Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Infrastructure as a Strategic Target of War

As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
2676 launches

Palo Alto NGFW Foundations Version 11 Lab

The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
1461 launches

Fortinet NGFW Foundations Lab

The Fortinet Next Generation Firewall (NGFW) Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Fortinet NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
1830 launches

Palo Alto Networks Next-Generation Firewall (NGFW)

Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path

What's new

🔍 Haystack CTF: The Hunt for IOC's

Immerse yourself in the world of Intrusion Detection in our Cyber Range Blue Team Capture The Flag (CTF) game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss!
Cyber Range
•Feb 19, 2026 • 10am

Netskope Data Loss Prevention

Netskope's Data Loss Prevention solution is designed to be easy to use but also highly customizable. Gain deep visibility into data everywhere, automatically discovering sensitive data and preventing it from leaking. Netskope prevents data breaches and helps to ensure regulatory compliance. In this lab, not only will we be looking at Netskope DLP but also Web Content Filtering, Cloud App Control, Remote Browser Isolation, as well as Generative AI Blocking.
Foundations Lab
•140 launches

Partner POV | Inside Fortinet's Unified SASE Architecture

Introducing Fortinet Unified SASE, a global unified protection across your entire network with a single management console, agent and policies.
Video
•1:03
•Jan 27, 2026

Securing Your Cyber Vault: How Observability and NDR Turn Blind Spots into Confidence

Cyber vaults are your last line of defense against ransomware—but are they truly secure? Learn how WWT and ExtraHop RevealX deliver real-time visibility and assurance through Network Detection & Response (NDR), so you can recover with confidence when it matters most.
Blog
•Jan 26, 2026

A Quick look at QUIC

Learn about QUIC (Quick UDP Internet Connection), a modern transport protocol that enhances internet speed, security and reliability by building on UDP. It integrates TLS 1.3 for faster handshakes, employs BBR for smarter congestion control, and uses multiplexed streams to eliminate head-of-line blocking. Seamless connection migration ensures uninterrupted connectivity, making QUIC a promising successor to TCP.
Blog
•Jan 23, 2026

Cisco vFTD integration in ACI using PBR Service Graph redirection Lab

The goal of this lab is to show how policy-based redirection to a L4-7 device can be used with a single bridge domain needed for Application Centric (ACI) fabrics. The use of a single bridge domain and single PBR redirection is known as "one -armed mode."
Advanced Configuration Lab
•49 launches

Cisco Secure Firewall Sandbox 7.6

Cisco Secure Firewall/Firepower Management NGFW Sandbox lab is a capability of the Advanced Technology Center (ATC). This is designed to provide an environment to gain hands-on experience with the Cisco Secure Firewall version 7.6. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•59 launches

Cisco NGFW Foundation Lab

Cisco NGFW Foundation Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Cisco Secure Firewall solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•901 launches

Cisco Secure Firewall FTD

In this video Drew Kaiser (WWT Technical Solution Architect) and Nick Carrieri (Cisco SBG's Director of Product Management) take a look at Cisco Firewall Threat Defense and some of the new features available with the latest release.
Video
•9:32
•Jan 13, 2026

Cisco Secure Firewall Sandbox 10.0

Cisco Secure Firewall/Firepower Management NGFW Sandbox lab is a capability of the Advanced Technology Center (ATC). This is designed to provide an environment to gain hands-on experience with the Cisco Secure Firewall version 10.0. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Sandbox Lab
•8 launches

Segment Routing or SD-WAN? How About Both?

Want to hear more about how segment routing and SD-WAN can not only coexist but can can complement each other? WWT's Mike DiVincenzo and Ryan Makelky dispel the myths surrounding these two solutions. Check out the full episode by clicking here.
Video
•2:54
•Jan 7, 2026

Infrastructure as a Strategic Target of War

As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026

Partner POV | Keeping Hackers off Every Edge with Fortinet

In a rapidly evolving digital landscape, traditional firewalls falter against sophisticated cyber threats. Fortinet's AI-powered Next-Generation Firewalls (NGFWs) offer a unified security solution, integrating advanced threat detection and seamless scalability. This approach ensures robust protection, simplified management and enhanced performance across hybrid IT infrastructures, safeguarding data and applications everywhere.
Partner Contribution
•Dec 31, 2025
Woman on laptop investing in Fortinet Unified SASE

Partner POV | Why You Should Invest In Unified SASE Even If You Already Have Secure SD-WAN

Organizations are embracing unified SASE to enhance security and user experience for work-from-anywhere users. By integrating SD-WAN with cloud-delivered security, they achieve seamless connectivity, zero-trust access and simplified management. This transition addresses security challenges, optimizes performance and strengthens security posture, making it essential for modern hybrid workforces.
Partner Contribution
•Dec 31, 2025

Part 5 — From Flannel to Cilium: Why Isovalent Enterprise Becomes the Logical Next Step

Let's discuss the natural evolution from just getting things working to adding all the bells and whistles, a Flannel to Cilium discussion, powered by eBPF, as the logical next step for Kubernetes networking. Looking at how Isovalent Enterprise enhances scalability, security and observability, offering a robust, production-ready platform for complex, multi-cluster environments. Transitioning to Cilium signifies embracing advanced capabilities for modern network engineering.
Blog
•Dec 16, 2025

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•2676 launches

JuicedShop Security Lab Series: Injection Attacks

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•88 launches

How F5 Drives Citrix VDI Excellence in Application Delivery

This lab discusses the collaboration between F5 technologies and Citrix VDI to enhance security and performance in virtual desktop infrastructure. F5's security-first approach and performance optimization strengthen Citrix VDI environments, meeting the needs of remote workforces and setting new standards for secure and high-performance virtualized experiences. The hardware and software used in the lab include 5 Windows Servers (v2016) and 1 F5 BIG-IP APM (v17.1.0.1).
Advanced Configuration Lab
•50 launches

Zero Trust with F5 BIG-IP APM, SSLO & WAF

In this lab we will be addressing a specific set of BIG-IP (versatility) characteristics: authentication and orchestration. In doing so, we will also be showing you some powerful capabilities of BIG-IP APM and SSL Orchestrator.
Advanced Configuration Lab
•43 launches

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•165 launches

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1165 Followers

At a glance

182Total
58Blogs
44Labs
26Articles
21Videos
10Case Studies
9Learning Paths
8Events
4Workshops
2Briefings
What's related
  • Security
  • ATC
  • Cyber Range
  • Blog
  • Cloud
  • Security Operations
  • Networking
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Cisco
  • Endpoint Security
  • Cisco Security
  • Zero Trust
  • AI Security
  • Fortinet
  • Palo Alto Networks
  • Application & API Security
  • Cisco Network Security
  • Cisco Secure Firewall
  • Whole-of-state cybersecurity

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies