Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore

Select a tab

What's popular

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•2585 launches

Security Operations

This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series

Palo Alto Networks Next-Generation Firewall (NGFW)

Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path

AI Security

In this learning path you will gain a fundamental understanding of AI security by exploring topics such as the AI development lifecycle, data flow during this lifecycle, as well as attack surfaces present in the AI development lifecycle. You will also learn about topics such as the attacks that AI models face and the risks of user data and privacy when it comes to AI.
Learning Path

Palo Alto Networks Next-Generation Firewall (NGFW) Intermediate

Once you've mastered the basics of Palo Alto's NGFW with the fundamentals Learning Path, it's time to continue your education with the intermediate LP. This Learning Path will teach you topics that help get further use out of your NGFW such as SSL Decryption. Once you've configured SSL Decryption, the NGFW will be able to defend your network in new ways, including URL Filtering, Credential Detection, DGA Detection, DNS Sinkholes, and more!
Learning Path

What's new

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•2585 launches

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•230 launches

Zscaler Data Protection (SASE/Endpoint)

The Secure Access Service Edge (SASE), introduced by Gartner in 2019, is a solution integrating networking and security within a cloud-scale architecture, enhancing end-user performance and bolstering security for organizations. Zscaler Internet Access (ZIA) serves as a cloud-delivered SASE service, functioning as a secure Internet and web gateway positioned between users and the Internet. Within ZIA, Zscaler's data protection capabilities offer numerous advantages. These include seamless scalability and global coverage, safeguarding remote workers and branch offices. Utilizing advanced threat intelligence and machine learning, it promptly identifies and addresses breaches. Granular policy controls ensure consistent enforcement of data usage policies, promoting regulatory compliance. Additionally, its integrated security stack simplifies management, enabling IT teams to concentrate on strategic priorities. In essence, ZIA empowers organizations with agile security measures to effectively mitigate risks.
Foundations Lab
•96 launches

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•275 launches

SentinelOne Endpoint & AI SIEM Foundations Lab

Welcome to the SentinelOne Endpoint & AI SIEM Foundations lab provided by the WWT ATC! This lab provides you with a sample environment where you can gain hands-on experience with the SentinelOne solution.
Foundations Lab
•226 launches

SentinelOne XDR

In this learning path you will gain a fundamental understanding of the SentinelOne XDR solution by exploring topics such as the architecture on which SentinelOne XDR is built and the configuration of agent policies. You will also learn about topics such as the endpoint response actions and XDR response actions that SentinelOne can leverage to stop a threat in its tracks.
Learning Path

Armis OT Security

Learn the basics of OT security, and how Armis aims to protect and manage OT devices across a network through complete asset visibility and control. Throughout this learning path, you will learn the basics of the Armis architecture, as well as explore the ways that Armis is able to provide complete asset visibility, track asset activity, and report on asset health. You will also explore some of the key security capabilities that the Armis platform provides by leveraging the Armis Knowledge Base and the Armis Vulnerability Management (AVM).
Learning Path

Tanium Proving Ground Lab

Tanium 7.6 Proving Ground Lab
Advanced Configuration Lab
•655 launches

Palo Alto Cortex XDR

Learn about Palo Alto Cortex XDR, Palo Alto's extended detection and response platform that natively integrates network, endpoint, cloud, and third-party data to stop modern attacks. In this Learning Path, you will explore the architecture on which Cortex XDR runs, as well as look into the deployment of Cortex XDR agents and the creation of profiles and policies. You will also learn about the detection and response capabilities that are provided by Cortex XDR.
Learning Path

Identity & Access Management with CyberArk

The CyberArk learning path provides a high-level overview of Identity & Access Management (IAM) and some of its features and capabilities. In addition, this learning path introduces CyberArk's Privileged Access Security (PAS) solution and provides a lab environment to gain hands-on experience with the solution.
Learning Path

CyberArk Privileged Account Management Lab

Explore the essential features of CyberArk Privileged Access Security (PAS) in this lab, showcasing its capabilities in managing and auditing privileged accounts across Windows and Linux environments. Discover how CyberArk PAS enhances security through automated password management and secure session monitoring.
Foundations Lab
•480 launches

