Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore

Select a tab

What's popular

Infrastructure as a Strategic Target of War

As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
2604 launches

Palo Alto Networks Next-Generation Firewall (NGFW)

Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path

CrowdStrike Proving Ground Lab

WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
1732 launches

Security Operations

This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series

What's new

Cisco NGFW Foundation Lab

Cisco NGFW Foundation Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Cisco Secure Firewall solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•898 launches

Infrastructure as a Strategic Target of War

As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•2604 launches

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•231 launches

Zscaler Data Protection (SASE/Endpoint)

The Secure Access Service Edge (SASE), introduced by Gartner in 2019, is a solution integrating networking and security within a cloud-scale architecture, enhancing end-user performance and bolstering security for organizations. Zscaler Internet Access (ZIA) serves as a cloud-delivered SASE service, functioning as a secure Internet and web gateway positioned between users and the Internet. Within ZIA, Zscaler's data protection capabilities offer numerous advantages. These include seamless scalability and global coverage, safeguarding remote workers and branch offices. Utilizing advanced threat intelligence and machine learning, it promptly identifies and addresses breaches. Granular policy controls ensure consistent enforcement of data usage policies, promoting regulatory compliance. Additionally, its integrated security stack simplifies management, enabling IT teams to concentrate on strategic priorities. In essence, ZIA empowers organizations with agile security measures to effectively mitigate risks.
Foundations Lab
•101 launches

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•275 launches

SentinelOne Endpoint & AI SIEM Foundations Lab

Welcome to the SentinelOne Endpoint & AI SIEM Foundations lab provided by the WWT ATC! This lab provides you with a sample environment where you can gain hands-on experience with the SentinelOne solution.
Foundations Lab
•228 launches

SentinelOne XDR

In this learning path you will gain a fundamental understanding of the SentinelOne XDR solution by exploring topics such as the architecture on which SentinelOne XDR is built and the configuration of agent policies. You will also learn about topics such as the endpoint response actions and XDR response actions that SentinelOne can leverage to stop a threat in its tracks.
Learning Path

Armis OT Security

Learn the basics of OT security, and how Armis aims to protect and manage OT devices across a network through complete asset visibility and control. Throughout this learning path, you will learn the basics of the Armis architecture, as well as explore the ways that Armis is able to provide complete asset visibility, track asset activity, and report on asset health. You will also explore some of the key security capabilities that the Armis platform provides by leveraging the Armis Knowledge Base and the Armis Vulnerability Management (AVM).
Learning Path

Tanium Proving Ground Lab

Tanium 7.6 Proving Ground Lab
Advanced Configuration Lab
•664 launches

Palo Alto Cortex XDR

Learn about Palo Alto Cortex XDR, Palo Alto's extended detection and response platform that natively integrates network, endpoint, cloud, and third-party data to stop modern attacks. In this Learning Path, you will explore the architecture on which Cortex XDR runs, as well as look into the deployment of Cortex XDR agents and the creation of profiles and policies. You will also learn about the detection and response capabilities that are provided by Cortex XDR.
Learning Path

Identity & Access Management with CyberArk

The CyberArk learning path provides a high-level overview of Identity & Access Management (IAM) and some of its features and capabilities. In addition, this learning path introduces CyberArk's Privileged Access Security (PAS) solution and provides a lab environment to gain hands-on experience with the solution.
Learning Path

CyberArk Privileged Account Management Lab

Explore the essential features of CyberArk Privileged Access Security (PAS) in this lab, showcasing its capabilities in managing and auditing privileged accounts across Windows and Linux environments. Discover how CyberArk PAS enhances security through automated password management and secure session monitoring.
Foundations Lab
•483 launches

CrowdStrike Proving Ground Lab

WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
•1732 launches

Getting Started With Rubrik

The Rubrik Data Protection Fundamentals Learning Path will introduce you to the basic features and functionality of Rubrik. Learn about Rubrik's next-generation data management solution that goes beyond traditional data backups.
Learning Path

Rubrik Data Protection

For those with a foundational understanding of Rubrik, this Learning Path will explore how Rubrik protects specific workloads such as Kubernetes, M365, and Microsoft Azure. This Learning Path also introduces Rubrik's Continuous Data Protection and details how Rubrik uses SLA Domains to simplify data protection.
Learning Path

Basics and Breakthroughs: How State and Local CISOs Can Walk the Line

State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Senior Consulting Security Architect, as they explore how CISOs can shine in a landscape characterized by basics and breakthroughs.  
Video
•1:21
•Mar 31, 2025

Top considerations for adopting a whole-of-state cybersecurity strategy

COMMENTARY | A chain is only as strong as its weakest link, so states must emphasize collaboration and resource sharing across their entire ecosystem to better protect themselves.
News
•Mar 5, 2025

Zscaler Zero Trust Lab

Zscaler is responsible for securing more than 400 of the Forbes Global 2000 companies. They provide security as a service delivered through a purpose-built, globally distributed platform. The focus of this lab is zero trust access utilizing a solution known as Zscaler Private Access (ZPA). ZPA is a cloud service that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications don't need to be exposed to the internet, making them completely invisible to unauthorized users. This service enables the applications to connect to users via inside-out connectivity versus extending the network to them. It disrupts legacy approaches to remote access such as traditional VPN, establishing per-service dynamic encryption and trust evaluation.
Foundations Lab
•1003 launches

Palo Alto Cortex XDR Proving Ground Lab

WWT's ATC Palo Alto Cortex XDR Proving Ground Lab provides a consolidated solution built around Cortex XDR, the Palo Alto firewall, Windows endpoints and Windows servers to demonstrate how the Cortex XDR Agent protects against threats. The goal of Cortex XDR is to increase the operational efficiency of the security operations center. Cortex XDR accomplishes this by reducing alerts by combining similar events, stitching together logs from different sources and preventing as many threats as possible early in the attack cycle. Cortex XDR goes beyond the traditional EDR approach of using only endpoint data to identify and respond to threats by applying machine learning across all your enterprise, network, cloud and endpoint data. This approach enables you to quickly find and stop targeted attacks, insider abuse and remediate compromised endpoints. Cortex XDR combines functionality from Endpoint Protection, Endpoint Detection and Response, Network Traffic Analysis and User Behavior Analytics into a single console. This lab consists of servers running common applications that include Palo Alto Cortex XDR, Palo Alto Cortex XSOAR, Palo Alto VM-Series firewall, Active Directory, Windows IIS and SQL server, and several Windows 10 workstations. You will access the environment using a Windows-based jump host from which you can browse web consoles and open RDP/SSH sessions.
Advanced Configuration Lab
•277 launches

Whole-of-state cybersecurity

Protect critical systems and citizen data across agencies, institutions and communities with a unified approach to cybersecurity.

1 Follower

At a glance

33Total
15Labs
15Learning Paths
2Blogs
1Video
What's related
  • Security
  • ATC
  • Cyber Range
  • Network Security
  • Security Operations
  • Endpoint Security
  • Cybersecurity Risk & Strategy
  • Okta
  • Palo Alto Networks
  • Cloud
  • Cloud Security
  • Identity and Access Management
  • Data Center
  • Data Protection & Cyber Recovery
  • Public Sector
  • Rubrik
  • Zscaler
  • Armis
  • Cisco
  • Cisco Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies