Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•2532 launches

Cyber Range - CH3M1C41_SP1LL

CH3M1C41_SP1LL (Chemical Spill) is a Red-Team Capture the Flag (CTF) game where you will be the attacker within an Operational Technology (OT) network. You will need to use diverse red-team skills such as network discovery, web application attacks, and password cracking and combine them with OT knowledge to shut down the production of a chemical.
Advanced Configuration Lab
420 launches

Security Operations

This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series

Fortinet Secure SD-WAN

The Fortinet Secure SD-WAN Learning Path is designed to build both foundational knowledge and hands-on skills with Fortinet's SD-WAN solution, aimed at anyone with fundamental networking knowledge interested in exploring SD-WAN using a Fortinet Solution. It introduces learners to the key components required in deploying and managing an SD-WAN fabric. This path covers the basics of operating Fortinet's SD-WAN solution, including onboarding/provisioning new branches, SD-WAN Rules, configuration with variables and templates, and firmware upgrades.
Learning Path

Palo Alto NGFW Foundations Version 11 Lab

The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
1346 launches

What's new

How F5 Drives Citrix VDI Excellence in Application Delivery

This lab discusses the collaboration between F5 technologies and Citrix VDI to enhance security and performance in virtual desktop infrastructure. F5's security-first approach and performance optimization strengthen Citrix VDI environments, meeting the needs of remote workforces and setting new standards for secure and high-performance virtualized experiences. The hardware and software used in the lab include 5 Windows Servers (v2016) and 1 F5 BIG-IP APM (v17.1.0.1).
Advanced Configuration Lab
•49 launches

Zero Trust with F5 BIG-IP APM, SSLO & WAF

In this lab we will be addressing a specific set of BIG-IP (versatility) characteristics: authentication and orchestration. In doing so, we will also be showing you some powerful capabilities of BIG-IP APM and SSL Orchestrator.
Advanced Configuration Lab
•41 launches

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•161 launches

Elastic Endpoint Security Lab

Elastic Security provides a different approach to EDR by combing EDR and SIEM capabilities which leads to reduced mean time to detect and respond to threats. Elastic Security for endpoint prevents ransomware and malware, detects advanced threats and arms responders with vital investigative context, such as prioritized detections to help stop alert fatigue.
Sandbox Lab
•862 launches

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•230 launches

Partner POV | Bringing Predictive Security to the AWS Network Perimeter

Infoblox's integration with AWS Network Firewall introduces predictive, DNS-based threat intelligence, transforming cloud security from reactive to proactive. This collaboration empowers AWS users to block threats earlier, enhancing protection and reducing complexity. Experience a strategic shift in cybersecurity, leveraging Infoblox's intelligence to safeguard cloud environments efficiently and effectively.
Partner Contribution
•Nov 25, 2025

Partner POV | NETSCOUT Arbor Edge Defense: Protecting Firewall Capacity from DDoS and Other Threats

Arbor Edge Defense (AED) revolutionizes firewall DDoS protection by acting as a stateless shield, filtering malicious traffic before it reaches stateful devices. Beyond DDoS defense, AED enhances network security by blocking reconnaissance, brute-force attempts, and botnet traffic, optimizing firewall performance and reducing costly upgrades. Discover AED's transformative impact on network resilience.
Partner Contribution
•Nov 24, 2025

Partner POV | Unifying the SOC and the NOC for Stronger Cyber Resilience

Converging SOC and NOC operations enhances cybersecurity and network performance by eliminating silos, reducing breach costs, and improving response times. A unified platform fosters collaboration, providing comprehensive visibility and coordinated responses, ultimately strengthening organizational resilience against cyber threats and operational disruptions. Embrace this strategic shift for optimized digital asset protection.
Partner Contribution
•Nov 24, 2025
Fortinet Xperts 2025 Recap Header Image

Fortinet Xperts 2025

Fortinet XPERTS 2025 delivered the heat, despite the cold outside. Packed with cutting-edge innovation, expert insights and hands-on learning, this year's event proved once again that Fortinet knows how to bring the fire to cybersecurity.
Blog
•Nov 20, 2025

