The SHI Fortinet Cyber Range Cup is an engaging challenge, simulating realistic scenarios in a virtual environment. Learn new tactics, techniques, and procedures (TTPs) and practice integrating your threat hunting and vulnerability protection skills in an isolated environment.
Whether you're already on an enterprise security squad or an IT pro looking to delve further into cybersecurity, this competition offers hands-on experience and skill development.
This is your chance to network, learn, and earn bragging rights while you fortify your network and practice strategies to add greater resilience.
Form a team or compete solo
Reserve your spot
to compete in this free event
Register for the SHI FORTINET Cyber Range Cup
SHI FORTINET
CUP
Team up and test your skills
Compete in 3 immersive scenarios to claim the inaugural cup
Gear up and bring your offense, defense, and collaboration teams together
Explore SHI's cybersecurity pillars
We offer people, technology, and process-focused solutions in data center and cloud security, application security, data-centric security, identity and access management, threat and vulnerability management, and program strategy and operations.
Learn more
Sign up now
Use tools not currently in your stack to identify or remediate attacks. Identify team excellence and improvement areas.
Proof points for vendor tools and your team's skill levels
Practice offense, defense, and collaboration in an immersive environment.
Training and collaboration to use immediately
Take home learnings and exposure to new tools and tips to improve your security posture.
Practice together to improve faster
Earn prizes and practical insights through hands-on experience with specific tools and scenarios. The challenge will encourage team coordination, promote training, and identify knowledge gaps. And in the end, the victor can claim the title as the inaugural SHI Fortinet Cyber Range Cup winner.
Unlock your potential and showcase your skills
Register now
Blend offensive and defensive capabilities to detect TTPs and respond
as a team.
Purple Team
Register now
Collaborate to find vulnerabilities and malicious activity. Fortify your network and increase cyber resilience.
Blue Team
Register now
Emulate bad actors using real-world tradecraft to establish how adversaries can gain access to the network or data.
Red Team
Join the challenge now
Compete solo or as a team, tackling 3 challenges over the course of 90 days. During the competition, we'll drop a scenario every 30 days.
Gain exposure to current TTPs in hyper-realistic scenarios
Red team members simulate adversary actions using real-world techniques to identify network vulnerabilities, employing threat tactics in varied environments, including OS, applications, and cloud instances.This scenario offers a risk-free, realistic experience in an isolated cyber range, highlighting strengths and areas for improvement.
Get ready: Red Team - Scenario 1
Register now
Apply your skills as an incident responder to identify, assess, and respond to hyper-realistic intrusions on an isolated environment. In the Blue Team scenario, you could be searching for vulnerabilities relating to people, technologies, and systems. This free resource will enable you to develop first-hand experience about how to detect and contain targeted attacks. Grow your organization's operational resilience with the SHI Fortinet Blue Team scenario.
Get ready: Blue Team - Scenario 2
Register now
Bring offensive and defensive tactics together in the Purple Team scenario. As a combination of blue and red, you’ll bring threat hunting and vulnerability identification skills to solve the third scenario in the SHI Fortinet Cyber Range Cup. The Purple Team scenario is hosted in an isolated, secure environment, allowing participants to improve vulnerability detection effectiveness and apply threat hunting and network monitoring skills. How you collaborate between silos is as important as specific capabilities. Experience the SHI Fortinet Cyber Range Cup Purple Team scenario to improve your skill levels and identify areas for improvement.
Get ready: Purple Team - Scenario 3
CLOSED
Tuesday, April 2
CLOSED
CLOSED
Saturday, June 1
Register now
Emulate bad actors using real-world tradecraft to establish how adversaries can gain access to the network or data.
Red Team
Register now
CLOSED