Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Partners

Select a tab

What's popular

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•Advanced
•31 launches

JuicedShop Security Lab Series: Server-Side Request Forgery (SSRF)

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
17 launches

JuicedShop Security Lab Series: Cryptographic Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
119 launches

F5 Distributed Cloud WAF on Regional Deployment Mode

This WWT Lab will provide a hand on experience of F5 Distributed Cloud WAF deployed on Regional Edge in deployment mode. This deployment mode is better suited when protecting backend applications which are already public accessible from the internet via FQDN or Public IP. F5 Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the internet through anycast IPs. The end users will connect to their closest Regional Edge and the traffic will be inspected by the WAF security policy. The traffic will then be forwarded across the XC Global Network towards an egress Regional Edge and then towards the customer site as regular internet traffic. The customer will filter the traffic, only allowing traffic forwarded by the XC platform.
Advanced Configuration Lab
•Advanced
57 launches

The AI Factory Revolution: Engineering Away Resource Contention with F5, NVIDIA & WWT

Artificial intelligence (AI) has created unprecedented demand for computing resources, causing strain on existing infrastructure and creating bottlenecks that limit business transformation. AI factories are large-scale infrastructure for organizations looking to harness AI capabilities while managing resource constraints. NVIDIA's AI capabilities, F5's application security and delivery solutions, and WWT's consulting expertise create a powerful solution.
Article
•Apr 11, 2025

What's new

JuicedShop Security Lab Series: Identification and Authentication Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•25 launches

JuicedShop Security Lab Series: Server-Side Request Forgery (SSRF)

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•17 launches

JuicedShop Security Lab Series: Logging and Monitoring Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•13 launches

Partner POV | East-West Is the New North-South: Rethink Security for the AI-Driven Data Center

In AI-driven data centers, traditional perimeter security is obsolete as east-west traffic dominates. This shift necessitates microsegmentation to secure internal communications, reduce attack surfaces, and ensure compliance. Akamai Guardicore Segmentation with Aruba CX 10000 offers real-time, in-fabric enforcement, optimizing security for modern applications and AI workloads.
Partner Contribution
•Feb 12, 2026

Accelerating Kubernetes Ingress and Security Automation with F5 and WWT

This blog highlights automated deployment patterns of F5 NGINX Ingress Controller paired with F5 NGINX App Protect across Amazon Web Services, Google Cloud Platform and Microsoft Azure.
Blog
•Feb 11, 2026

Cisco Secure DDOS Protection Lab

Cloud DDoS Protection is a cloud-delivered Cisco security solution that monitors network traffic and intelligently diverts malicious traffic when the network comes under attack. Cloud DDoS Protection enhances business resilience and ensures the availability of the network and applications. It reduces risk for organizations by giving them the ability to maintain uptime, meet SLAs and ensure that the network is available to legitimate users when under attack.
Advanced Configuration Lab
•Intermediate
•57 launches

Comprehensive Guide to OWASP Top 10: Web Applications, APIs and Automated Threats

The Open Web Application Security Project (OWASP) provides industry-standard frameworks for identifying and mitigating the most critical security risks facing modern applications. This guide explores three critical OWASP initiatives and maps F5's Web Application and API Protection (WAAP) solutions to each threat category. What You'll Learn: * OWASP Web Application Security Top 10 (2021) * OWASP API Security Top 10 (2023) * OWASP Automated Threats to Web Applications (21 threat types) * How F5 solutions protect against each threat category * Hands-on lab exercises to practice defense techniques
Blog
•Jan 27, 2026

Harness the Power of Azure with NGINXaaS – Advanced Load Balancing and API Gateway

This blog explains how modern, API-driven applications demand cloud-native security and highlights how F5 NGINXaaS for Azure delivers a fully managed, high-performance WAF to protect them. It outlines key capabilities such as OWASP Top 10 defenses, API security, DevSecOps integration and Azure-native observability, helping enterprises secure apps and APIs without hardware or operational overhead.
Blog
•Jan 20, 2026

