacks
Live hacker attacks
Training formatSelf-guidedIndividual and team-based with mentor supportTeam-based with optional mentor support
Duration3 or 12 months6 or 12 months3–5 days
Mentor supportExpert support via Telegram botIndividual and team mentoringOptional
Number of security tools555 or more
Number of team membersFrom 5 to 15Up to 15Up to 15
Service manager
Supplementary materials
Quick start guides for security tools
  • Quick start guides for security tools
  • Knowledge base with theoretical and practical materials
  • Personalized recommendations
Optional