Falcon Encounter Hands-on Labs
Test-Drive the CrowdStrike Falcon®️ platform in these real-time, hands-on labs. Every Wednesday, CrowdStrike provides direct access to the CrowdStrike Falcon®️ platform to introduce you to the industry’s most advanced cloud-native cybersecurity solutions.
Find labs in your region

Introduction to the CrowdStrike Falcon® platform Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

The Modern Endpoint Security Difference Join us for “The Modern Endpoint Security Difference” hands-on lab and learn why traditional endpoint security solutions are not designed to detect and prevent the increasingly sophisticated threats aimed at endpoints. Experience live the CrowdStrike Falcon Platform's fast, powerful and scalable approach to protecting your fleet of devices.

Experience the Difference Between CrowdStrike and Microsoft
Cyber risk starts with your choice of security provider. In this workshop, we’ll discuss the risk for your business of using Microsoft security products. We’ll cover three ways Microsoft may cause its customers to compromise on cybersecurity, and then demonstrate how fast, simple and easy it is to go from deployment to detection with CrowdStrike. See for yourself why 8 out of 10 times, when an enterprise runs a proof of value test, they choose CrowdStrike.

Accelerating Investigations with CrowdStrike Falcon® Intelligence Join our experts as they go through a real-life investigation and explain how actionable threat intelligence can help security analysts understand the who, how and why behind an endpoint detection.

Securing Cloud-Native Applications Learn how to use CrowdStrike® Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

Disrupt the Adversaries' Path of Least Resistance with CrowdStrike Falcon Identity Protection Eight out of 10 breaches today are identity-driven. Learn how to provide real-time protection through risk-based conditional access policies. Discover how CrowdStrike Falcon Identity Protection solutions use a unified sensor to detect and stop identity-based attacks.

Master Your Attack Surface with CrowdStrike IT SecOps
The attack surface is growing rapidly; creating new challenges for security operations teams around asset visibility and exposure management. Learn how to assess, prioritize and remediate vulnerabilities with CrowdStrike Falcon® Discover and CrowdStrike Falcon® Spotlight so you can gain control over your attack surface and become a SecOps warrior.

Sharpen Your Threat Hunting Skills with CrowdStrike Falcon® LogScale Learn how to uncover hidden threats quickly and maintain a secure environment across your endpoints, users, and cloud workloads. In this workshop you'll learn how leading organizations rely on a modern log management strategy to eliminate blind spots and hunt for threats. You'll get hands-on experience searching and visualizing log data to uncover attacks and investigate incidents with CrowdStrike Falcon® LogScale. Save your seat now to hear best practices and sharpen your threat hunting skills.

Monitoring the Criminal Underground for Stolen Credentials Learn how to investigate stolen credentials and monitor the hidden areas of the internet such as the dark web. This course introduces CrowdStrike Falcon® Intelligence Recon.

Hands-on MDR: From Threat Hunting to Full-Cycle Remediation
Go hands-on with Falcon Complete MDR specialists and elite threat hunters from Falcon OverWatch as they pull back the curtain on our MDR operations and guide you through step-by-step how to rapidly detect, triage, and respond to new attacks at the speed and scale of CrowdStrike.

Get real-time access to the CrowdStrike Falcon® platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.

Introduction to the CrowdStrike Falcon® platform Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

The Modern Endpoint Security Difference
Join us for “The Modern Endpoint Security Difference” hands-on lab and learn why traditional endpoint security solutions are not designed to detect and prevent the increasingly sophisticated threats aimed at endpoints. Experience live the CrowdStrike Falcon Platform's fast, powerful and scalable approach to protecting your fleet of devices.

Experience the Difference Between CrowdStrike and Microsoft
Cyber risk starts with your choice of security provider. In this workshop, we’ll discuss the risk for your business of using Microsoft security products. We’ll cover three ways Microsoft may cause its customers to compromise on cybersecurity, and then demonstrate how fast, simple and easy it is to go from deployment to detection with CrowdStrike. See for yourself why 8 out of 10 times, when an enterprise runs a proof of value test, they choose CrowdStrike.

Securing Cloud-Native Applications Learn how to use CrowdStrike® Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

Disrupt the Adversaries' Path of Least Resistance with CrowdStrike Falcon Identity Protection Eight out of 10 breaches today are identity-driven. Learn how to provide real-time protection through risk-based conditional access policies. Discover how CrowdStrike Falcon Identity Protection solutions use a unified sensor to detect and stop identity-based attacks.

