Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore

Select a tab

What's popular

Infrastructure as a Strategic Target of War

As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
2804 launches

Palo Alto Networks Next-Generation Firewall (NGFW)

Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path

Security Operations

This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series

CrowdStrike Proving Ground Lab

WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
1759 launches

What's new

Zscaler Zero Trust Lab

Zscaler is responsible for securing more than 400 of the Forbes Global 2000 companies. They provide security as a service delivered through a purpose-built, globally distributed platform. The focus of this lab is zero trust access utilizing a solution known as Zscaler Private Access (ZPA). ZPA is a cloud service that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications don't need to be exposed to the internet, making them completely invisible to unauthorized users. This service enables the applications to connect to users via inside-out connectivity versus extending the network to them. It disrupts legacy approaches to remote access such as traditional VPN, establishing per-service dynamic encryption and trust evaluation.
Foundations Lab
•1025 launches

Cisco XDR Foundations

Cisco XDR lab to facilitate understanding around foundational XDR use for threat hunting, and providing know-how on deployment, and integration.
Foundations Lab
•300 launches

Zscaler Internet Access: Secure Branch SSE (SASE Lab Series)

Secure Access Service Edge (SASE), coined by Gartner in 2019, is a solution that blends networking and security into cloud-scale architecture that optimizes end user performance and improves security for an organization. Zscaler Internet Access (ZIA) is a secure Internet and web gateway cloud-delivered SASE service that sits between the users and the internet. ZIA will inspect every byte of traffic inline across multiple security techniques providing full protection from web and internet threats. The SASE Lab Series will look to explore the capabilities of the solution to provide you with a "rubber meets road" understanding of these technologies and how SASE can be applied in your company.
Foundations Lab
•679 launches

SASE - Zscaler Internet Access (ZIA)

Zscaler ZIA, or Zscaler Internet Access, is a cloud-based security solution that provides secure access to the internet for users and devices within an organization. It offers a comprehensive set of security features that protect against a wide range of threats, including malware, phishing and other cyber attacks. In this learning path, we will explore the Zscaler ZIA architecture as well as the configuration and validation of the many security components that ZIA provides. You will also learn about many administration options of the platform like Authentication, Analytics, Logging capabilities, Traffic forwarding options and many more.
Learning Path

Palo Alto Cortex XDR Proving Ground Lab

WWT's ATC Palo Alto Cortex XDR Proving Ground Lab provides a consolidated solution built around Cortex XDR, the Palo Alto firewall, Windows endpoints and Windows servers to demonstrate how the Cortex XDR Agent protects against threats. The goal of Cortex XDR is to increase the operational efficiency of the security operations center. Cortex XDR accomplishes this by reducing alerts by combining similar events, stitching together logs from different sources and preventing as many threats as possible early in the attack cycle. Cortex XDR goes beyond the traditional EDR approach of using only endpoint data to identify and respond to threats by applying machine learning across all your enterprise, network, cloud and endpoint data. This approach enables you to quickly find and stop targeted attacks, insider abuse and remediate compromised endpoints. Cortex XDR combines functionality from Endpoint Protection, Endpoint Detection and Response, Network Traffic Analysis and User Behavior Analytics into a single console. This lab consists of servers running common applications that include Palo Alto Cortex XDR, Palo Alto Cortex XSOAR, Palo Alto VM-Series firewall, Active Directory, Windows IIS and SQL server, and several Windows 10 workstations. You will access the environment using a Windows-based jump host from which you can browse web consoles and open RDP/SSH sessions.
Advanced Configuration Lab
•281 launches

AI, Critical Infrastructure, and Cascading Failures with Madison Horn

Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week the leading voices in cybersecurity bring to light what steps public and private organizations need to be taking to keep our country secure.
News
•Jan 27, 2026

Armis Foundation Lab

Armis foundation lab will teach users how to leverage the Armis console to view complete asset visibility across a multitude of environments including On-premise, virtual, cloud, and wireless. It will aslo explore a range of devices and categories seen within the console, starting from a high-level category overview, and then drilling down further to see the device enrichment that is populated for each device. Then, inspecting a device example will show users the wealth of data that Armis can provide for each asset and the activity associated with each one. Users will then experience the simplicity of device enrichment and management that Armis can accomplish passively and without the use of agents.
Foundations Lab
•278 launches

Okta Foundations

This on-demand integration lab is a capability of WWT's Advanced Technology Center (ATC), designed to provide hands-on experience with Okta. The purpose of this lab is to help you develop proficiency in navigating and configuring features within the Okta admin console. In this lab environment, you will gain hands-on experience with essential Okta tasks, including managing users and groups, integrating applications using SAML, and connecting Okta with Active Directory. You will also explore how to configure device assurance policies, ensuring secure access across various devices.
Foundations Lab
•222 launches

Cisco NGFW Foundation Lab

Cisco NGFW Foundation Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Cisco Secure Firewall solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•912 launches

Infrastructure as a Strategic Target of War

As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026

Cyber Range - Initiation

Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day.
Advanced Configuration Lab
•2804 launches

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•231 launches

Zscaler Data Protection (SASE/Endpoint)

The Secure Access Service Edge (SASE), introduced by Gartner in 2019, is a solution integrating networking and security within a cloud-scale architecture, enhancing end-user performance and bolstering security for organizations. Zscaler Internet Access (ZIA) serves as a cloud-delivered SASE service, functioning as a secure Internet and web gateway positioned between users and the Internet. Within ZIA, Zscaler's data protection capabilities offer numerous advantages. These include seamless scalability and global coverage, safeguarding remote workers and branch offices. Utilizing advanced threat intelligence and machine learning, it promptly identifies and addresses breaches. Granular policy controls ensure consistent enforcement of data usage policies, promoting regulatory compliance. Additionally, its integrated security stack simplifies management, enabling IT teams to concentrate on strategic priorities. In essence, ZIA empowers organizations with agile security measures to effectively mitigate risks.
Foundations Lab
•110 launches

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•281 launches

SentinelOne Endpoint & AI SIEM Foundations Lab

Welcome to the SentinelOne Endpoint & AI SIEM Foundations lab provided by the WWT ATC! This lab provides you with a sample environment where you can gain hands-on experience with the SentinelOne solution.
Foundations Lab
•241 launches

SentinelOne XDR

In this learning path you will gain a fundamental understanding of the SentinelOne XDR solution by exploring topics such as the architecture on which SentinelOne XDR is built and the configuration of agent policies. You will also learn about topics such as the endpoint response actions and XDR response actions that SentinelOne can leverage to stop a threat in its tracks.
Learning Path

Armis OT Security

Learn the basics of OT security, and how Armis aims to protect and manage OT devices across a network through complete asset visibility and control. Throughout this learning path, you will learn the basics of the Armis architecture, as well as explore the ways that Armis is able to provide complete asset visibility, track asset activity, and report on asset health. You will also explore some of the key security capabilities that the Armis platform provides by leveraging the Armis Knowledge Base and the Armis Vulnerability Management (AVM).
Learning Path

Tanium Proving Ground Lab

Tanium 7.6 Proving Ground Lab
Advanced Configuration Lab
•674 launches

Palo Alto Cortex XDR

Learn about Palo Alto Cortex XDR, Palo Alto's extended detection and response platform that natively integrates network, endpoint, cloud, and third-party data to stop modern attacks. In this Learning Path, you will explore the architecture on which Cortex XDR runs, as well as look into the deployment of Cortex XDR agents and the creation of profiles and policies. You will also learn about the detection and response capabilities that are provided by Cortex XDR.
Learning Path

Identity & Access Management with CyberArk

The CyberArk learning path provides a high-level overview of Identity & Access Management (IAM) and some of its features and capabilities. In addition, this learning path introduces CyberArk's Privileged Access Security (PAS) solution and provides a lab environment to gain hands-on experience with the solution.
Learning Path

Whole-of-state cybersecurity

Protect critical systems and citizen data across agencies, institutions and communities with a unified approach to cybersecurity.

2 Followers

At a glance

34Total
16Learning Paths
15Labs
2Blogs
1Video
What's related
  • Security
  • ATC
  • Cyber Range
  • Network Security
  • Security Operations
  • Endpoint Security
  • Cybersecurity Risk & Strategy
  • Okta
  • Palo Alto Networks
  • Zscaler
  • Cloud
  • Cloud Security
  • Identity and Access Management
  • SASE
  • Data Center
  • Data Protection & Cyber Recovery
  • Public Sector
  • Rubrik
  • Cisco
  • Cisco Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies