Facilities

Our Cybersecurity solutions provide innovative state-of-the-art facilities for experimentation and evaluation of advanced technologies and supports research, instruction, training and outreach.


The UWF Cybersecurity Battle lab is a high-tech computing lab to support research, teaching, and outreach in network and system security.
Cybersecurity classes in action

Cybersecurity Battle Lab

The UWF Cybersecurity Battle lab is a high-tech computing lab to support research, teaching, and outreach in network and system security. It provides access to a simulated computer network that mirrors the topology and services of real-world, large- and small scale computer networks to experiment with network attack and defense methods in a secure and controlled environment. The simulated network unique in its design and capabilities across Florida’s state and private institutions is supported by the Computer Science Data Center that includes high-performance servers & storage area networks virtualizing the network infrastructure and services in the network and providing critical management services to support centralized user account management and sharing of file resources.

UWF Data Center at HMCSE
UWF data center

Computer Science Data Center

The UWF Computer Science Data Center is equipped with state-of-the art computing equipment including high-performance servers, switches, and storage area networks. The equipment supports on-demand virtualization to meet a wide range of computing needs for teaching and research purposes. The Data Center provides the computing infrastructure to support the Cybersecurity Battle Lab.

Woman in military uniform at a computer.
UWF Cyber Range

UWF Cyber Range

The UWF Cyber Range supports face-to-face, online and remote instruction and training for three simultaneous networks. The realization of various types of networks is possible: public utilities, financial systems, air traffic control centers, chemical plants, and cyber operations centers. Learners and researchers conduct defensive and offensive cyber operations with the abilities to reset to a prior state after disaster strikes. Automated network traffic is generated to simulate an active network for network security and furthermore packet analysis.

×
Feedback
×
Fill out my online form.