Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

13 results found

Microsoft Sentinel Fundamentals

The Microsoft Sentinel Fundamentals course provides a comprehensive overview of the Microsoft cloud-native SIEM and SOAR platform. It begins with an introduction to Sentinel's architecture, highlighting how it aggregates data across users, devices, and applications to provide a bird's-eye view of an organization's security posture. The curriculum then dives into Threat Intelligence, teaching students how to ingest and manage indicators of compromise (IOCs) from various feeds to proactively identify malicious activity. Central to the course is Analytics, where learners master the Kusto Query Language (KQL). Through KQL, you'll learn to write high-performance queries to filter massive datasets, build custom detection rules, and hunt for sophisticated threats.
Learning Path
•Fundamentals

Cyber Range Orientation

This Capture the Flag (CTF) Demo called "Initiation" is meant to introduce you to the WWT Cyber Range platform. Consider this the tutorial level for our CTF events. You will be introduced to the features and functionality of WWT Cyber Range CTFs as well as be provided with tips for success in future events.
Learning Path
•Fundamentals

Network Security

This learning path is designed to provide you with a comprehensive foundation in network security that will enable you to protect your organization's network infrastructure from a wide range of cyber threats. Whether you're an aspiring cybersecurity professional, IT professional, or simply interested in enhancing your knowledge of network security, this learning path will equip you with the foundational knowledge needed to secure your network effectively." See you inside!
Learning Path
•Fundamentals

SentinelOne XDR

In this learning path you will gain a fundamental understanding of the SentinelOne XDR solution by exploring topics such as the architecture on which SentinelOne XDR is built and the configuration of agent policies. You will also learn about topics such as the endpoint response actions and XDR response actions that SentinelOne can leverage to stop a threat in its tracks.
Learning Path
•Fundamentals

Network Analysis

In this learning path, you will familiarize yourself with key tools you may use during a Cyber Range Blue Team Event. This learning path will teach you the fundamentals of network analysis tools Wireshark and Nessus.
Learning Path
•Fundamentals

Introduction to IT/OT

Get an introduction to operational technology and the various components and systems, including the Internet of Things (IoT).
Learning Path
•Fundamentals

Security Testing Suite

This is a mini Lab that will walk users through web application security tools that they may use during a Cyber Range red team event. This learning path will teach you the fundamentals of comprehensive penetration testing tools such as Burp Suite, MSFConsole, BloodHound, and Impacket.
Learning Path
•Fundamentals

Password Cracking

This is a mini Lab that will walk users through password-cracking tools that they may use during a Cyber Range red team event. This learning path will teach you the fundamentals of cracking and brute-forcing passwords with John the Ripper, Hydra, and Mimikatz.
Learning Path
•Fundamentals

Threat Hunting

In this learning path, you will familiarize yourself with key tools you may use during a Cyber Range Blue Team Event. This learning path is designed to equip you with the essential knowledge, skills, and strategies needed to actively seek out potential dangers and search for hidden threats and malicious activities within an organization's network.
Learning Path
•Fundamentals

Network Reconnaissance

This is a mini Lab that will walk users through network reconnaissance tools that they may use during a Cyber Range red team event. This learning path will teach you the fundamentals of network reconnaissance with Nmap and DirBuster.
Learning Path
•Fundamentals

Web Application Security

This is a mini Lab that will walk users through web application security tools that they may use during a Cyber Range red team event. This learning path will teach you the fundamentals of web application security, such as Burp Suite.
Learning Path
•Fundamentals

Introduction to Torq Hyperautomation and HyperSoC

Introduces the concept related to the Torq HyperAutomation platform include use cases for step runners, and Artificial Intelligent agents (HyperAgents).
Learning Path
•Introductory

Security Operations

Security operations purpose is to monitor, prevent, detect, investigate, and respond to digital and human threats to enterprise assets. Such assets are intellectual property, personnel data, customer data, business and IT systems.

797 Followers

At a glance

202Total
74Blogs
53Articles
18Labs
16Videos
13Learning Paths
9Case Studies
9Events
4WWT Research
3Briefings
2Workshops
1Community
What's related
  • Security
  • Blog
  • Cybersecurity Risk & Strategy
  • AI Security
  • ATC
  • Network Security
  • Endpoint Security
  • Cloud
  • Cloud Security
  • Cyber Range
  • CrowdStrike
  • Cyber Resilience
  • OT Security
  • Palo Alto Networks
  • What we do
  • AI & Data
  • Data Security
  • Fortinet
  • Networking
  • Whole-of-state cybersecurity

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies