{"id":2355,"date":"2022-06-10T04:55:00","date_gmt":"2022-06-10T04:55:00","guid":{"rendered":"\/cybersecurity-blog\/?p=2355"},"modified":"2024-07-24T07:33:23","modified_gmt":"2024-07-24T07:33:23","slug":"cd-partnership","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/","title":{"rendered":"ANY.RUN Partners with CyberDefenders Training and Assessment Platform"},"content":{"rendered":"\n<p><a href=\"http:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=cd_general\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a> has started a collaboration with <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/cyberdefenders.org\" target=\"_blank\">CyberDefenders<\/a>, a cyberdefense training and assessment platform. A place for security professionals to practice, validate their skills and acquire the ones they need.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CyberDefenders: training for SOC analysts<\/h3>\n\n\n\n<p>CyberDefenders is an <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/cyberdefenders.org\/blueteam-training\" target=\"_blank\">online platform<\/a> for high-quality and practical security training, where security instructors offer their courses to the community. These trainings span a wide range of defensive topics such as incident response, security operations, digital forensics, threat hunting, malware analysis, etc.&nbsp;<\/p>\n\n\n\n<p>In addition, CyberDefenders offers:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;<a rel=\"noreferrer noopener\" aria-label=\"A free practice area (opens in a new tab)\" href=\"https:\/\/cyberdefenders.org\/blueteam-ctf-challenges\/\" target=\"_blank\">A free practice area<\/a> where security professionals can validate their hands-on skills using a set of real-world investigation scenarios such as SIEM investigations, network traffic analysis, cloud security, and open-source intelligence. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/cyberdefenders.org\/bluering-ctf-platform\/\" target=\"_blank\">CTF platform<\/a> that CTF organizers can use to host live competitions. Capture the Flag (CTF) is a special kind of information security competition where competing individuals and teams try to solve a set of security-related challenges in a limited time. CTFs are very popular in the security community, and organizations use them to improve their security teams&#8217; skills and hire competent candidates. Universities also use them to help students understand cybersecurity attacks and defenses.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The platform offers a bunch of intermediate to advanced trainings targeting SOC analysts, security\/system engineers, and architects. Students dive into the most topical threats and learn how to defend them.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">ANY.RUN: learn how to analyze artifacts&nbsp;<\/h3>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/app.any.run\/?_ga=2.205261203.266582657.1647412050-1331486471.1633608716\/&amp;utm_source=blog&amp;utm_medium=article&amp;utm_campaign=cd_registration#register\" target=\"_blank\">ANY.RUN sandbox<\/a> is a malware hunting service that benefits education goals. It perfectly blends with the training process. There is no need to teach students how to use it \u2013 the interface is simple enough for beginners. Plenty of real-time information for analysis and monitoring samples\u2019 malicious behavior guarantees a profound basis for learning. <br><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>The interactive sandbox is convenient for learning:&nbsp;<\/strong><br><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>See the analysis results right away, how malware executes, and it doesn\u2019t require any preparation. Just start the task and get the result.&nbsp;<\/li>\n\n\n\n<li>A user-friendly interface allows performing effective and qualitative investigations even for junior specialists.<\/li>\n\n\n\n<li>A huge database of samples and IOCs.<\/li>\n\n\n\n<li>The unlimited number of tasks.<\/li>\n\n\n\n<li>Detailed reports will help you find the necessary information quickly and export it.<\/li>\n\n\n\n<li>Work together on one sample. Create a team and track each member\u2019s activity.<\/li>\n<\/ul>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.linkedin.com\/in\/muhammad-alharmeel\/\" target=\"_blank\">Muhammad Alharmeel<\/a>, CyberDefenders CEO, has expressed his excitement about this partnership and integrating ANY.RUN into the courses offered on the platform. He highlights the speed of work and detailed information provided by the service. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>ANY.RUN is simple, user-friendly, and, most importantly, safe to use. Coming from a technical background, I have used the service hundreds of times and believe that bringing ANY.RUN to our users will add great value to our training portfolio.&nbsp;<\/strong><br><\/p>\n<cite><em>Muhammad Alharmeel, CyberDefenders CEO.<\/em><br><\/cite><\/blockquote>\n\n\n\n<p>Almost any security training involves dealing with artifacts in one way or another. Be it a binary file, an email attachment, or a suspected link. ANY.RUN simplifies this task and helps students inspect and analyze artifacts in a safe environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">ANY.RUN and CyberDefenders partnership<\/h3>\n\n\n\n<p>We are excited to partner with CyberDefenders to help instructors utilize the power of ANY.RUN sandbox in their trainings and expose students to a realistic, world-class threat intel and analysis platform.&nbsp;<br><\/p>\n\n\n\n<p><strong>Together with CyberDefenders, we have a special offer for all ANY.RUN users:<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-pullquote alignwide is-style-solid-color\"><blockquote><p>Use the promo code <strong>\u201cANYRUN0622<\/strong>\u201d to get 10% off for all <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/cyberdefenders.org\/blueteam-training\" target=\"_blank\">courses<\/a>! <\/p><\/blockquote><\/figure>\n\n\n\n<p>We believe that cybersecurity needs more specialists with hands-on skills and expert knowledge. That is why we are glad to support platforms like CyberDefenders and become a part of qualitative and helpful training. Here at ANY.RUN, we appreciate easy and informative services, and CyberDefenders definitely share these values.&nbsp;&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN has started a collaboration with CyberDefenders, a cyberdefense training and assessment platform. A place for security professionals to practice, validate their skills and acquire the ones they need. CyberDefenders: training for SOC analysts CyberDefenders is an online platform for high-quality and practical security training, where security instructors offer their courses to the community. These [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3710,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,60],"tags":[58,34],"class_list":["post-2355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-training","category-news","tag-cybersecurity-training","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Partners with CyberDefenders - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN starts a collaboration with CyberDefenders. All users can get a special promo code for courses on the training platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Partners with CyberDefenders Training and Assessment Platform\",\"datePublished\":\"2022-06-10T04:55:00+00:00\",\"dateModified\":\"2024-07-24T07:33:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/\"},\"wordCount\":611,\"commentCount\":12,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity training\",\"malware analysis\"],\"articleSection\":[\"Analyst Training\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/\",\"name\":\"ANY.RUN Partners with CyberDefenders - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-06-10T04:55:00+00:00\",\"dateModified\":\"2024-07-24T07:33:23+00:00\",\"description\":\"ANY.RUN starts a collaboration with CyberDefenders. All users can get a special promo code for courses on the training platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analyst Training\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/training\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Partners with CyberDefenders Training and Assessment Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Partners with CyberDefenders - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN starts a collaboration with CyberDefenders. All users can get a special promo code for courses on the training platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Partners with CyberDefenders Training and Assessment Platform","datePublished":"2022-06-10T04:55:00+00:00","dateModified":"2024-07-24T07:33:23+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/"},"wordCount":611,"commentCount":12,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity training","malware analysis"],"articleSection":["Analyst Training","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/","url":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/","name":"ANY.RUN Partners with CyberDefenders - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-06-10T04:55:00+00:00","dateModified":"2024-07-24T07:33:23+00:00","description":"ANY.RUN starts a collaboration with CyberDefenders. All users can get a special promo code for courses on the training platform.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cd-partnership\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Analyst Training","item":"https:\/\/any.run\/cybersecurity-blog\/category\/training\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Partners with CyberDefenders Training and Assessment Platform"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2355"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2355"}],"version-history":[{"count":2,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2355\/revisions"}],"predecessor-version":[{"id":8293,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2355\/revisions\/8293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3710"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}