Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

6 results found
ATC+

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•Advanced
•181 launches

Veeam Availability Suite Lab

This lab introduces Veeam Backup & Recovery, focusing on the protection of virtual machines running on VMware. Exercises include initial configuration, manual backup of a VM, and protection of VMs using tags.
Foundations Lab
•Fundamentals
•237 launches

Hands-on with Microsoft Active Directory

In this lab, you will set up a basic Active Directory environment to gain practical experience with directory services. The steps will include installing Active Directory, creating two Organizational Units (OUs)—one for users and one for groups—and setting up both a user account and a group account. To demonstrate group membership management, you will then add the user to the group. This lab is designed to help you build foundational skills for managing users and resources in a Windows Server environment.
Foundations Lab
•Fundamentals
•100 launches
ATC+

Hyper-V - VM Creations Lab

In this lab, we will walk through the process of creating a Hyper-V virtual machine. The lab will guide you through selecting the VM's configuration, such as allocating memory, assigning virtual processors, and creating a virtual hard disk. We will then show how to choose the installation method, such as using an ISO image, to install the operating system.
Advanced Configuration Lab
•Intermediate
•88 launches

Veeam Data Platform Sandbox (13.0.1)

This Veeam Data Platform Sandbox is a capability of the ATC designed to provide an environment to gain hands on experience with the latest features of the Veeam Data Platform. The environment that supports the Veeam Data Platform is completely virtual, removing any hardware dependencies associated with physical infrastructure. The lab includes Veeam Data Platform version 13.1 and numerous hosts for workload configuration.
Sandbox Lab
•Intermediate
•10 launches

Hands-on with Microsoft Group Policy

Maintaining security and managing user behavior in an enterprise environment is essential. Group Policy, a core feature of Microsoft Windows, allows administrators to enforce security and operational settings across the network. In this lab, you will implement group policies like strong password requirements, USB device restrictions, and automatic workstation locking to protect sensitive data.
Foundations Lab
•Fundamentals
•36 launches

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

911 Followers

At a glance

142Total
48Articles
33Blogs
23Videos
11Learning Paths
9Case Studies
9Events
6Labs
2WWT Research
1Briefing
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Cohesity
  • Commvault
  • Blog
  • Rubrik
  • AI & Data
  • Dell Tech
  • Cloud
  • Applied AI
  • Data Security
  • Primary Storage
  • Commvault Cyber Resilience
  • Dell Data Protection
  • Cloud Security
  • Cohesity Data Protection
  • WWT Presents
  • AI Security

What's related

WWT
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies