Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Security Operations

This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
2291 launches

Fortinet NGFW Foundations Lab

The Fortinet Next Generation Firewall (NGFW) Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Fortinet NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
1676 launches

Palo Alto NGFW Foundations Version 11 Lab

The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
1258 launches

Palo Alto Networks Next-Generation Firewall (NGFW) Intermediate

Once you've mastered the basics of Palo Alto's NGFW with the fundamentals Learning Path, it's time to continue your education with the intermediate LP. This Learning Path will teach you topics that help get further use out of your NGFW such as SSL Decryption. Once you've configured SSL Decryption, the NGFW will be able to defend your network in new ways, including URL Filtering, Credential Detection, DGA Detection, DNS Sinkholes, and more!
Learning Path

What's new

🚩Disarm Me CTF: Hack, Decrypt, Disable

This red team–style CTF puts your team in the role of attackers breaking into an emulated internal network. You'll play as contracted gray-hat operatives (SAVE) infiltrating The League — a shadowy collective behind ransomware and extortion campaigns — to recover intelligence and disrupt their plans. Why it matters: this immersive, hands-on scenario trains teams in offensive techniques and attacker thinking so they can better anticipate and mitigate threats in their own environments. All activity runs in a safe, non-production setting and yields actionable insights. What you'll practice: 🔍 Attacker tradecraft — reconnaissance, exploitation, persistence. 🧠 Adversary tool fluency — exposure to real-world tools and methods. 🤝 Critical thinking & communication — operate as a focused squad under timed pressure. 🗂️ Side quests & extra intelligence — optional objectives that surface richer findings for your organization.
Cyber Range
•Nov 6, 2025 • 9am

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
•Oct 21, 2025

Zscaler - Zero Trust Branch (ZTB) and Airgap

Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path

Unlocking Zero Trust: The Role of OAuth in Security Architecture

In today's cloud-centric, BYOD-driven and distributed microservices landscape, traditional security measures such as VPNs and perimeter defenses struggle to keep pace with the increasing need for enterprise security. Implicitly trusting entities within a network poses significant risks, necessitating a paradigm shift. Enter Zero Trust—an approach that requires independent security for every enterprise asset and authenticates and authorizes user and process identities at every level. This lab explores the critical role of OAuth in enabling a Zero Trust architecture and allows lab users to implement & test the OAuth Solution.
Advanced Configuration Lab
•52 launches
NAT

Complete guide to Check Point Network Address Translation

A comprehensive guide to Check Point Network Address Translation (NAT), covering concepts, configuration, automatic and manual NAT, static and hide NAT, ARP, NAT tables, and best practices. Designed as a definitive learning resource with practical examples, troubleshooting tips, and advanced scenarios for real-world deployments.
Blog
•Oct 9, 2025

Partner POV | Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•266 launches

Fortinet Hardware Refresh: Advice from Security Experts

As the digital landscape evolves, maintaining secure, high-performance infrastructure is critical. Fortinet's upcoming End of Support (EOS) dates for numerous models mark a pivotal moment for IT leaders.
Video
•3:55
•Sep 30, 2025

Partner POV | Trellix NDR: Unleashing the Power of Trellix Wise AI for Unmatched Network Security

Trellix NDR with Trellix Wise revolutionizes network security by integrating on-device large language models and AI agents for enhanced threat detection and response. This innovative approach ensures real-time analysis, reduces false positives, and automates tasks, empowering security teams with actionable intelligence and robust defense against evolving cyber threats.
Partner Contribution
•Sep 16, 2025

SentinelOne Endpoint & AI SIEM Foundations Lab

Welcome to the SentinelOne Endpoint & AI SIEM Foundations lab provided by the WWT ATC! This lab provides you with a sample environment where you can gain hands-on experience with the SentinelOne solution.
Foundations Lab
•186 launches

SentinelOne XDR

In this learning path you will gain a fundamental understanding of the SentinelOne XDR solution by exploring topics such as the architecture on which SentinelOne XDR is built and the configuration of agent policies. You will also learn about topics such as the endpoint response actions and XDR response actions that SentinelOne can leverage to stop a threat in its tracks.
Learning Path

