Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

ATC+

Palo Alto Networks Next-Generation Firewall (NGFW) Intermediate

Once you've mastered the basics of Palo Alto's NGFW with the fundamentals Learning Path, it's time to continue your education with the intermediate LP. This Learning Path will teach you topics that help get further use out of your NGFW such as SSL Decryption. Once you've configured SSL Decryption, the NGFW will be able to defend your network in new ways, including URL Filtering, Credential Detection, DGA Detection, DNS Sinkholes, and more!
Learning Path
•Intermediate

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•Fundamentals
3029 launches

Palo Alto NGFW Foundations Version 11 Lab

The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•Fundamentals
1770 launches

Fortinet NGFW Foundations Lab

The Fortinet Next Generation Firewall (NGFW) Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Fortinet NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•Fundamentals
2009 launches

Cisco Secure Access

The Cisco Secure Access lab is your chance to get your hands on Cisco's SSE solution. During this lab, you will look at data loss prevention, unified policy, zero trust, and the benefits of quick udp internet connection. Get started today!
Guided Demonstration Lab
•Fundamentals
260 launches

What's new

Securing DNS in Hybrid and Multicloud Environments

Navigating DNS security in hybrid and multicloud environments poses challenges, such as fragmentation, logging gaps, and service availability risks. As cloud resources evolve, visibility and AI-powered detection become crucial for countering threats such as DNS tunneling and hijacking. Strategic integration of DDI platforms and cloud-native tools is essential for robust security.
Blog
•May 1, 2026

Partner POV | What Is Lateral Movement in Cybersecurity?

Lateral movement in cybersecurity allows attackers to stealthily navigate networks post-breach, escalating privileges and accessing sensitive data. This technique transforms minor breaches into major threats. Understanding and preventing lateral movement through deep network visibility, Zero Trust, and least privilege access is crucial for safeguarding organizational assets.
Partner Contribution
•Apr 21, 2026

Partner POV | Network-Derived Telemetry Deemed 'Essential.' Who Knew?

Gartner's new reference architecture elevates network-level telemetry to a strategic necessity, emphasizing its role in enhancing service-level observability and security. By integrating network-derived insights, organizations can make faster decisions, reduce risks, and ensure resilient digital services, transforming telemetry from an afterthought to a foundational architectural element.
Partner Contribution
•Apr 20, 2026

Why DNS Security in a DDI Solution Wins

DNS is the most queried protocol in any enterprise — and the most exploited. A DDI solution with native DNS security and Threat Intelligence does not simply detect threats at the perimeter; it identifies, correlates, and blocks malicious activity before a single byte reaches an endpoint. Infoblox BloxOne Threat Defense, powered by real-time TIDE and Dossier intelligence, delivers exactly that — at scale, across hybrid and multicloud environments.
Blog
•Apr 16, 2026

Partner POV | Key Findings: 2026 ThreatLabz VPN Risk Report

The Zscaler ThreatLabz 2026 VPN Risk Report highlights a critical mismatch: while AI has accelerated the speed of cyberattacks, traditional VPN visibility and patch cycles remain dangerously slow. "Good enough" security is no longer sufficient when adversaries scale at machine speed.
Partner Contribution
•Apr 13, 2026
ATC+

Palo Alto Networks Next-Generation Firewall (NGFW) Intermediate

Once you've mastered the basics of Palo Alto's NGFW with the fundamentals Learning Path, it's time to continue your education with the intermediate LP. This Learning Path will teach you topics that help get further use out of your NGFW such as SSL Decryption. Once you've configured SSL Decryption, the NGFW will be able to defend your network in new ways, including URL Filtering, Credential Detection, DGA Detection, DNS Sinkholes, and more!
Learning Path
•Intermediate

DDI is Everyone's Problem. Not Just the Network Teams.

DNS, DHCP and IP address management are collectively known as DDI. Learn why security, cloud, application and DevOps teams all have skin in the DDI game and what happens when they're left out of the conversation.
Blog
•Apr 9, 2026

Securing the Unsecurable: How Zscaler Airgap Protects Devices That Can't Protect Themselves

Billions of IoT and OT devices can't run security software, making them prime targets and easy entry points for attackers. This blog explores how Zscaler Airgap delivers agentless, zero trust segmentation to protect every device on your network, regardless of its capabilities.
Blog
•Apr 8, 2026
ATC+

Palo Alto Cortex XDR Proving Ground Lab

WWT's ATC Palo Alto Cortex XDR Proving Ground Lab provides a consolidated solution built around Cortex XDR, the Palo Alto firewall, Windows endpoints and Windows servers to demonstrate how the Cortex XDR Agent protects against threats. The goal of Cortex XDR is to increase the operational efficiency of the security operations center. Cortex XDR accomplishes this by reducing alerts by combining similar events, stitching together logs from different sources and preventing as many threats as possible early in the attack cycle. Cortex XDR goes beyond the traditional EDR approach of using only endpoint data to identify and respond to threats by applying machine learning across all your enterprise, network, cloud and endpoint data. This approach enables you to quickly find and stop targeted attacks, insider abuse and remediate compromised endpoints. Cortex XDR combines functionality from Endpoint Protection, Endpoint Detection and Response, Network Traffic Analysis and User Behavior Analytics into a single console. This lab consists of servers running common applications that include Palo Alto Cortex XDR, Palo Alto Cortex XSOAR, Palo Alto VM-Series firewall, Active Directory, Windows IIS and SQL server, and several Windows 11 workstations. You will access the environment using a Windows-based jump host from which you can browse web consoles and open RDP/SSH sessions.
Advanced Configuration Lab
•Advanced
•325 launches

