University of California
Public community
Owned by Janet McIllece + 4
About
WWT Resources & Support
Explore
Experts
Members
UCLA Health
UCLA
UC San Francisco
UC Office of the President
UC Davis
UC Irvine
UC Riverside
Select a tab
Popular Content
Partner POV | Simplify SD-WAN Operations with Fortinet Secure SD-WAN, FortiManager and FortiAnalyzer
Fortinet Secure SD-WAN addresses today's WAN challenges, combining next-generation firewalls with integrated solutions for management and analytics to centralize and simplify SD-WAN operations
Partner Contribution
•Jun 19, 2025
Core Routing Security: MACsec
The use of MACsec within network cores is exploding in popularity due to rising security demands and recent hardware advancements. This article explores MACsec's evolution, benefits and deployment considerations to help get you on your way to securing your high-speed core links.
Blog
•Jun 17, 2025
🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa
This is a red team style capture the flag event that puts you and your team in the role of hackers trying to break into an emulated internal network. Assemble a team of 3 to 4 players ready to dig into vulnerabilities, decrypt systems, and disable key services before time runs out.
This time, you'll have Willa on your side. Willa is a new AI teammate built to guide you through the game with real-time tips, helpful insights, and resource suggestions. She can even flag a live proctor if something needs attention. Whether you're stuck on a flag or just need a nudge, Willa has your back.
Get ready to think like an attacker, act fast, and work as a team.
Cyber Range
Jul 17, 2025 • 9am
Zero Trust with F5 BIG-IP APM, SSLO & WAF
In this lab we will be addressing a specific set of BIG-IP (versatility) characteristics: authentication and orchestration. In doing so, we will also be showing you some powerful capabilities of BIG-IP APM and SSL Orchestrator.
Advanced Configuration Lab
27 launches
Welcome To The League CTF
Step into the world of advanced cybersecurity in our Cyber Range CTF game, "Welcome to the League". This event is tailored for individuals ready to push their red skills to the limit. Participants will engage in a series of sophisticated challenges designed to test their abilities in Active Directory enumeration, privilege escalation, and post-exploitation techniques. Do you have what it takes to join The League?
This game takes around 8 hours to complete and will be accessible for a full 24-hour period, allowing players to log in and progress at their own pace. With state-saving functionality, participants can pause and resume their gameplay without losing progress, ensuring a flexible and engaging experience.
How to Begin (DAY OF CTF):
1. Watch the introduction video from Mal by clicking "Launch Event".
2. Click "Launch Gamespace" to launch the CTF and access your Player Desktop.
3. Double-click the "README.txt" file on your Player Desktop for further instructions.
Cyber Range
Jun 26, 2025 • 8am
What's New
Loading