Overview

OffSec Cyber Range (OCR) offers the most realistic hands-on, in-depth labs on the market that emulate enterprise environments, allowing your team to hone their technical, mental, and tactical skills in recognising and handling real-world incidents. OCR is tightly integrated with the OffSec learning library academy, to help the learners discover and gain new skills and knowledge as they sharpen their skills in OCR.

OCR Blue ‘Defend is the perfect Blue Team environment to continually advance and develop blue team skills.

OCR Blue defensive labs complement the OCR Red attack labs, empowering your experts to effectively navigate real-world threats and elevate their digital forensics, incident handling, and advanced threat hunting skills.

From refining offensive tactics to crafting unyielding defense strategies in OCR Blue, your team will face hyper-realistic simulations and emerge as a unified force, ready to defend your digital landscape with unwavering expertise.

OCR is a simulated real-world cyber environment containing commonly seen network configurations and vulnerabilities. The labs are updated regularly with the latest exploit vectors for the offensive and defensive teams to:

  • Sharpen their skills and stay up to date on the latest cyber threats
  • Be confident knowing they are qualified to do their job well, in the constantly changing cyber world.
  • 75+ machines
  • 30+ networks
  • 17 chains
  • 13 single machines

Features

  • Individual instances of all OCR machines
  • Powered up on demand
  • Enterprise Reporting
  • Sort by attack types
  • Access Mission Objectives
  • New defensive type

Defensive Types

OCR Blue ‘Defend is the perfect Blue Team environment to continually advance and develop blue team skills. The OCR Blue defend chain of machines offered provides hands-on experience in defending against real-world cyber threats, covering critical areas, including:

  • Active directory: Gain in-depth knowledge and practical skills to protect one of the most targeted assets in your network, ensuring its integrity and resilience against attacks.
  • Phishing: Learn to identify, mitigate, and prevent phishing attempts, a prevalent social engineering tactic used to compromise organisations.
  • Web: Develop the ability to secure web applications and services, safeguarding against web-based attacks and vulnerabilities that pose significant risks to your infrastructure.
Read more

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

Required Star = Required
Certification = Certification
Application Security
Cloud Security
Information Security Management
Security Risk
Cyber Tech Generalist
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
NIST Pathway
OffSec
Privacy Professional
Security Auditor
Secure Coding
Cyber Blue Team
Vulnerability Assessment & Penetration Testing
Emerging Tech Security
Reverse Engineer
Security Architect

Cyber Defensive Operations learning paths

Want to boost your career in Cyber Defensive Operations? View QA's learning pathways below, specially designed to give you the skills to succeed.

Required Star = Required
Certification = Certification
Cyber Blue Team
DFIR Digital Forensics & Incident Response
Cyber Tech Generalist

Offensive Cyber Operations learning paths