SAIT Downtown Cyber Range
Defend. Innovate. Lead.
Experience Canada's most advanced cybersecurity simulation facility with our comprehensive suite of hands-on training scenarios.
From basic vulnerability assessments to advanced threat exploitation, prepare your team for real-world cyber challenges.
Located in the heart of Calgary, the SAIT Downtown Cyber Range delivers immersive, practical cybersecurity training that transforms how organizations prepare for and respond to cyber threats.
Prepare for tomorrow's threats today
In an era where cyber attacks are increasing in both frequency and sophistication, hands-on cybersecurity training isn't just beneficial; it's essential. The SAIT Downtown Cyber Range provides your team with the practical experience needed to defend against evolving digital threats.

Why choose the SAIT Downtown Cyber Range?
Our state-of-the-art, purpose-built environment mirrors real-world digital infrastructures across critical sectors, including healthcare, energy, finance, transportation and more. Teams train in authentic scenarios that reflect the actual threat landscape your organization faces.

Immersive learning experience
- Red Team (attack) and Blue Team (defence) training rooms.
- Central Command Centre for coordinated exercises.
- Virtualized networks, industry-grade monitoring tools, and advanced visualization walls for team-based exercises.
- Hands-on experience with the same tools and environments used by global cybersecurity teams.
- Ideal for corporate security teams and IT professionals to sharpen defensive skills and test response protocols, and to gain hands-on experience with the latest security tools.
Earn your cybersecurity credentials
At SAIT’s School for Advanced Digital Technology, you gain more than a diploma — you train in one of Canada’s most advanced cyber ranges.
With 50 immersive challenges, you apply theory in real time. Working in teams, you'll learn to detect, contain, and resolve threats under pressure, building confidence and decision-making skills employers demand.
By graduation, you'll have both the knowledge and hands-on experience to step into industry-ready cybersecurity roles.

Tailored Corporate Training solutions
Every organization faces unique cyber risks. Our scenarios can be customized to address your specific industry challenges, compliance requirements, and security objectives. Whether you're protecting critical infrastructure or customer data, we'll design training that matters to your business.
Benefits for your organization
- Enhanced incident response capabilities.
- Improved threat detection and analysis skills.
- Strengthened team collaboration under pressure.
- Validated security protocols and procedures.
- Measurable improvements in security posture.
Expanding your cybersecurity arsenal
Our scenario library is on track to feature over 50 cutting-edge training scenarios, each reflecting emerging threats across key cybersecurity domains.
Training scenarios available now ›
Training scenarios coming soon ›
# | Scenario* | Description |
---|---|---|
1 |
Active Directory Exploits |
Explore Active Directory misconfigurations to extract credentials, crack encrypted logins, and escalate access. |
2 |
Cross-Site Scripting |
Demonstrate risks of cross-site scripting by injecting malicious code, hijacking sessions, and applying secure coding defences. |
3 |
Defensive Network Operations |
Strengthen defensive skills by detecting intrusions, analyzing logs, and responding to incidents through real-world simulations. |
4 |
Log4j Exploitation |
Explore risks of the Log4j flaw by exploiting Apache Solr to gain control while practicing detection, patching, and response. |
5 |
Macro Malware Detection |
Uncover risks of malicious document macros by analyzing hidden payloads and applying rules to detect and stop threats. |
6 |
Operational Technology Fortified Castle |
Explore risks of industrial systems by simulating protocol attacks, assessing safety impacts, and applying defensive strategies. |
7 |
Password Cracking |
Explore password cracking with brute force, dictionary, and rainbow table attacks while applying defences to reduce risk. |
8 |
Phishing Defense |
Uncover tactics of phishing by simulating deceptive messages, spotting red flags, and applying defences to strengthen awareness. |
9 |
SQL Injection Exploits |
Demonstrate risks of SQL Injection by exploiting unsafe inputs to extract data or bypass access while applying secure coding defences. |
10 |
Vulnerability Management |
Identify system vulnerabilities, apply automated patches, and verify that no high-severity issues remain after remediation. |
*Scenarios added regularly and subject to change.
Additional scenario categories on the way include:
- Application exploitation
- Energy
- Firewall and network defence
- Firewall and network filtering
- MITM - ARP poisoning
- Monitoring and detection
- Network and vulnerability scan
- Operating system security
- Operational technology exploitation
- Password and credential attacks
- Privilege escalation
- Railway
- Reconnaissance and scanning
- Social engineering
- Web exploitation
- XSS
Contact
School for Advanced Digital Technology
100 - 444 7 Avenue SW
Calgary, AB
T2P 0X8
-
Phone - 1.403.284.8543
-
Email - sadt.advising@sait.ca
-
Monday - Friday | 6 am - 6 pm
Continuing Education and Professional Studies
MB107, Stan Grad
1301–16 Ave NW
Calgary AB, T2M 0L4
-
Phone - 1.888.284.7051
-
Email - ConEdAdvising@sait.ca

Oki, Âba wathtech, Danit'ada, Tawnshi, Hello.
SAIT is located on the traditional territories of the Niitsitapi (Blackfoot) and the people of Treaty 7 which includes the Siksika, the Piikani, the Kainai, the Tsuut’ina and the Îyârhe Nakoda of Bearspaw, Chiniki and Goodstoney.
We are situated in an area the Blackfoot tribes traditionally called Moh’kinsstis, where the Bow River meets the Elbow River. We now call it the city of Calgary, which is also home to the Métis Nation of Alberta.