Provision dedicated cloud environments and test stuff on your own. You can use it to develop
detection techniques, analyze malware samples and validate logging configurations.
Blue team challenges to practice different set of defensive skills.
in different formats such as attack
investigations (SIEM style), PCAP analysis, memory analysis...etc.