SSE and SASE Market Scan Workshop

Selecting the right Secure Access Service Edge (SASE) or Security Services Edge (SSE) solution is complex. With a crowded vendor landscape and evolving business requirements, making a confident, informed decision can feel overwhelming. WWT's Market Scan approach cuts through the noise, delivering objective, research-backed insights that align technology to your business priorities and accelerate your path to the right solution.
Workshop

Welcome To The League CTF

How to Begin (DAY OF CTF): 1. Watch the introduction video from Mal by clicking "Launch Event". 2. Click "Launch Gamespace" to launch the CTF and access your Player Desktop. 3. Double-click the "README.txt" file on your Player Desktop for further instructions. Step into the world of advanced cybersecurity in our Cyber Range CTF game, "Welcome to the League". This event is tailored for individuals ready to push their red skills to the limit. Participants will engage in a series of sophisticated challenges designed to test their abilities in Active Directory enumeration, privilege escalation, and post-exploitation techniques. Do you have what it takes to join The League? This game takes around 8 hours to complete and will be accessible for a full 24-hour period, allowing players to log in and progress at their own pace. With state-saving functionality, participants can pause and resume their gameplay without losing progress, ensuring a flexible and engaging experience.
Cyber Range
•Mar 18, 2026 • 9am

Check Point Technologies, Architecture, & Deployment Models

This learning path delivers a structured exploration of Check Point's security design principles and platform deployment models across enterprise network environments. Through guided articles, videos, & a hands-on-lab, participants will develop meaningful insightst around platform selection, deployment placement, and policy design for the data center, Internet edge, campus, and branch.
Learning Path
•Intermediate

Palo Alto NGFW Crafting Basic Security Policies Lab

This lab is a part of a larger collection of mini challenges designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's NGFW solution.
Challenge Lab
•Fundamentals
•160 launches

Checkpoint SD-WAN Lab

The Check Point SD-WAN lab is a hands-on environment designed to teach how Quantum SD-WAN is configiured over an existing environment that deploys Check Point security gateways . You will explore a distributed topology that includes branch sites with multiple ISP connections, centralized management, and simulated internet and MPLS transport, then configure SD-WAN objects tunnels & monitor various parameters. The lab also emphasizes operational workflows, including policy deployment, validation, & monitoring.
Advanced Configuration Lab
•Intermediate
•13 launches
ATC+

Armis: To Catch a Hacker

The Armis to catch a hacker lab will walk users through a realistic exercise based upon real-life incidents with with sophisticated Advanced Persistent Threat (APTs) Actors. These threat actors will move laterally across the network and exploit common visibility gaps to reach their target objectives. This lab will show users how Armis can be leveraged to see this movement.
Advanced Configuration Lab
•Intermediate
•333 launches

Palo Alto NGFW Foundations Version 10 Lab

Palo Alto v10 is end of life. Please take a look at the Palo Alto v11 Foundations Lab. The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•Fundamentals
•2283 launches

Palo Alto NGFW Foundations Version 11 Lab

The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•Fundamentals
•1770 launches
ATC+

Palo Alto NGFW Intermediate Version 10 Lab

Palo Alto v10 is end of life. Please take a look at the Palo Alto v11 Foundations Lab. The Palo Alto NGFW Intermediate Lab is a hand-on virtual environment where you'll be able to complete the exercises you see in the Intermediate learning path as well as several new practicals. The Intermediate lab focuses on tasks like SSL Decryption, URL Filtering, and DNS Tunneling. Just like the Foundations lab, the Intermediate lab is built upon the same infrastructure. While there is a guide that you can follow along with, you can also explore the environment and test any configuration you'd like.
Advanced Configuration Lab
•Intermediate
•524 launches

Cyber Range - CH3M1C41_SP1LL

CH3M1C41_SP1LL (Chemical Spill) is a Red-Team Capture the Flag (CTF) game where you will be the attacker within an Operational Technology (OT) network. You will need to use diverse red-team skills such as network discovery, web application attacks, and password cracking and combine them with OT knowledge to shut down the production of a chemical.
Advanced Configuration Lab
•Advanced
•468 launches

JuicedShop Security Lab Series: Identification and Authentication Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•27 launches

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1166 Followers

At a glance

188Total
65Blogs
45Labs
28Articles
19Videos
10Case Studies
10Learning Paths
6Events
4Workshops
1Briefing
What's related
  • Security
  • ATC
  • Blog
  • Cyber Range
  • Cloud
  • Networking
  • Security Operations
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Cisco
  • Endpoint Security
  • Fortinet
  • AI Security
  • Cisco Security
  • Zero Trust
  • Application & API Security
  • Palo Alto Networks
  • Cisco Secure Firewall
  • Whole-of-state cybersecurity
  • Cisco Network Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies