A rule book that explains the key principles of participation for attackers and defenders, describes how their results are evaluated, and specifies restrictions.
Recommendations on how to fill out reports correctly and quickly to help you save time.
What attackers can target
The cyberbattle features a virtual infrastructure with realistic replicas of systems from various industries. Here, you can learn which virtual sectors red teams can attack and which critical events they can cause, and get to know similar real-life incidents.