Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Partners

Select a tab

15 results found
ATC+

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•Advanced
•37 launches
ATC+

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•Advanced
•181 launches
ATC+

F5 Distributed Cloud on GCP

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within GCP, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across GCP, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within GCP environments privately.
Advanced Configuration Lab
•Advanced
•33 launches

Getting Started with NGINX One

Explore NGINX One, an all-in-one platform that integrates the best of NGINX's offerings into a unified package that includes a cloud-based dashboard and access to F5 Distributed Cloud. Customers get advanced load balancing, web and application server capabilities, API gateway functionalities, and security features. The goal of NGINX One is to provide unparalleled performance, security, and scalability for modern applications, whether they are deployed in the cloud, on-premises, or in hybrid environments.
Foundations Lab
•Fundamentals
•34 launches

JuicedShop Security Lab Series: Broken Access Control

The JuicedShop Security Lab Series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•196 launches

JuicedShop Security Lab Series: Server-Side Request Forgery (SSRF)

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•18 launches

JuicedShop Security Lab Series: Identification and Authentication Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•27 launches
ATC+

Cisco Secure DDOS Protection Lab

Cloud DDoS Protection is a cloud-delivered Cisco security solution that monitors network traffic and intelligently diverts malicious traffic when the network comes under attack. Cloud DDoS Protection enhances business resilience and ensures the availability of the network and applications. It reduces risk for organizations by giving them the ability to maintain uptime, meet SLAs and ensure that the network is available to legitimate users when under attack.
Advanced Configuration Lab
•Intermediate
•58 launches

JuicedShop Security Lab Series: Software and Data Integrity Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•15 launches

JuicedShop Security Lab Series: Insecure Design

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•42 launches

JuicedShop Security Lab Series: Injection Attacks

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•99 launches

JuicedShop Security Lab Series: Logging and Monitoring Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•13 launches

Application & API Security

As the industry shifts from monolithic to microservices-based applications, fortify your application and API landscapes against emerging threats and vulnerabilities.

31 Followers

At a glance

91Total
26Blogs
23Articles
19Videos
15Labs
4Events
1Briefing
1Case Study
1Learning Path
1Playlist
What's related
  • Security
  • AI Security
  • F5
  • Blog
  • Cloud
  • Network Security
  • ATC
  • Cloud Security
  • WWT Presents
  • Akamai
  • Cybersecurity Risk & Strategy
  • Cyber Range
  • AI & Data
  • F5 Application Delivery Contollers
  • Networking
  • Security Operations
  • Application Delivery Controllers
  • F5 Distributed Cloud
  • F5 Automation
  • Applied AI

What's related

WWT
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies