Provision dedicated cloud environments and test stuff on your own. You can use it to develop detection techniques, analyze malware samples and validate logging configurations.


Blue team challenges to practice different set of defensive skills. They come in different formats such as attack investigations (SIEM style), PCAP analysis, memory analysis...etc.