CrowdStrike Proving Ground Lab

WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
•1727 launches

Getting Started With Rubrik

The Rubrik Data Protection Fundamentals Learning Path will introduce you to the basic features and functionality of Rubrik. Learn about Rubrik's next-generation data management solution that goes beyond traditional data backups.
Learning Path

Rubrik Data Protection

For those with a foundational understanding of Rubrik, this Learning Path will explore how Rubrik protects specific workloads such as Kubernetes, M365, and Microsoft Azure. This Learning Path also introduces Rubrik's Continuous Data Protection and details how Rubrik uses SLA Domains to simplify data protection.
Learning Path

Basics and Breakthroughs: How State and Local CISOs Can Walk the Line

State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Senior Consulting Security Architect, as they explore how CISOs can shine in a landscape characterized by basics and breakthroughs.  
Video
•1:21
•Mar 31, 2025

Top considerations for adopting a whole-of-state cybersecurity strategy

COMMENTARY | A chain is only as strong as its weakest link, so states must emphasize collaboration and resource sharing across their entire ecosystem to better protect themselves.
News
•Mar 5, 2025

Zscaler Zero Trust Lab

Zscaler is responsible for securing more than 400 of the Forbes Global 2000 companies. They provide security as a service delivered through a purpose-built, globally distributed platform. The focus of this lab is zero trust access utilizing a solution known as Zscaler Private Access (ZPA). ZPA is a cloud service that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications don't need to be exposed to the internet, making them completely invisible to unauthorized users. This service enables the applications to connect to users via inside-out connectivity versus extending the network to them. It disrupts legacy approaches to remote access such as traditional VPN, establishing per-service dynamic encryption and trust evaluation.
Foundations Lab
•1002 launches

Palo Alto Cortex XDR Proving Ground Lab

WWT's ATC Palo Alto Cortex XDR Proving Ground Lab provides a consolidated solution built around Cortex XDR, the Palo Alto firewall, Windows endpoints and Windows servers to demonstrate how the Cortex XDR Agent protects against threats. The goal of Cortex XDR is to increase the operational efficiency of the security operations center. Cortex XDR accomplishes this by reducing alerts by combining similar events, stitching together logs from different sources and preventing as many threats as possible early in the attack cycle. Cortex XDR goes beyond the traditional EDR approach of using only endpoint data to identify and respond to threats by applying machine learning across all your enterprise, network, cloud and endpoint data. This approach enables you to quickly find and stop targeted attacks, insider abuse and remediate compromised endpoints. Cortex XDR combines functionality from Endpoint Protection, Endpoint Detection and Response, Network Traffic Analysis and User Behavior Analytics into a single console. This lab consists of servers running common applications that include Palo Alto Cortex XDR, Palo Alto Cortex XSOAR, Palo Alto VM-Series firewall, Active Directory, Windows IIS and SQL server, and several Windows 10 workstations. You will access the environment using a Windows-based jump host from which you can browse web consoles and open RDP/SSH sessions.
Advanced Configuration Lab
•272 launches

Cisco XDR Foundations

Cisco XDR lab to facilitate understanding around foundational XDR use for threat hunting, and providing know-how on deployment, and integration.
Foundations Lab
•293 launches

Cisco XDR Learning Path

Explore Cisco's XDR allowing it's users to correlate data across several vendors and vectors providing a wholistic view of ones environment. Throughout this learning path and corresponding lab you will learn the fundamentals of the Cisco XDR components and tools that allow SOC analysts visibility and context into advanced threats! We will take you through an introduction and operation of the XDR console as well as automation. Let's get started!
Learning Path

Whole-of-state cybersecurity

Protect critical systems and citizen data across agencies, institutions and communities with a unified approach to cybersecurity.

1 Follower

At a glance

33Total
16Labs
15Learning Paths
1Blog
1Video
What's related
  • Security
  • ATC
  • Cyber Range
  • Network Security
  • Security Operations
  • Endpoint Security
  • Cloud
  • Cloud Security
  • Okta
  • Palo Alto Networks
  • Cybersecurity Risk & Strategy
  • Data Center
  • Data Protection & Cyber Recovery
  • Identity and Access Management
  • Rubrik
  • Zscaler
  • Armis
  • Cisco
  • Cisco Security
  • CrowdStrike

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies