Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

7 results found

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•165 launches

Hyper-V - VM Creations Lab

In this lab, we will walk through the process of creating a Hyper-V virtual machine. The lab will guide you through selecting the VM's configuration, such as allocating memory, assigning virtual processors, and creating a virtual hard disk. We will then show how to choose the installation method, such as using an ISO image, to install the operating system.
Advanced Configuration Lab
•62 launches

F5 Distributed Cloud WAAP Use Cases Demo

Several of the fundamental principles of F5 Distributed Cloud (XC) are highlighted in this lab environment. You will be simulating a customer during the lab who needs to verify the safety of an application. The objective is to verify the applications safety of on-premises or application on cloud before and after enabling F5 Distributed Cloud Console WAAP Capabilities by sending attacks to the application.
Advanced Configuration Lab
•223 launches

Veeam Availability Suite Lab

This lab introduces Veeam Backup & Recovery, focusing on the protection of virtual machines running on VMware. Exercises include initial configuration, manual backup of a VM, and protection of VMs using tags.
Foundations Lab
•213 launches

Hands-on with Microsoft Active Directory

In this lab, you will set up a basic Active Directory environment to gain practical experience with directory services. The steps will include installing Active Directory, creating two Organizational Units (OUs)—one for users and one for groups—and setting up both a user account and a group account. To demonstrate group membership management, you will then add the user to the group. This lab is designed to help you build foundational skills for managing users and resources in a Windows Server environment.
Foundations Lab
•25 launches

Dell PowerProtect DD Virtual Edition Deployment and Configuration

Dell PowerProtect DD Virtual Edition (DDVE) is the software-defined data protection offering within the Dell PowerProtect DD Series. DDVE provides flexibility while maintaining all the core differentiating protection storage capabilities. This lab will demonstrate the deployment and initial configuration of a PowerProtect DD Virtual Edition instance within a VMware vSphere environment.
Advanced Configuration Lab
•56 launches

Hands-on with Microsoft Group Policy

Maintaining security and managing user behavior in an enterprise environment is essential. Group Policy, a core feature of Microsoft Windows, allows administrators to enforce security and operational settings across the network. In this lab, you will implement group policies like strong password requirements, USB device restrictions, and automatic workstation locking to protect sensitive data.
Foundations Lab
•22 launches

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

909 Followers

At a glance

145Total
52Articles
32Blogs
23Videos
12Learning Paths
9Case Studies
7Events
7Labs
2WWT Research
1Workshop
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Commvault
  • Cohesity
  • Blog
  • Dell Tech
  • Rubrik
  • Dell Data Protection
  • AI & Data
  • Cloud
  • Cloud Security
  • Commvault Cyber Resilience
  • Data Security
  • Applied AI
  • Primary Storage
  • Dell PowerProtect
  • AI Security
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies