Standoff Cyberbones

Explore the most interesting incidents detected during the Standoff Cyberbattle

Start training

Online simulator for incident investigation

With Standoff Cyberbones, infosec specialists can better understand how to detect and respond to cyberthreats and apply this experience later at work

  • Real cases

    Learn how attackers could act by examining strategies used by top teams of white hat hackers at the Standoff Cyberbattle

  • Training 24/7

    Explore 16 cyberincidents for free, or upgrade to the <action>PRO version/action> and supercharge your team's training

  • Easy access

    To start tackling tasks, just register on the Standoff 365 Platform and set up your VPN connection

Getting started

Gain experience by tackling tasks

Investigate incidents according to the instructions provided, using cutting-edge security tools trusted by major companies

Start training now

Standoff Cyberbones (free version)
Investigate

Standoff Cyberbones (free version)

An online simulator that offers a collection of real-life cases from the Standoff Cyberbattle

Up for something more challenging?

The Standoff Cyberbones PRO version features 70+ diverse tasks based on Standoff Cyberbattle incidents and offers complex attack chains to investigate

Request info to learn more about getting 45 days of access to incident investigation training

Get in touch

If you have any questions about Standoff Cyberbones or the Standoff 365 Platform, we are just an email away

support@standoff365.com

Our products for cyberattack investigation training

For businesses and cybersecurity professionals

Standoff Cyberbones online simulatorStandoff Defend cyberrangeStandoff Cyberbattle
ObjectiveSelf-guided practice in incident investigation using information security toolsComprehensive development of defensive security skills with mentor supportIntensive assessment of the team's readiness for real-time cyberattack response
Features
  • Use of different security tools 
  • Analysis of attacks from past Standoff cyberbattles
  • Use of different security tools 
  • Analysis of attacks from past Standoff cyberbattles
  • Investigation of live attacks
  • Mentor support
  • Investigation of controlled attacks simulating APT scenarios
  • Access to the defensive security knowledge base
  • Use of different security tools 
  • Investigation of live attacks
  • Mentor support (optional)
  • Response to live attacks (optional)
Task types
Tasks based on Standoff Cyberbattle incidents
  • Tasks based on Standoff Cyberbattle incidents
  • Detection and investigation of live attacks (a custom cyberbattle)
  • 15 APT scenarios with attack chains consisting of 8–25 steps
  • Detection and investigation of live attacks
  • Response to live attacks (optional)
Attack format
Incidents from past Standoff cyberbattles
  • Incidents from past Standoff cyberbattles
  • Live hacker attacks
  • Controlled attacks
Live hacker attacks
Training formatSelf-guidedIndividual and team-based with mentor supportTeam-based with optional mentor support
Duration6 weeks6 or 12 months3–5 days
Mentor supportIndividual and team mentoringOptional
Number of security tools555 or more
Number of team membersUp to 10Up to 15Up to 15
Service manager
Supplementary materials
Quick start guides for security tools
  • Quick start guides for security tools
  • Knowledge base with theoretical and practical materials
  • Personalized recommendations
Optional