Partner POV | The Year in Review 2025: AI, APIs, and a Whole Lot of Audacity

In 2025, AI-driven cyberattacks surged, challenging traditional defenses and highlighting the need for robust cybersecurity strategies. As threats evolve, organizations must prioritize AI literacy, API security, and resilience against sophisticated attacks. Looking to 2026, the focus shifts to managing AI risks, understanding attacker motivations, and enhancing cross-team communication for effective incident response.
Partner Contribution
•Jan 5, 2026

JuicedShop Security Lab Series: Injection Attacks

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•93 launches

F5 Distributed Cloud WAAP Use Cases Demo

Several of the fundamental principles of F5 Distributed Cloud (XC) are highlighted in this lab environment. You will be simulating a customer during the lab who needs to verify the safety of an application. The objective is to verify the applications safety of on-premises or application on cloud before and after enabling F5 Distributed Cloud Console WAAP Capabilities by sending attacks to the application.
Advanced Configuration Lab
•Advanced
•226 launches

F5 Distributed Cloud on GCP

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within GCP, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across GCP, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within GCP environments privately.
Advanced Configuration Lab
•Advanced
•29 launches

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•Advanced
•31 launches

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•Advanced
•168 launches

Partner POV | Bots Are Evolving: Here's How to Stop AI-Powered Automation Before It Stops You

AI-driven bots now mimic human behavior so convincingly that detection is challenging, making recognition and reporting of scams crucial. As bots evolve, a layered defense combining technology and human vigilance is essential. By sharing intelligence and enhancing awareness, organizations can outpace these threats and maintain trust.
Partner Contribution
•Dec 1, 2025

Partner POV | Smarter Threats Need Smarter Defenses: AI, APIs, & Critical Infrastructure Security

AI accelerates cyber threats, expanding attack surfaces in critical infrastructure through APIs. As AI adoption grows, so do vulnerabilities, demanding smarter defenses. Organizations must prioritize real-time anomaly detection, automated containment, and proactive testing to secure data and systems. In the AI era, speed and adaptability are crucial for cybersecurity resilience.
Partner Contribution
•Oct 30, 2025

Partner POV | These 4 Threats to AI Applications Require New Cybersecurity Strategies

Large language models and AI applications are transforming enterprises but introduce new vulnerabilities. Traditional cybersecurity is inadequate against threats like prompt injection, toxic outputs, data exfiltration, and AI-specific DoS attacks. Companies must understand these risks and adopt modern strategies to protect their AI investments and ensure secure, trustworthy interactions.
Partner Contribution
•Sep 17, 2025

Akamai Firewall for AI Overview

Akamai Firewall for AI is purpose-built to secure AI apps and interactions. Learn how it works in this overview video.
Video
•1:59
•Sep 2, 2025

Partner POV | Strategic Openness is Banks' Next Competitive Differentiator

With open finance initiatives gathering momentum globally, forward-thinking banks around the world have advanced beyond viewing more open ecosystems through the lens of regulatory obligations or passing trends.
Partner Contribution
•Aug 15, 2025

Getting Started with NGINX One

Explore NGINX One, an all-in-one platform that integrates the best of NGINX's offerings into a unified package that includes a cloud-based dashboard and access to F5 Distributed Cloud. Customers get advanced load balancing, web and application server capabilities, API gateway functionalities, and security features. The goal of NGINX One is to provide unparalleled performance, security, and scalability for modern applications, whether they are deployed in the cloud, on-premises, or in hybrid environments.
Foundations Lab
•Fundamentals
•31 launches

Application & API Security

As the industry shifts from monolithic to microservices-based applications, fortify your application and API landscapes against emerging threats and vulnerabilities.

28 Followers

At a glance

95Total
26Blogs
23Articles
20Labs
18Videos
4Events
1Briefing
1Case Study
1Learning Path
1Playlist
What's related
  • Security
  • F5
  • Cloud
  • ATC
  • Cloud Security
  • AI Security
  • Blog
  • Network Security
  • WWT Presents
  • F5 Distributed Cloud
  • F5 Application Delivery Contollers
  • Akamai
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • F5 Automation
  • Networking
  • Application Delivery Controllers
  • AI & Data
  • Security Operations
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies