Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•1994 launches

Security Operations

This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series

🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa

This is a red team style capture the flag event that puts you and your team in the role of hackers trying to break into an emulated internal network. Assemble a team of 3 to 4 players ready to dig into vulnerabilities, decrypt systems, and disable key services before time runs out. This time, you'll have Willa on your side. Willa is a new AI teammate built to guide you through the game with real-time tips, helpful insights, and resource suggestions. She can even flag a live proctor if something needs attention. Whether you're stuck on a flag or just need a nudge, Willa has your back. Get ready to think like an attacker, act fast, and work as a team.
Cyber Range
Jul 17, 2025 • 9am

Fortinet NGFW Foundations Lab

The Fortinet Next Generation Firewall (NGFW) Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Fortinet NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
1516 launches

Palo Alto NGFW Foundations Version 11 Lab

The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
1076 launches

What's new

🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa

This is a red team style capture the flag event that puts you and your team in the role of hackers trying to break into an emulated internal network. Assemble a team of 3 to 4 players ready to dig into vulnerabilities, decrypt systems, and disable key services before time runs out. This time, you'll have Willa on your side. Willa is a new AI teammate built to guide you through the game with real-time tips, helpful insights, and resource suggestions. She can even flag a live proctor if something needs attention. Whether you're stuck on a flag or just need a nudge, Willa has your back. Get ready to think like an attacker, act fast, and work as a team.
Cyber Range
•Jul 17, 2025 • 9am

Partner POV | What Washington Didn't Say About Securing Global Networks .

TikTok's $600 million EU fine highlights global data privacy concerns, as nations grapple with securing digital spaces. The U.S. must modernize its cybersecurity strategy, balancing openness with protection against cyber threats. Embracing data sovereignty and innovative network solutions is crucial to safeguarding personal, corporate, and national interests in an interconnected world.
Partner Contribution
•Jun 30, 2025

ExtraHop RevealX: Cyber Risk Revealed

Investigate smarter, stop threats faster, move at the speed of risk. RevealX is an intelligent network data platform for securing and optimizing today's networks for tomorrow's challenges.
Video
•1:39
•Jun 23, 2025

Partner POV | Simplify SD-WAN Operations with Fortinet Secure SD-WAN, FortiManager and FortiAnalyzer

Fortinet Secure SD-WAN addresses today's WAN challenges, combining next-generation firewalls with integrated solutions for management and analytics to centralize and simplify SD-WAN operations
Partner Contribution
•Jun 19, 2025

Core Routing Security: MACsec

The use of MACsec within network cores is exploding in popularity due to rising security demands and recent hardware advancements. This article explores MACsec's evolution, benefits and deployment considerations to help get you on your way to securing your high-speed core links.
Blog
•Jun 17, 2025

ExtraHop Modern Network Detection & Response (NDR)

Unlock the full potential of your network with ExtraHop — the integrated platform that transforms raw network traffic into real-time intelligence.
Video
•0:30
•Jun 11, 2025

Core Routing Security: Protecting the Control Plane

Control plane protection is much more than just a checkbox; it's the best way to protect the brains of your core routers. In this article, you'll learn how to identify, classify and protect control plane traffic, leveraging built-in defenses and operational best practices to ensure core routing stability.
Blog
•May 30, 2025

Partner POV | Next-generation Network Access Control: Zero Trust Security Without the Complexity

In the last 12 months, most organizations have experienced 7 or 8 security breaches that resulted in data loss or downtime. This sobering statistic, recently published by Ponemon Institute in the report, The 2025 Global Study on Closing the IT Security Gap, sponsored by HPE, highlights how important it is for organizations to close cybersecurity gaps that can expose them to risk and leave them vulnerable to threats.
Partner Contribution
•May 14, 2025

Understanding Cisco ISE 3.x and the Benefits of Migrating from ISE 2.x to 3.x

Cisco Identity Services Engine (ISE) 3.x represents a significant upgrade over its predecessor, Cisco ISE 2.x, offering a host of new features, improved performance and enhanced security capabilities. This blog post delves into the key features of Cisco ISE 3.x and highlights the benefits of migrating from earlier versions, providing a thorough understanding of why this upgrade is essential for modern network environments.
Blog
•May 6, 2025

F5 Distributed Cloud (XC) Application Security with Terraform

In this lab, users will experience F5 Distributed Cloud Web App and API protection (WAAP), where organizations can simplify their path to effective security without sacrificing continued business innovation and customer demand. An API-driven approach to application protection enables improved collaboration between networks, security operations, and developers. This lab will use Terraform to deploy a Web App and API protection solution that protects an existing application
Advanced Configuration Lab
•26 launches

CrowdStrike Proving Ground Lab

WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
•1511 launches

SentinelOne Endpoint & AI SIEM Foundations Lab

Welcome to the SentinelOne Endpoint & AI SIEM Foundations lab provided by the WWT ATC! This lab provides you with a sample environment where you can gain hands-on experience with the SentinelOne solution.
Foundations Lab
•110 launches

Protecting Businesses from Ransomware

Ransomware is a critical issue affecting organization's internal security and data protection. It has become much more pronounced in recent years. WWT's Dominic Greco and Tim Schaap review the importance of Cyber Resiliency and Disaster Recovery toward protecting against Ransomware attacks.
Video
•7:21
•Apr 30, 2025

🔍 Haystack CTF: The Hunt for IOC's

Immerse yourself in the world of Intrusion Detection in our Cyber Range Blue Team Capture The Flag (CTF) game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss!
Cyber Range
•Apr 24, 2025 • 9am

Eliminate all those blind spots with NDR

In this first installment of a two-part series, we explore network detection and response (NDR), why it's essential and what to consider when choosing the correct tool.
Blog
•Apr 16, 2025

Five Considerations for Successful Identity and Access Management Architecture

Discover the five considerations needed to effectively incorporate Identity and Access Management (IAM) into your business.
Article
•Apr 14, 2025

Partner POV | Better Together: ExtraHop + Crowdstrike

CrowdStrike's integration with ExtraHop RevealX combines EDR and NDR for real-time traffic analysis, AI-driven insights, and automated threat response, enhancing security without disrupting operations.
Partner Contribution
•Mar 26, 2025

Guardicore Zero Trust

Learn about Akamai Guardicore Segmentation, a software-based microsegmentation solution that provides a simple, fast, and intuitive way to enforce Zero Trust principles. In this Learning Path, you will explore the architecture on which Akamai Guardicore Segmentation runs, as well as look into how Guardicore is able to visualize and organize an environment through the use of asset labels. You will also learn how Guardicore establishes micro-segmentation using these asset labels through the creation of both manual and wizard-based policy rules.
Learning Path

F5 rSeries: The Future of High-Performance Application Delivery

Explore rSeries key capabilities and learn how rSeries is the ideal solution for enterprises looking to modernize their application delivery infrastructure.
Blog
•Mar 25, 2025

Unlock Unmatched Performance and Agility with F5 VELOS

Explore F5 VELOS key capabilities and learn how VELOS is a solution if your enterprise is seeking unmatched speed, security, and scalability.
Blog
•Mar 25, 2025

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1154 Followers

At a glance

184Total
46Blogs
39Articles
35Labs
21Videos
12Events
10Case Studies
10Learning Paths
5Briefings
5Workshops
1WWT Research
What's related
  • Security
  • ATC
  • Cisco
  • Cyber Range
  • Networking
  • Blog
  • Cloud
  • Security Operations
  • Cloud Security
  • Cisco Security
  • Cybersecurity Risk & Strategy
  • Endpoint Security
  • Cisco Network Security
  • Palo Alto Networks
  • Fortinet
  • SASE
  • Cisco Secure Firewall
  • Zero Trust
  • F5
  • OT Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies