
Standoff Cyberbones (free version)
An online simulator that offers a collection of real-life cases from the Standoff Cyberbattle
Explore the most interesting incidents from the Standoff Cyberbattle.
With Standoff Cyberbones, infosec specialists can sharpen their skills in identifying and responding to cyberthreats.
Examine strategies used by top red teams in Standoff cyberbattles and learn how adversaries can act.
Get assistance with cybersecurity tools and incident investigations.
To start tackling tasks, just register on the Standoff 365 Platform and set up your VPN connection.
Investigate cyberincidents at your own pace and at a time that suits you.
Level up your cybersecurity team with hands-on practice based on real cases.
Accelerate the onboarding of new employees and quickly assess the skills of entry-level specialists.
Try out the latest versions of information security tools against real attacks.
Investigate incidents following the instructions, using cutting-edge security tools trusted by major companies.
The Standoff Cyberbones PRO version features 70+ diverse tasks based on Standoff Cyberbattle incidents and offers complex attack chains to investigate.
Different configurations are available for teams of 5, 10, or 15 people.
Select an option that best suits your goals.
Ideal for intensive training, targeted preparation, or an assessment of candidate skills
Optimal for continuous team building, integration of regular training into your workflow, and development of robust skills
An online simulator that offers a collection of real-life cases from the Standoff Cyberbattle
If you have any questions about Standoff Cyberbones or the Standoff 365 Platform, we are just an email away.
hello@standoff365.comFor businesses and cybersecurity professionals
Standoff Cyberbones online simulator | Standoff Defend cyberrange | Standoff Cyberbattle | |
---|---|---|---|
Objective | ObjectiveSelf-guided practice in incident investigation using information security tools | ObjectiveComprehensive development of defensive security skills with mentor support | ObjectiveIntensive assessment of the team's readiness for real-time cyberattack response |
Features | Features
| Features
| Features
|
Task types | Task types Tasks based on Standoff Cyberbattle incidents | Task types
| Task types
|
Attack format | Attack format Incidents from past Standoff cyberbattles | Attack format
| Attack format Live hacker attacks |
Training format | Training formatSelf-guided | Training formatIndividual and team-based with mentor support | Training formatTeam-based with optional mentor support |
Duration | Duration3 or 12 months | Duration12 months | Duration3–5 days |
Mentor support | Mentor supportExpert support via Telegram bot | Mentor supportIndividual and team mentoring | Mentor supportOptional |
Number of security tools | Number of security tools5 | Number of security tools5 | Number of security tools5 or more |
Number of team members | Number of team membersFrom 5 to 15 | Number of team membersUp to 15 | Number of team membersUp to 15 |
Service manager | Service manager— | Service manager | Service manager |
Supplementary materials | Supplementary materials Quick start guides for security tools | Supplementary materials
| Supplementary materialsOptional |