Falcon Encounter
Hands-on Labs

Test-Drive the CrowdStrike Falcon®️ platform in these real-time, hands-on labs.
Every Wednesday, CrowdStrike provides direct access to the CrowdStrike Falcon®️ platform
to introduce you to the industry’s most advanced cloud-native cybersecurity solutions.

Find labs in your region

AMS
APAC
EMEA

Consolidate the Security Stack with the CrowdStrike Falcon Platform

Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

Securing the Identity Landscape with CrowdStrike

Learn how CrowdStrike stops identity threats with the only unified platform for identity protection and endpoint security that delivers up to 85% faster responses with more efficient, cost-effective operations.

Securing Cloud-Native Applications

Learn how to use CrowdStrike® Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

The Modern Endpoint Security Difference

Join us for “The Modern Endpoint Security Difference” hands-on lab and learn why traditional endpoint security solutions are not designed to detect and prevent the increasingly sophisticated threats aimed at endpoints. Experience live the CrowdStrike Falcon platform's fast, powerful and scalable approach to protecting your fleet of devices.

Empowering Proactive Protection with CrowdStrike Falcon Exposure Management

The growing attack surface is creating unprecedented challenges for security teams; from disconnected point products to alert fatigue to limited resources. Adversaries know this and thrive in the gaps between siloed tools, making it easier than ever to infiltrate your environment. Learn how CrowdStrike Falcon® Exposure Management effectively reduces risk with complete attack surface visibility and AI-powered vulnerability management, while reducing point products.

Tackling Next-Gen SIEM use cases with CrowdStrike Falcon® LogScale

7 minutes. That’s how long it takes for an adversary to break out and move laterally in your environment. Join our hands-on workshop to learn how you can detect, investigate and stop adversaries with CrowdStrike Falcon LogScale. Work with a number of popular data sources and discover how to address top Next-Gen SIEM use cases. Lab scenarios include threat hunting, forensics investigations and compliance.

Detecting, Disrupting and Defeating Adversaries with CrowdStrike Falcon Intelligence

Join our experts to perform a hands-on investigation into a ransomware attack launched by a sophisticated cybercriminal. Learn how to use threat intelligence to accelerate response by making better, faster security decisions. Scenarios will include responding to an attack blocked by the CrowdStrike Falcon platform and identifying compromised credentials by monitoring the dark web.

Attack & Defend Like Falcon Complete MDR: Surgically Eradicate Advanced Threats in Minutes

Go hands-on with Falcon Complete MDR specialists as they pull back the curtain on CrowdStrike’s elite managed detection and response (MDR) operations that protect thousands of organizations worldwide all day, everyday. Simulating a modern, identity-based attack scenario, we'll show you step-by-step how to rapidly and surgically detect, triage, and remediate advanced adversary tradecraft across your critical areas of risk at the speed and scale of CrowdStrike MDR.

Experience the Difference Between CrowdStrike and Microsoft

Cyber risk starts with your choice of security provider. In this workshop, we’ll discuss the risk for your business of using Microsoft security products. We’ll cover three ways Microsoft may cause its customers to compromise on cybersecurity, and then demonstrate how fast, simple and easy it is to go from deployment to detection with CrowdStrike. See for yourself why 8 out of 10 times, when an enterprise runs a proof of value test, they choose CrowdStrike.

Get real-time access to the CrowdStrike Falcon® platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.

Consolidate the Security Stack with the CrowdStrike Falcon Platform

Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

Securing the Identity Landscape with CrowdStrike

Learn how CrowdStrike stops identity threats with the only unified platform for identity protection and endpoint security that delivers up to 85% faster responses with more efficient, cost-effective operations.

Securing Cloud-Native Applications

Learn how to use CrowdStrike® Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

The Modern Endpoint Security Difference

Join us for “The Modern Endpoint Security Difference” hands-on lab and learn why traditional endpoint security solutions are not designed to detect and prevent the increasingly sophisticated threats aimed at endpoints. Experience live the CrowdStrike Falcon platform's fast, powerful and scalable approach to protecting your fleet of devices.

Empowering Proactive Protection with CrowdStrike Falcon Exposure Management

The growing attack surface is creating unprecedented challenges for security teams; from disconnected point products to alert fatigue to limited resources. Adversaries know this and thrive in the gaps between siloed tools, making it easier than ever to infiltrate your environment. Learn how CrowdStrike Falcon® Exposure Management effectively reduces risk with complete attack surface visibility and AI-powered vulnerability management, while reducing point products.

Tackling Next-Gen SIEM use cases with CrowdStrike Falcon® LogScale

7 minutes. That’s how long it takes for an adversary to break out and move laterally in your environment. Join our hands-on workshop to learn how you can detect, investigate and stop adversaries with CrowdStrike Falcon LogScale. Work with a number of popular data sources and discover how to address top Next-Gen SIEM use cases. Lab scenarios include threat hunting, forensics investigations and compliance.

Attack & Defend Like Falcon Complete MDR: Surgically Eradicate Advanced Threats in Minutes

Go hands-on with Falcon Complete MDR specialists as they pull back the curtain on CrowdStrike’s elite managed detection and response (MDR) operations that protect thousands of organizations worldwide all day, everyday. Simulating a modern, identity-based attack scenario, we'll show you step-by-step how to rapidly and surgically detect, triage, and remediate advanced adversary tradecraft across your critical areas of risk at the speed and scale of CrowdStrike MDR. Title: Description: Learn more CTA:

Experience the Difference Between CrowdStrike and Microsoft

Cyber risk starts with your choice of security provider. In this workshop, we’ll discuss the risk for your business of using Microsoft security products. We’ll cover three ways Microsoft may cause its customers to compromise on cybersecurity, and then demonstrate how fast, simple and easy it is to go from deployment to detection with CrowdStrike. See for yourself why 8 out of 10 times, when an enterprise runs a proof of value test, they choose CrowdStrike.

Get real-time access to the CrowdStrike Falcon® platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.

Consolidate the Security Stack with the CrowdStrike Falcon Platform

Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

Securing the Identity Landscape with CrowdStrike

Learn how CrowdStrike stops identity threats with the only unified platform for identity protection and endpoint security that delivers up to 85% faster responses with more efficient, cost-effective operations.

Securing Cloud-Native Applications

Learn how to use CrowdStrike® Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

The Modern Endpoint Security Difference

Join us for “The Modern Endpoint Security Difference” hands-on lab and learn why traditional endpoint security solutions are not designed to detect and prevent the increasingly sophisticated threats aimed at endpoints. Experience live the CrowdStrike Falcon platform's fast, powerful and scalable approach to protecting your fleet of devices.

Empowering Proactive Protection with CrowdStrike Falcon Exposure Management

The growing attack surface is creating unprecedented challenges for security teams; from disconnected point products to alert fatigue to limited resources. Adversaries know this and thrive in the gaps between siloed tools, making it easier than ever to infiltrate your environment. Learn how CrowdStrike Falcon® Exposure Management effectively reduces risk with complete attack surface visibility and AI-powered vulnerability management, while reducing point products.

Tackling Next-Gen SIEM use cases with CrowdStrike Falcon® LogScale

7 minutes. That’s how long it takes for an adversary to break out and move laterally in your environment. Join our hands-on workshop to learn how you can detect, investigate and stop adversaries with CrowdStrike Falcon LogScale. Work with a number of popular data sources and discover how to address top Next-Gen SIEM use cases. Lab scenarios include threat hunting, forensics investigations and compliance.

Detecting, Disrupting and Defeating Adversaries with CrowdStrike Falcon Intelligence

Join our experts to perform a hands-on investigation into a ransomware attack launched by a sophisticated cybercriminal. Learn how to use threat intelligence to accelerate response by making better, faster security decisions. Scenarios will include responding to an attack blocked by the CrowdStrike Falcon platform and identifying compromised credentials by monitoring the dark web.

Attack & Defend Like Falcon Complete MDR: Surgically Eradicate Advanced Threats in Minutes

Go hands-on with Falcon Complete MDR specialists as they pull back the curtain on CrowdStrike’s elite managed detection and response (MDR) operations that protect thousands of organizations worldwide all day, everyday. Simulating a modern, identity-based attack scenario, we'll show you step-by-step how to rapidly and surgically detect, triage, and remediate advanced adversary tradecraft across your critical areas of risk at the speed and scale of CrowdStrike MDR.

Experience the Difference Between CrowdStrike and Microsoft

Cyber risk starts with your choice of security provider. In this workshop, we’ll discuss the risk for your business of using Microsoft security products. We’ll cover three ways Microsoft may cause its customers to compromise on cybersecurity, and then demonstrate how fast, simple and easy it is to go from deployment to detection with CrowdStrike. See for yourself why 8 out of 10 times, when an enterprise runs a proof of value test, they choose CrowdStrike.

Get real-time access to the Falcon® platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.