Core Routing Security: Hardening the Routing Protocols

Hardening your core routing protocols, such as ISIS, OSPF and BGP, is one of the simplest and cheapest ways to immediately improve your security posture. This post explores practical steps to secure routing adjacencies, filter route updates and reduce overall exposure in the control plane of your core network.
Blog
•Sep 4, 2025
Wired and Wireless network and overlay design systems

Enhancing K-12 Network Security Through Segmentation and Modern Infrastructure

K-12 and library network and wireless systems need enhanced segmentation through modern infrastructure today more than ever! In my post, I provide some clear reasons and guidance on enhancing these critical infrastructure components. I explain why it is important to implement new modern infrastructure underlay and overlay systems and what they can do to help enhance the security of staff, students and xIOT components on the supported network systems.
Blog
•Sep 1, 2025

Akamai Guardicore Centra Foundations Lab

The Akamai Guardicore Centra Foundations Lab aims to give people a hands-on experience with the central segmentation solution through a variety of use cases.
Foundations Lab
•175 launches

Zscaler Data Protection (SASE/Endpoint)

The Secure Access Service Edge (SASE), introduced by Gartner in 2019, is a solution integrating networking and security within a cloud-scale architecture, enhancing end-user performance and bolstering security for organizations. Zscaler Internet Access (ZIA) serves as a cloud-delivered SASE service, functioning as a secure Internet and web gateway positioned between users and the Internet. Within ZIA, Zscaler's data protection capabilities offer numerous advantages. These include seamless scalability and global coverage, safeguarding remote workers and branch offices. Utilizing advanced threat intelligence and machine learning, it promptly identifies and addresses breaches. Granular policy controls ensure consistent enforcement of data usage policies, promoting regulatory compliance. Additionally, its integrated security stack simplifies management, enabling IT teams to concentrate on strategic priorities. In essence, ZIA empowers organizations with agile security measures to effectively mitigate risks.
Foundations Lab
•79 launches

Partner POV | Fortinet and CrowdStrike Joint Solution

Delivering AI-powered protection, adaptive zero-trust access, and accelerated threat detection and response across your entire digital infrastructure
Partner Contribution
•Aug 25, 2025

Secure Cloud: Complete - Uncover Risks in the Cloud

Secure Cloud: Complete offers a 21-day analysis of your cloud environment, enhancing visibility and security through integrated tools like Wiz, Cyera and Illumio. This unified accelerator identifies risks, maps data and visualizes traffic, empowering organizations to refine cloud strategies and accelerate digital initiatives without disrupting existing operations.
Blog
•Aug 21, 2025

Good for business: How Fortinet SD-WAN hits the mark for today's converged world

In this first installment of our Fortinet Secure SD-WAN series, we discuss how it transforms networking by aligning technology with business goals, enhancing performance, reducing costs and ensuring security.
Blog
•Aug 12, 2025

Getting Started with NGINX One

Explore NGINX One, an all-in-one platform that integrates the best of NGINX's offerings into a unified package that includes a cloud-based dashboard and access to F5 Distributed Cloud. Customers get advanced load balancing, web and application server capabilities, API gateway functionalities, and security features. The goal of NGINX One is to provide unparalleled performance, security, and scalability for modern applications, whether they are deployed in the cloud, on-premises, or in hybrid environments.
Foundations Lab
•20 launches

JuicedShop Security Lab Series: Software and Data Integrity Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•15 launches

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1158 Followers

At a glance

195Total
51Blogs
41Articles
37Labs
23Videos
12Events
10Case Studies
10Learning Paths
5Briefings
5Workshops
1WWT Research
What's related
  • Security
  • ATC
  • Cyber Range
  • Blog
  • Cloud
  • Networking
  • Cisco
  • Security Operations
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Endpoint Security
  • Cisco Security
  • Fortinet
  • Palo Alto Networks
  • Cisco Network Security
  • SASE
  • Zero Trust
  • Application & API Security
  • AI Security
  • Software Defined WAN (SD-WAN)

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies