Located in the Cyber Hub, the uOttawa-IBM Cyber Range will deliver security training, professional development, and partnering opportunities in both official languages to help grow Canada’s skilled cybersecurity and cyber-safety workforce across government, academia, and industry.

About the Cyber Range

The uOttawa-IBM Cyber Range, the first of its kind in Canada, is globally unique in its structure and will operate in partnership with IBM’s global Security Cyber Range Team. Visitors will enjoy a full, sensory-immersive and interactive training setting in which to experience true-to-life cyber response scenarios in a full-scale security operations center (SOC) based on a fusion team model.

Building icon on garnet background

On-site facilities

The Cyber Range is a physical space at uOttawa where individuals can see how they will react to a scenario. By understanding how people react, respond, and handle the scenario, companies can gauge the effectiveness of a strategic response.
Computer icon on grey background

Virtual capabilities

Outside the Cyber Range itself, students and organizations can train in their preferred location, thanks to the state-of-the-art software. This software creates simulated and controlled cyberattacks that have real-life applications so users can learn to identify and neutralize software attacks.
Research areas icon on orange background

Multidisciplinary research

The Cyber Hub’s multidisciplinary approach to research means that our researchers share projects and knowledge. Some of their areas of expertise include AI, cybersecurity, cyber crime detection and prevention, and vulnerable software.

Thanks to its further focus on collaborative research and security innovation, the Cyber Range will pair IBM’s expertise in data analytics, deep learning, software, and systems with uOttawa’s research, training, and teaching strengths in disciplines that underpin cybersecurity and cyber safety.

The University of Ottawa is committed to forging relationships with organizations and to building the next generation of cybersecurity professionals from its students and researchers.


students trained annually


physical capacity


cyber experts at the faculty

The Cyber Range seeks to address the growing skills gap in cybersecurity and cyber safety. Cybersecurity affects every organization, and the need for certified skilled workers continues to grow. The IBM-uOttawa Cyber Range provides students and professionals with a space to learn, develop, and address these gaps in their experiences thanks to lessons learned through simulations with real data that can be applied in real life.

The Cyber Range has been developed to provide diverse organizations with greater access to state-of-the-art technology in order to build cybersecurity resilience across Canada. Through immersive learning and practice, students and professionals will learn how to better protect themselves against cyber attacks.

Facility features

The Cyber Range is equipped with cutting-edge technology and assets for cybersecurity testing, planning, and training, including:

  • 30 stations equipped with iMacs where training and simulations take place
  • Latest IBM security software and services, like IBM's Security Information and Event Management (SIEM) QRadar, IBM Security Orchestration, Automation and Response (SOAR), IBM Security® QRadar® SOAR (formerly Resilient®) and IBM Guardium®
  • RHEA Group’s Cyber Integration, Test and Evaluation Framework (CITEF™) for technical simulations
  • A diverse scenario library that can be accessed online and in person
  • Technologies that allow for the creation of an exact clone of your organization’s network and operational technology assets.

Research at the Cyber Range

The activities conducted in the Cyber Range allow us to use real-world data in our research in close collaboration with our industry partners, ensuring that the innovations and solutions produced by our research teams at the Cyber Range have a direct impact on industry. For example, we are developing and testing new AI models to detect cyber attacks or abnormal network activities, to automatically detect malware and vulnerable code, and to identify ongoing cyber attacks as they occur.

Find an expert

Learn more about our Cyber Hub researchers from diverse fields of study and expertise, ranging from quantum cryptography and software security to law and policy development.
Cyber researchers

Services offered

Corporate training

Programs and certifications