Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Partners

Select a tab

What's popular

JuicedShop Security Lab Series: Broken Access Control

The JuicedShop Security Lab Series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•191 launches

JuicedShop Security Lab Series: Injection Attacks

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
85 launches

Hands-On Lab Workshop: Juiced Shop, OWASP

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Juiced Shop Lab. This workshop is designed to introduce fundamental concepts of web application security testing through our CTF mini-games series, JuicedShop. After the live lab, you'll have a better understanding of how to use Burp Suite and will be able to apply those skills to more challenges in our JuicedShop series. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
Jul 24, 2025 • 11am

JuicedShop Security Lab Series: Server-Side Request Forgery (SSRF)

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
14 launches

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
27 launches

What's new

F5 Distributed Cloud WAAP Use Cases Demo

Several of the fundamental principles of F5 Distributed Cloud (XC) are highlighted in this lab environment. You will be simulating a customer during the lab who needs to verify the safety of an application. The objective is to verify the applications safety of on-premises or application on cloud before and after enabling F5 Distributed Cloud Console WAAP Capabilities by sending attacks to the application.
Advanced Configuration Lab
•223 launches

F5 Distributed Cloud on AWS

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within AWS, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across AWS, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within AWS environments privately.
Advanced Configuration Lab
•9 launches

F5 Distributed Cloud on GCP

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within GCP, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across GCP, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within GCP environments privately.
Advanced Configuration Lab
•27 launches

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•27 launches

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•161 launches

Partner POV | Bots Are Evolving: Here's How to Stop AI-Powered Automation Before It Stops You

AI-driven bots now mimic human behavior so convincingly that detection is challenging, making recognition and reporting of scams crucial. As bots evolve, a layered defense combining technology and human vigilance is essential. By sharing intelligence and enhancing awareness, organizations can outpace these threats and maintain trust.
Partner Contribution
•Dec 1, 2025

Partner POV | Smarter Threats Need Smarter Defenses: AI, APIs, & Critical Infrastructure Security

AI accelerates cyber threats, expanding attack surfaces in critical infrastructure through APIs. As AI adoption grows, so do vulnerabilities, demanding smarter defenses. Organizations must prioritize real-time anomaly detection, automated containment, and proactive testing to secure data and systems. In the AI era, speed and adaptability are crucial for cybersecurity resilience.
Partner Contribution
•Oct 30, 2025

Partner POV | These 4 Threats to AI Applications Require New Cybersecurity Strategies

Large language models and AI applications are transforming enterprises but introduce new vulnerabilities. Traditional cybersecurity is inadequate against threats like prompt injection, toxic outputs, data exfiltration, and AI-specific DoS attacks. Companies must understand these risks and adopt modern strategies to protect their AI investments and ensure secure, trustworthy interactions.
Partner Contribution
•Sep 17, 2025

Akamai Firewall for AI Overview

Akamai Firewall for AI is purpose-built to secure AI apps and interactions. Learn how it works in this overview video.
Video
•1:59
•Sep 2, 2025

Partner POV | Strategic Openness is Banks' Next Competitive Differentiator

With open finance initiatives gathering momentum globally, forward-thinking banks around the world have advanced beyond viewing more open ecosystems through the lens of regulatory obligations or passing trends.
Partner Contribution
•Aug 15, 2025

Getting Started with NGINX One

Explore NGINX One, an all-in-one platform that integrates the best of NGINX's offerings into a unified package that includes a cloud-based dashboard and access to F5 Distributed Cloud. Customers get advanced load balancing, web and application server capabilities, API gateway functionalities, and security features. The goal of NGINX One is to provide unparalleled performance, security, and scalability for modern applications, whether they are deployed in the cloud, on-premises, or in hybrid environments.
Foundations Lab
•24 launches

JuicedShop Security Lab Series: Software and Data Integrity Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•15 launches

JuicedShop Security Lab Series: Vulnerable and Outdated Components

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•25 launches

Hands-On Lab Workshop: Juiced Shop, OWASP

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Juiced Shop Lab. This workshop is designed to introduce fundamental concepts of web application security testing through our CTF mini-games series, JuicedShop. After the live lab, you'll have a better understanding of how to use Burp Suite and will be able to apply those skills to more challenges in our JuicedShop series. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 24, 2025 • 11am

JuicedShop Security Lab Series: Security Misconfiguration

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•36 launches

JuicedShop Security Lab Series: Cryptographic Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•67 launches

Partner POV | Global Payments Company Secures APIs to Protect Payment Innovation

Akamai demonstrates their ability to revolutionize global payments by securing APIs with unparalleled visibility and automation. They empower the customer to mitigate risks, ensure compliance, and confidently expand into new markets, transforming API security from a black box into a transparent, manageable asset. Discover how this synergy fuels secure, rapid growth.
Partner Contribution
•Jul 8, 2025

JuicedShop Security Lab Series: Broken Access Control

The JuicedShop Security Lab Series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•191 launches

JuicedShop Security Lab Series: Insecure Design

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•40 launches

The Cyber Window

The Cyber Window is a learning series hosted by Global Application Security Architect Matt Rose that covers a wide range of Application Security topics. In each episodes, Matt breaks down complex AppSec topics into easy-to-understand concepts and lessons.
Playlist
•Jun 22, 2025

Application & API Security

As the industry shifts from monolithic to microservices-based applications, fortify your application and API landscapes against emerging threats and vulnerabilities.

25 Followers

At a glance

100Total
28Articles
23Blogs
20Labs
18Videos
4Briefings
4Events
1Case Study
1Learning Path
1Playlist
What's related
  • Security
  • F5
  • Cloud
  • Cloud Security
  • ATC
  • AI Security
  • Network Security
  • Blog
  • WWT Presents
  • Akamai
  • F5 Distributed Cloud
  • F5 Application Delivery Contollers
  • Cyber Range
  • Networking
  • Application Delivery Controllers
  • Cybersecurity Risk & Strategy
  • F5 Automation
  • AI & Data
  • Applied AI
  • Data Center

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies