Standoff Cyberbones

Explore the most interesting incidents from the Standoff Cyberbattle.

Start training

Online simulator for incident investigation

With Standoff Cyberbones, infosec specialists can sharpen their skills in identifying and responding to cyberthreats. 

70+ real cases

Examine strategies used by top red teams in Standoff cyberbattles and learn how adversaries can act.

Expert support and online help

Get assistance with cybersecurity tools and incident investigations.

Easy access

To start tackling tasks, just register on the Standoff 365 Platform and set up your VPN connection.

Convenient format

Investigate cyberincidents at your own pace and at a time that suits you.

What Standoff Cyberbones gives you

Level up your cybersecurity team with hands-on practice based on real cases.

Accelerate the onboarding of new employees and quickly assess the skills of entry-level specialists.

Try out the latest versions of information security tools against real attacks.

We analyze attack logs from Standoff cyberbattles and design practical tasks based on this data.

Here's how this works.

Data analysis

Collecting logs
During Standoff cyberbattles, we collect logs of all attacks by white hat hackers.
Selecting attack methods
Our experts handpick the most interesting and effective attack methods (TTPs) and reconstruct kill chains.
Creating a legend
Based on the attack data, we create a legend—a realistic incident scenario for a fictional company.

Task design

Forming artifacts
We form artifacts (logs, traffic dumps) and upload them to a dedicated virtual environment with security tools.
Preparing questions
We formulate questions to walk the trainees through all stages of investigation, from initial discovery to the uncovering of concealed attack traces.
Result
Standoff Cyberbones users can investigate real attacks from Standoff cyberbattles (rather than some abstract cases) and hone their skills against common threats using security tools.

Getting started

Gain experience by tackling tasks

Investigate incidents following the instructions, using cutting-edge security tools trusted by major companies.

Up for something more challenging?

The Standoff Cyberbones PRO version features 70+ diverse tasks based on Standoff Cyberbattle incidents and offers complex attack chains to investigate.

Standoff Cyberbones is suitable for both small and large cybersecurity teams

Team size

Different configurations are available for teams of 5, 10, or 15 people.

teamsSize

Subscription period

Select an option that best suits your goals.

3 months

Crash course

Ideal for intensive training, targeted preparation, or an assessment of candidate skills

12 months

Annual subscription

Optimal for continuous team building, integration of regular training into your workflow, and development of robust skills

Start training now

Standoff Cyberbones (free version)

Standoff Cyberbones (free version)

An online simulator that offers a collection of real-life cases from the Standoff Cyberbattle

Learn more about getting access to incident investigation training for businesses

Get in touch

If you have any questions about Standoff Cyberbones or the Standoff 365 Platform, we are just an email away.

hello@standoff365.com
support

Our products for cyberattack investigation training

For businesses and cybersecurity professionals

Standoff Cyberbones online simulatorStandoff Defend cyberrangeStandoff Cyberbattle
ObjectiveSelf-guided practice in incident investigation using information security toolsComprehensive development of defensive security skills with mentor supportIntensive assessment of the team's readiness for real-time cyberattack response
Features
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Investigation of live attacks
  • Mentor support
  • Investigation of controlled attacks simulating APT scenarios
  • Access to the defensive security knowledge base
  • Use of different security tools
  • Investigation of live attacks
  • Mentor support (optional)
  • Response to live attacks (optional)
Task types
Tasks based on Standoff Cyberbattle incidents
  • Tasks based on Standoff Cyberbattle incidents
  • 15 APT scenarios with
attack chains consisting of
8–25 steps
  • PRO version extras:
  • Detection and investigation of live attacks (a custom cyberbattle)
  • Response mode
  • Detection and investigation of live attacks
  • Response to live attacks (optional)
Attack format
Incidents from past Standoff cyberbattles
  • Incidents from past Standoff cyberbattles
  • Live hacker attacks
  • Controlled attacks
Live hacker attacks
Training formatSelf-guidedIndividual and team-based with mentor supportTeam-based with optional mentor support
Duration3 or 12 months12 months3–5 days
Mentor supportExpert support via Telegram botIndividual and team mentoringOptional
Number of security tools555 or more
Number of team membersFrom 5 to 15Up to 15Up to 15
Service manager
Supplementary materials
Quick start guides for security tools
  • Quick start guides for security tools
  • Knowledge base with theoretical and practical materials
  • Personalized recommendations
Optional