Service Chain Management Process With F5 SSLO

The intended goal of this lab is to enable security administrators to configure and test F5 SSL Orchestrator and showcase how to dynamically orchestrate security infrastructure.
Advanced Configuration Lab
•148 launches

Zero Trust Principles

Not just a single solution, a zero trust implementation is an integrated approach for continuous validation of authorized users across your entire organization. A zero trust security framework focuses on protecting critical assets through a layered, continuously monitored and adaptable architecture that minimizes risks and containment in case of breaches.
Blog
•Nov 18, 2025

SASE Architecture: Cisco Viptela SD-WAN With Zscaler (SSE) Lab

Secure Access Service Edge (SASE), coined by Gartner in 2019, is a solution that blends networking and security into cloud scale architecture that optimizes end user performance and improves security for an organization. With the Zscaler and SD-WAN integration, you can rapidly gain access to cloud-delivered security in minutes. This market leading API automation makes it very fast and agile to deploy and manage the network and security environment of hundreds or even thousands of remote sites.
Advanced Configuration Lab
•443 launches

Partner POV | Why Observability at the Edge Is Becoming a Boardroom Priority

In a digital era where edge environments are pivotal, remote site monitoring emerges as a strategic necessity. As organizations expand into decentralized infrastructures, ensuring robust visibility and performance at the edge becomes crucial. NETSCOUT's solutions offer real-time insights, safeguarding service quality and business resilience in an increasingly complex landscape.
Partner Contribution
•Nov 12, 2025

Palo Alto NGFW Incorporating User-ID into Security Rules Lab

This lab is a part of a larger collection of mini challenges designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's NGFW solution.
Advanced Configuration Lab
•20 launches

Zscaler - Zero Trust Branch (ZTB) and Airgap

Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path

Zscaler Data Protection (SASE/Endpoint)

The Secure Access Service Edge (SASE), introduced by Gartner in 2019, is a solution integrating networking and security within a cloud-scale architecture, enhancing end-user performance and bolstering security for organizations. Zscaler Internet Access (ZIA) serves as a cloud-delivered SASE service, functioning as a secure Internet and web gateway positioned between users and the Internet. Within ZIA, Zscaler's data protection capabilities offer numerous advantages. These include seamless scalability and global coverage, safeguarding remote workers and branch offices. Utilizing advanced threat intelligence and machine learning, it promptly identifies and addresses breaches. Granular policy controls ensure consistent enforcement of data usage policies, promoting regulatory compliance. Additionally, its integrated security stack simplifies management, enabling IT teams to concentrate on strategic priorities. In essence, ZIA empowers organizations with agile security measures to effectively mitigate risks.
Foundations Lab
•89 launches

Fortinet Secure SD-WAN

The Fortinet Secure SD-WAN Learning Path is designed to build both foundational knowledge and hands-on skills with Fortinet's SD-WAN solution, aimed at anyone with fundamental networking knowledge interested in exploring SD-WAN using a Fortinet Solution. It introduces learners to the key components required in deploying and managing an SD-WAN fabric. This path covers the basics of operating Fortinet's SD-WAN solution, including onboarding/provisioning new branches, SD-WAN Rules, configuration with variables and templates, and firmware upgrades.
Learning Path

Check Point and the Post-Quantum Transition

Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025

Cisco Hybrid Mesh Firewall Overview

Cisco's Hybrid Mesh Firewall solution is a highly distributed security fabric optimized to stop advanced threats, protect application vulnerabilities, and implement zero trust segmentation across environments.
Video
•1:58
•Oct 24, 2025

Check Point NGFW Foundations Lab

The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
•47 launches

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1160 Followers

At a glance

210Total
54Blogs
45Articles
45Labs
24Videos
11Events
10Case Studies
10Learning Paths
5Briefings
5Workshops
1WWT Research
What's related
  • Security
  • ATC
  • Cyber Range
  • Blog
  • Networking
  • Cloud
  • Cisco
  • Security Operations
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Endpoint Security
  • Cisco Security
  • Fortinet
  • Palo Alto Networks
  • Cisco Network Security
  • Zero Trust
  • SASE
  • AI Security
  • Application & API Security
  • Cisco Secure Firewall

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies