Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Cloud Marketplace Assessment

It is increasingly critical for IT organizations to manage their cloud commitments with public cloud service providers in a predictable and measurable way. Without the right processes in place, IT's ability to deliver on its consumption commitments can be quickly overextended. WWT's Cloud Marketplace Assessment is a cost-effective way to optimize your software procurement processes.
Assessment

The Cloud Advantage for AI

Discover how leveraging the cloud can help organizations accelerate AI adoption.
Article
•Apr 22, 2025

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Palo Alto Networks Next-Generation Firewall (NGFW)

Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path

Palo Alto Networks Next-Generation Firewall (NGFW) Intermediate

Once you've mastered the basics of Palo Alto's NGFW with the fundamentals Learning Path, it's time to continue your education with the intermediate LP. This Learning Path will teach you topics that help get further use out of your NGFW such as SSL Decryption. Once you've configured SSL Decryption, the NGFW will be able to defend your network in new ways, including URL Filtering, Credential Detection, DGA Detection, DNS Sinkholes, and more!
Learning Path

What's new

REST Application Programming Interface (API) Fundamentals

Application programming interfaces expose access to the system from other systems. Understanding how to utilize the API unlocks endless possibilities in your automation journey.
Foundations Lab
•327 launches

Illumio Insights Overview

Cyber attackers are no longer just at the gates; they're already inside, moving stealthily across your complex hybrid multi-cloud environment. Traditional security tools flood you with data but lack the context needed to connect the dots, leaving attackers free to roam, steal data, and disrupt operations. Enter Illumio Insights, the first cloud detection and response solution built on the AI security graph. This breakthrough in AI-enriched observability, detection, and containment transforms traffic and workload data into actionable intelligence. Agentless and quick to deploy, it provides AI-enriched context for all resources, flows, and workloads, allowing you to dynamically quarantine threats with a single click. Built for cloud scale, Illumio Insights doesn't just find a needle in a haystack but every needle in every haystack, ensuring you have the answers you need.
Video
•1:23
•Jan 13, 2026

Infrastructure as Code Fundamentals with Terraform and GCP

Learn how to use Terraform to build and manage Google Cloud Platform infrastructure through code.
Foundations Lab
•156 launches

GCP: Leveled Up

This Learning Series delivers a comprehensive and engaging deep dive into Google Cloud through a carefully structured set of Learning Paths. Building on core GCP services such as Compute, Storage, and Networking, you'll advance into the platform's broader set of tools and capabilities—including access management and prompt engineering. Throughout the series, you'll develop a cohesive, end-to-end understanding of how GCP services work together to design, deploy, and manage scalable, secure cloud solutions.
Learning Series

GCP: Build your Foundation

This Learning Series establishes a strong foundation in cloud computing before introducing Google Cloud and its platform. You'll explore core GCP services such as compute, databases, storage, and networking while gaining practical, hands-on experience using both the GCP CLI and the GCP Console.
Learning Series

AWS: Cloud Computing Services

Building on your cloud computing foundation, this Learning Series immerses you in the world of AWS and its robust suite of services. You'll begin with core AWS offerings—Compute, Storage, and Networking—and then progress into advanced capabilities like CloudWatch, Outposts, and more as you deepen your cloud knowledge.
Learning Series

Azure: Build your Foundation

This Learning Series builds a solid foundation in cloud computing before introducing you to Microsoft Azure. You'll explore key Azure services—including Compute, Storage, and Networking—and gain practical, hands-on experience using both the Azure CLI and the Azure Portal.
Learning Series

Azure: Leveled Up

This Learning Series provides a well-rounded understanding of Microsoft Azure and its solutions through a structured set of Learning Paths. After introducing core Azure services such as Compute, Storage, and Networking, you'll dive deeper into the wide range of tools and capabilities Azure offers.
Learning Series

Partner POV | When AI Becomes the Heart of Security: Powering a Future You Can Trust

AI is revolutionizing security, reshaping how we build, attack, and defend. Wiz leverages AI to transform complexity into clarity, using the Security Graph for trusted insights. With transparency and actionability, Wiz's AI Agents enhance security across the lifecycle, empowering teams to act confidently and efficiently in a dynamic environment.
Partner Contribution
•Dec 11, 2025

Zero Trust in the Cloud: Does It Actually Work?

Discover how Zero Trust principles can transform your cloud security by addressing infrastructure complexities and enhancing identity management. Join our Zero Trust Workshop to explore partner solutions and elevate your cloud security strategies.
Blog
•Dec 10, 2025

F5 Terraform Automation Lab

Welcome to WWT's F5 Terraform Automation Lab. The intended goal of this lab is to introduce and enable F5 administrators to utilize Terraform to automate, simplify and streamline the deployment of F5 services.
Foundations Lab
•1099 launches

F5 Distributed Cloud WAAP Use Cases Demo

Several of the fundamental principles of F5 Distributed Cloud (XC) are highlighted in this lab environment. You will be simulating a customer during the lab who needs to verify the safety of an application. The objective is to verify the applications safety of on-premises or application on cloud before and after enabling F5 Distributed Cloud Console WAAP Capabilities by sending attacks to the application.
Advanced Configuration Lab
•223 launches

How F5 Drives Citrix VDI Excellence in Application Delivery

This lab discusses the collaboration between F5 technologies and Citrix VDI to enhance security and performance in virtual desktop infrastructure. F5's security-first approach and performance optimization strengthen Citrix VDI environments, meeting the needs of remote workforces and setting new standards for secure and high-performance virtualized experiences. The hardware and software used in the lab include 5 Windows Servers (v2016) and 1 F5 BIG-IP APM (v17.1.0.1).
Advanced Configuration Lab
•49 launches

F5 Distributed Cloud on AWS

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within AWS, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across AWS, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within AWS environments privately.
Advanced Configuration Lab
•14 launches

F5 Distributed Cloud on GCP

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within GCP, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across GCP, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within GCP environments privately.
Advanced Configuration Lab
•27 launches

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•29 launches

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•165 launches

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•231 launches

Partner POV | Bringing Predictive Security to the AWS Network Perimeter

Infoblox's integration with AWS Network Firewall introduces predictive, DNS-based threat intelligence, transforming cloud security from reactive to proactive. This collaboration empowers AWS users to block threats earlier, enhancing protection and reducing complexity. Experience a strategic shift in cybersecurity, leveraging Infoblox's intelligence to safeguard cloud environments efficiently and effectively.
Partner Contribution
•Nov 25, 2025

Partner POV | Strengthening Cloud Security with Netskope and Microsoft

Netskope's latest integrations with Microsoft enhance security across cloud environments, offering comprehensive data protection and threat prevention. By unifying with Microsoft Purview, Entra, and Copilot, Netskope empowers organizations to maximize their Microsoft investments, ensuring robust security, compliance, and real-time risk mitigation in an AI-driven world.
Partner Contribution
•Nov 25, 2025

Cloud Security

Defending valuable data and digital assets against existing and emerging cyber threats, human error and insider threats.

1151 Followers

At a glance

160Total
49Blogs
44Articles
23Labs
19Videos
10Learning Paths
7Case Studies
3Events
2Assessments
2Workshops
1WWT Research
What's related
  • Cloud
  • Security
  • ATC
  • Blog
  • Network Security
  • Cloud Strategy and Adoption
  • Security Operations
  • AI Security
  • Application & API Security
  • Cybersecurity Risk & Strategy
  • F5
  • AWS
  • Data Security
  • Wiz
  • Networking
  • Cloud Networking
  • Automation
  • Cisco
  • Data Center
  • Data Protection & Cyber Recovery

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies