Virginia Tech® home

Cyber Research Environment and Threat Evaluation (CREATE) Range

Cyber Research Environment and Threat Evaluation (CREATE) Range 

Immersive, Large-Scale, Remote Cyber Learning Environment 

Funding Source: Senior Military College Cyber Institutes / NSA

  1. Host Cross-Institutional Student Cyber Exercises, Competitions, & Applied Training 
  2. Enable Cyber-Related and Data-Intensive National Security Research 
  3. Advance Student-Faculty-DOD Collaboration
  • All usage must advance student development, particularly DOD workforce skills 
  • Projects must align with broad, Cyber, Data Analytics, and Information Warfare-related fields 
  • Not currently authrized for CUI, ITAR, or classified research 
  • Request Access- Users and their needs will be vetted 
  • AI/ML Training and Safety
    • Attack and Defense of ML Systems
    • Anomaly and Intrusion Detection                    
  • Autonomous/Generative Agents
    • Adversarial Attack Modeling
    • Automated Red Teaming
  • Hardware Accelerated Cryptanalysis
    • Cryptographic Algorithm Testing
    • Post-Quantum Cryptographic Protocol Development
  • Simulated Environments
    • Cyber Security Policy Modeling against Realistic, Large Scale Scenarios
    • Simulate Cyber Attacks on Critical Infrastructure 
  • Capture the Flag
  • Red Team vs Blue Team
  • Vulnerability Assessment Workshops
  • VMware vSphere & Kubermetes Infrastructure 
  • Nividia H100 80GB GPUs
  • Xilinx VCK5000 & ALVEO U200 FPGAs 
  • 50TB SAN & 65TB NAS & 112TB SSD Tiered Storage 
  • 25Gbit & 100Gbit Infrastructure Network
  1. Submit Usage Request/Inquiry 
  2. Requirements Review by Admin & Cyber Institute Director 
  3. As needed: Meeting          
  4. Decision: Approve/Revise/Disapprove 
  5. Reassessment & Feedback (if applicable)    

Cyberbrawl Competition

Cyberbrawl Picture 2
Cyberbrawl Picture 3
Cyberbrawl Picture 1