Master Your Attack Surface with CrowdStrike IT SecOps
The attack surface is growing rapidly; creating new challenges for security operations teams around asset visibility and exposure management. Learn how to assess, prioritize and remediate vulnerabilities with CrowdStrike Falcon® Discover and CrowdStrike Falcon® Spotlight so you can gain control over your attack surface and become a SecOps warrior.

Sharpen Your Threat Hunting Skills with CrowdStrike Falcon® LogScale Learn how to uncover hidden threats quickly and maintain a secure environment across your endpoints, users, and cloud workloads. In this workshop you'll learn how leading organizations rely on a modern log management strategy to eliminate blind spots and hunt for threats. You'll get hands-on experience searching and visualizing log data to uncover attacks and investigate incidents with CrowdStrike Falcon® LogScale. Save your seat now to hear best practices and sharpen your threat hunting skills.

Hands-on MDR: From Threat Hunting to Full-Cycle Remediation
Go hands-on with Falcon Complete MDR specialists and elite threat hunters from Falcon OverWatch as they pull back the curtain on our MDR operations and guide you through step-by-step how to rapidly detect, triage, and respond to new attacks at the speed and scale of CrowdStrike.

Get real-time access to the CrowdStrike Falcon® platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.

Introduction to the CrowdStrike Falcon® platform Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

The Modern Endpoint Security Difference Join us for “The Modern Endpoint Security Difference” hands-on lab and learn why traditional endpoint security solutions are not designed to detect and prevent the increasingly sophisticated threats aimed at endpoints. Experience live the CrowdStrike Falcon Platform's fast, powerful and scalable approach to protecting your fleet of devices.

Experience the Difference Between CrowdStrike and Microsoft
Cyber risk starts with your choice of security provider. In this workshop, we’ll discuss the risk for your business of using Microsoft security products. We’ll cover three ways Microsoft may cause its customers to compromise on cybersecurity, and then demonstrate how fast, simple and easy it is to go from deployment to detection with CrowdStrike. See for yourself why 8 out of 10 times, when an enterprise runs a proof of value test, they choose CrowdStrike.

Accelerating Investigations with CrowdStrike Falcon® Intelligence Join our experts as they go through a real-life investigation and explain how actionable threat intelligence can help security analysts understand the who, how and why behind an endpoint detection.

Securing Cloud-Native Applications Learn how to use CrowdStrike® Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

Disrupt the Adversaries' Path of Least Resistance with CrowdStrike Falcon Identity Protection Eight out of 10 breaches today are identity-driven. Learn how to provide real-time protection through risk-based conditional access policies. Discover how CrowdStrike Falcon Identity Protection solutions use a unified sensor to detect and stop identity-based attacks.

Master Your Attack Surface with CrowdStrike IT SecOps
The attack surface is growing rapidly; creating new challenges for security operations teams around asset visibility and exposure management. Learn how to assess, prioritize and remediate vulnerabilities with CrowdStrike Falcon® Discover and CrowdStrike Falcon® Spotlight so you can gain control over your attack surface and become a SecOps warrior.

Sharpen Your Threat Hunting Skills with CrowdStrike Falcon® LogScale Learn how to uncover hidden threats quickly and maintain a secure environment across your endpoints, users, and cloud workloads. In this workshop you'll learn how leading organizations rely on a modern log management strategy to eliminate blind spots and hunt for threats. You'll get hands-on experience searching and visualizing log data to uncover attacks and investigate incidents with CrowdStrike Falcon® LogScale. Save your seat now to hear best practices and sharpen your threat hunting skills.

Monitoring the Criminal Underground for Stolen Credentials Learn how to investigate stolen credentials and monitor the hidden areas of the internet such as the dark web. This course introduces CrowdStrike Falcon® Intelligence Recon.

Hands-on MDR: From Threat Hunting to Full-Cycle Remediation Go hands-on with Falcon Complete MDR specialists and elite threat hunters from Falcon OverWatch as they pull back the curtain on our MDR operations and guide you through step-by-step how to rapidly detect, triage, and respond to new attacks at the speed and scale of CrowdStrike.

Get real-time access to the Falcon® platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.