Overview

OffSec Cyber Range (OCR) offers the most realistic hands-on, in-depth labs on the market that emulate enterprise environments, allowing your team to hone their technical, mental, and tactical skills in recognising and handling real-world incidents. OCR is tightly integrated with the OffSec learning library academy, to help the learners discover and gain new skills and knowledge as they sharpen their skills in OCR.

OCR Blue ‘Defend is the perfect Blue Team environment to continually advance and develop blue team skills.

OCR Blue defensive labs complement the OCR Red attack labs, empowering your experts to effectively navigate real-world threats and elevate their digital forensics, incident handling, and advanced threat hunting skills.

From refining offensive tactics to crafting unyielding defense strategies in OCR Blue, your team will face hyper-realistic simulations and emerge as a unified force, ready to defend your digital landscape with unwavering expertise.

OCR is a simulated real-world cyber environment containing commonly seen network configurations and vulnerabilities. The labs are updated regularly with the latest exploit vectors for the offensive and defensive teams to:

  • Sharpen their skills and stay up to date on the latest cyber threats
  • Be confident knowing they are qualified to do their job well, in the constantly changing cyber world.
  • 75+ machines
  • 30+ networks
  • 17 chains
  • 13 single machines

Features

  • Individual instances of all OCR machines
  • Powered up on demand
  • Enterprise Reporting
  • Sort by attack types
  • Access Mission Objectives
  • New defensive type

Defensive Types

OCR Blue ‘Defend is the perfect Blue Team environment to continually advance and develop blue team skills. The OCR Blue defend chain of machines offered provides hands-on experience in defending against real-world cyber threats, covering critical areas, including:

  • Active directory: Gain in-depth knowledge and practical skills to protect one of the most targeted assets in your network, ensuring its integrity and resilience against attacks.
  • Phishing: Learn to identify, mitigate, and prevent phishing attempts, a prevalent social engineering tactic used to compromise organisations.
  • Web: Develop the ability to secure web applications and services, safeguarding against web-based attacks and vulnerabilities that pose significant risks to your infrastructure.
Read more +

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing