Cyber Range
Library
Filter by Content Types
- No options
Filter by Partners
- No options
83 results found
Wiz Cloud Security
Learn the fundamentals of Wiz's Cloud Security Platform, including their Security Graph and Integrations. Dive into Investigations using Wiz's tools to learn more about security threats, following possible attack chains and learn to secure the cloud before attacks take place.
Learning Path
Security Operations
This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series
AI Security
In this learning path you will gain a fundamental understanding of AI security by exploring topics such as the AI development lifecycle, data flow during this lifecycle, as well as attack surfaces present in the AI development lifecycle. You will also learn about topics such as the attacks that AI models face and the risks of user data and privacy when it comes to AI.
Learning Path
Fortinet SD-WAN
Fortinet's SD-WAN solution utilizes the FortiGate to provide fast, scalable, and flexible Secure SD-WAN on-premise and to the cloud. You will learn the basics of operating Fortinet's SD-WAN solution, including provisioning, policies, and software upgrades.
Learning Path
Threat Detection and Incident Response Essentials
As cyber threats grow increasingly sophisticated, the need for skilled SOC Analysts has never been greater. This learning path follows Samantha, a SOC operator, as she embarks on a journey to acquire the skills and analytical mindset of a SOC analyst. Each module immerses learners in real-world SOC scenarios, blending theory with hands-on practice, to prepare them for today's dynamic cybersecurity landscape.
Learning Path
Mastering Threat Detection and Incident Response
It was a quiet Friday night when the alerts hit—rogue Kerberos tickets spiking from a Pass-the-Hash attack. With 14 years in the SOC trenches, I, Shoaib Mohammed Shahapuri, saw my Tier 1 analyst, Morgan, catch the first anomaly, but it was Riley, our red teamer, who nearly owned the domain—stopped just in time. That close call inspired this Intermediate Threat Detection & Incident Response Learning Path—a 13-hour journey designed to elevate your career from Tier 1 to Tier 2/3. You'll master early-stage detection with Falcon XDR and Security Onion to catch initial access like hash captures; escalate alerts with Morgan and Alex using SOAR; track APT29-style campaigns with Alex and Taylor through Falcon Intelligence; defend Active Directory from Kerberoasting with Falcon ITDR; and fine-tune noisy detections from fileless malware using XDR and network-based tools. Each hands-on lab simulates Riley's full attack chain—credential theft, privilege escalation, lateral movement—so you can build the skills that lead to promotions and high-paying roles. Ready to outsmart Riley and level up your SOC career? Let's dive in.
Learning Path
CrowdStrike EDR
Learn about CrowdStrike Falcon Insight, CrowdStrike's Endpoint Detection and Response (EDR) technology. Falcon Insight ensures customers have comprehensive, real-time visibility into everything that is happening on their endpoints as well as helps you respond to and remediate threats effectively, getting you back to business quickly. In this Learning Path, you will explore the architecture on which CrowdStrike Falcon Insights runs, as well as the deployment of CrowdStrike Falcon agents and configuration of policies. You will also learn about the detection and response capabilities that are provided by CrowdStrike Falcon Insight.
Learning Path
CrowdStrike Proving Ground Lab
WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
•1507 launches
Palo Alto Networks Next-Generation Firewall (NGFW)
Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path
LLM Security
In this learning path, you will gain a fundamental understanding of Large Language Model (LLM) security. Through a series of articles and videos you will explore topics like what is an LLM, data security risks, the OWASP Top 10 for LLMs, strategies for defending LLM systems, and the critical role users play in maintaining security.
Learning Path
Cyber Range - Initiation
Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•1992 launches
ATC Lab Gateway Access Test
Lab to be deployed for testing customer access to standard Lab Gateway protocols.
Sandbox Lab
•621 launches