Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

27 results found

CyberArk Privileged Account Management Lab

Explore the essential features of CyberArk Privileged Access Security (PAS) in this lab, showcasing its capabilities in managing and auditing privileged accounts across Windows and Linux environments. Discover how CyberArk PAS enhances security through automated password management and secure session monitoring.
Foundations Lab
•412 launches

Infrastructure as Code Fundamentals With Terraform and Azure

Learn how to use Terraform to build and manage Azure infrastructure through code.
Foundations Lab
•617 launches

Infrastructure as Code Fundamentals Lab With Terraform and AWS

Learn how to use Terraform to build and manage AWS infrastructure through code.
Foundations Lab
•688 launches

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•228 launches

Windows Management With Ansible

To keep up with the growing speed of business demands, there's a pressing need to make programmability and automation an inherent part of operational IT processes. WWT offers hands-on Ansible Automation Training Labs to help customers learn how to get started using centralized automation tools to manage and deploy configurations.
Foundations Lab
•570 launches

F5 Terraform Automation Lab

Welcome to WWT's F5 Terraform Automation Lab. The intended goal of this lab is to introduce and enable F5 administrators to utilize Terraform to automate, simplify and streamline the deployment of F5 services.
Foundations Lab
•1026 launches

F5 Distributed Cloud WAF on Regional and App Connect Deployment Mode

F5 Distributed Cloud WAF deployed on Regional Edge and App Connect Deployment mode. This deployment model offers an optimal solution for scenarios where backend applications are inaccessible from the internet, lacking a Fully Qualified Domain Name (FQDN) or Public IP. In this case Customer Edge sites can be deployed to connect these "private" customer sites to the XC Global Network via IPSEC tunnels opened from Distributed Cloud Customer Edges to the closes two REs sites. Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the Internet through anycast IPs. Customer Edges are being deployed on the customer sites and connect to the closest RE and traffic will be inspected by the WAAF security policy. The traffic will then be forwarded across the distributed cloud global network towards an egress Regional Edge and then over an IPSEC tunnel to the Customer edge site where it will be forwarded to the backend applications as pure IP-based traffic.
Advanced Configuration Lab
•21 launches

NetApp Cloud Volumes ONTAP Lab

NetApp Cloud Volumes ONTAP is a powerful, cost-effective, and easy-to-use data management solution for your cloud workloads. The familiar and reliable Cloud Volumes ONTAP data management software with its data protection and storage efficiency features is available in AWS, Azure and Google Cloud.
Advanced Configuration Lab
•519 launches

Cohesity Essentials Lab

The Cohesity Essentials Lab enables users to learn the fundamental features and functionality of the Cohesity DataPlatform.
Foundations Lab
•1045 launches

Advanced Configuration Lab

CrowdStrike Cloud Security

WWT's Crowdstrike Cloud Security Lab serves as a platform to showcase the utility of Crowdstrike's Falcon Agent in conjunction with the three leading cloud service providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). This lab offers a comprehensive set of instructions, guiding users step by step on how Crowdstrike's Unified Security Platform can effectively enhance visibility within a multi-cloud environment. Additionally, the lab encompasses strategies for addressing misconfigurations within these environments, the utilization of Cloud Posture Security Management (CPSM), and the real-time capabilities of the Falcon Agent in preventing cloud breaches. CrowdStrike Cloud Security establishes a continuous posture management system and breach protection mechanism for any cloud, utilizing the industry's exclusive adversary-focused Cloud Native Application Protection Platform. This holistic platform emphasizes various aspects including endpoint security, threat intelligence, identity protection, security and IT operations, as well as cloud security. The comprehensive visibility from endpoint to the cloud, facilitated by both agent and agentless capabilities within Crowdstrike's platform, provides a comprehensive perspective on threats, ensuring the identification of all vulnerabilities. Driven by extensive intelligence and end-to-end safeguarding from the host environment to the cloud, Crowdstrike's Cloud Security delivers enhanced visibility, compliance, and industry-leading rapid threat detection and response, all aimed at outsmarting adversaries.
Advanced Configuration Lab
•122 launches

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•211 launches

SASE Architecture: Cisco Viptela SD-WAN With Zscaler (SSE) Lab

Secure Access Service Edge (SASE), coined by Gartner in 2019, is a solution that blends networking and security into cloud scale architecture that optimizes end user performance and improves security for an organization. With the Zscaler and SD-WAN integration, you can rapidly gain access to cloud-delivered security in minutes. This market leading API automation makes it very fast and agile to deploy and manage the network and security environment of hundreds or even thousands of remote sites.
Advanced Configuration Lab
•398 launches

Cloud Security

Defending valuable data and digital assets against existing and emerging cyber threats, human error and insider threats.

1146 Followers

At a glance

170Total
44Articles
41Blogs
27Labs
27Videos
8Learning Paths
7Case Studies
5Events
4Assessments
3Workshops
2Briefings
1Playlist
1WWT Research
What's related
  • Cloud
  • Security
  • ATC
  • Blog
  • Network Security
  • Cloud Strategy and Adoption
  • AWS
  • Application & API Security
  • Security Operations
  • Cybersecurity Risk & Strategy
  • F5
  • Automation
  • Cisco
  • Microsoft
  • Networking
  • Data Center
  • Cloud Networking
  • Endpoint Security
  • Cloud Migration and Modernization
  • Data Protection & Cyber Recovery

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies