Standoff Cyberbones
Explore the most interesting incidents detected during the Standoff Cyberbattle

Online simulator for incident investigation
With Standoff Cyberbones, infosec specialists can better understand how to detect and respond to cyberthreats and apply this experience later at work
Real cases
Learn how attackers could act by examining strategies used by top teams of white hat hackers at the Standoff Cyberbattle
Training 24/7
Explore 16 cyberincidents for free, or upgrade to the <action>PRO version/action> and supercharge your team's training
Easy access
To start tackling tasks, just register on the Standoff 365 Platform and set up your VPN connection
Getting started

Gain experience by tackling tasks
Investigate incidents according to the instructions provided, using cutting-edge security tools trusted by major companies
Start training now

Standoff Cyberbones (free version)

Up for something more challenging?
The Standoff Cyberbones PRO version features 70+ diverse tasks based on Standoff Cyberbattle incidents and offers complex attack chains to investigate
Request info to learn more about getting 45 days of access to incident investigation training
Get in touch
If you have any questions about Standoff Cyberbones or the Standoff 365 Platform, we are just an email away
support@standoff365.comOur products for cyberattack investigation training
For businesses and cybersecurity professionals
Standoff Cyberbones online simulator | Standoff Defend cyberrange | Standoff Cyberbattle | |
---|---|---|---|
Objective | ObjectiveSelf-guided practice in incident investigation using information security tools | ObjectiveComprehensive development of defensive security skills with mentor support | ObjectiveIntensive assessment of the team's readiness for real-time cyberattack response |
Features | Features
| Features
| Features
|
Task types | Task types Tasks based on Standoff Cyberbattle incidents | Task types
| Task types
|
Attack format | Attack format Incidents from past Standoff cyberbattles | Attack format
| Attack format Live hacker attacks |
Training format | Training formatSelf-guided | Training formatIndividual and team-based with mentor support | Training formatTeam-based with optional mentor support |
Duration | Duration6 weeks | Duration6 or 12 months | Duration3–5 days |
Mentor support | Mentor support— | Mentor supportIndividual and team mentoring | Mentor supportOptional |
Number of security tools | Number of security tools5 | Number of security tools5 | Number of security tools5 or more |
Number of team members | Number of team membersUp to 10 | Number of team membersUp to 15 | Number of team membersUp to 15 |
Service manager | Service manager— | Service manager | Service manager |
Supplementary materials | Supplementary materials Quick start guides for security tools | Supplementary materials
| Supplementary materialsOptional |