Standoff Cyberbones

Explore notable incidents from the Standoff Cyberbattle

Start training

Online simulator for incident investigation

Infosec specialists sharpen skills in identifying and responding to cyberthreats 

70+ real cases

Examine strategies used by top red teams and learn how adversaries operate

Expert support and online help

Assistance with cybersecurity tools and incident investigations

Easy access

To get started, just register on Standoff 365 and set up your VPN connection

Convenient format

Investigate cyberincidents at your own pace and convenience

What Standoff Cyberbones gives you

Forge your cybersecurity team into hardened specialists by giving them hands-on practice using real cases

Accelerate onboarding for new hires and quickly assess entry-level skills

Test the latest versions of information security tools against real attacks

We analyze attack logs from Standoff cyberbattles and turn the data into practical tasks

How it works

Data analysis

Collecting logs
During Standoff cyberbattles, we collect logs of all attacks by white hat hackers.
Selecting attack methods
Our experts handpick the most relevant and effective attack methods (TTPs) and reconstruct the kill chains.
Creating a legend
Using the attack data, we create a legend that outlines a realistic incident scenario for a fictional company.

Task design

Forming artifacts
We assemble artifacts, including logs and traffic dumps, and upload them to a dedicated virtual environment.
Preparing questions
We formulate questions to walk the trainees through all stages of investigation, from initial discovery to the uncovering of concealed attack traces.
Result
Users investigate attacks from real Standoff cyberbattles, not abstract cases, and hone their skills against common threats using actual security tools.

Getting started

Build experience by solving tasks

Investigate incidents with the same cutting-edge tools trusted by leading enterprises.

Up for a tougher challenge?

Standoff Cyberbones PRO version features 70+ diverse tasks based on Standoff Cyberbattle incidents, including complex attack chains.

Standoff Cyberbones suits small and large cybersecurity teams

Team size

Configurations are available for teams of 5, 10, or 15

teamsSize

Subscription period

Select the option that best suits your goals

3 months

Crash course

Ideal for intensive training, targeted preparation, or candidate skill assessment

12 months

Annual subscription

Best for continuous team development, regular training integrated right into company workflows, and building robust skills

Start training now

Standoff Cyberbones (free version)

Standoff Cyberbones (free version)

An online simulator that offers a collection of real-life cases from the Standoff Cyberbattle

Learn how to access incident investigation training for businesses

Talk to us

Have questions about Standoff Cyberbones or Standoff 365? Drop us a note.

hello@standoff365.com
support

Our products for cyberattack investigation training

For businesses and cybersecurity professionals

Standoff Cyberbones online simulatorStandoff Defend cyberrangeStandoff Cyberbattle
ObjectiveSelf-guided practice in incident investigation using information security toolsComprehensive development of defensive security skills with mentor supportIntensive assessment of the team's readiness for real-time cyberattack response
Features
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Investigation of live attacks
  • Mentor support
  • Investigation of controlled attacks simulating APT scenarios
  • Access to the defensive security knowledge base
  • Use of different security tools
  • Investigation of live attacks
  • Mentor support (optional)
  • Response to live attacks (optional)
Task types
Tasks based on Standoff Cyberbattle incidents
  • Tasks based on Standoff Cyberbattle incidents
  • 15 APT scenarios with attack chains consisting of 8–25 steps
  • PRO version extras:
  • Detection and investigation of live attacks (a custom cyberbattle)
  • Response mode
  • Detection and investigation of live attacks
  • Response to live attacks (optional)
Attack format
Incidents from past Standoff cyberbattles
  • Incidents from past Standoff cyberbattles
  • Live hacker attacks
  • Controlled attacks
Live hacker attacks
Training formatSelf-guidedIndividual and team-based with mentor supportTeam-based with optional mentor support
Duration3 or 12 months12 months3–5 days
Mentor supportExpert support via Telegram botIndividual and team mentoringOptional
Number of security tools555 or more
Number of team membersFrom 5 to 15Up to 15Up to 15
Service manager
Supplementary materials
Quick start guides for security tools
  • Quick start guides for security tools
  • Knowledge base with theoretical and practical materials
  • Personalized recommendations
Optional