Falcon Encounter
Hands-on Labs

Test-Drive the CrowdStrike Falcon®️ platform in these real-time, hands-on labs.
Every Wednesday, CrowdStrike provides direct access to the CrowdStrike Falcon®️ platform
to introduce you to the industry’s most advanced cloud-native cybersecurity solutions.

Find labs in your region

AMS
APAC
EMEA

Introduction to the CrowdStrike Falcon® platform

Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

Accelerating Investigations with CrowdStrike Falcon® Intelligence

Join our experts as they go through a real-life investigation and explain how actionable threat intelligence can help security analysts understand the who, how and why behind an endpoint detection.

Monitoring the Criminal Underground for Stolen Credentials

Learn how to investigate stolen credentials and monitor the hidden areas of the internet such as the dark web. This course introduces CrowdStrike Falcon® Intelligence Recon.

Securing Cloud-Native Applications

Learn how to use CrowdStrike Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

Stopping Modern Attacks with CrowdStrike Falcon® Identity Protection

Learn how to provide real-time protection through risk-based conditional access policies. Discover how CrowdStrike Falcon Identity Protection uses a unified sensor to detect and stop identity-based attacks.

Get real-time access to the Falcon Platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.

Introduction to the CrowdStrike Falcon® platform

Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

Accelerating Investigations with CrowdStrike Falcon® Intelligence

Join our experts as they go through a real-life investigation and explain how actionable threat intelligence can help security analysts understand the who, how and why behind an endpoint detection.

Monitoring the Criminal Underground for Stolen Credentials

Learn how to investigate stolen credentials and monitor the hidden areas of the internet such as the dark web. This course introduces CrowdStrike Falcon® Intelligence Recon.

Securing Cloud-Native Applications

Learn how to use CrowdStrike Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

Stopping Modern Attacks with CrowdStrike Falcon® Identity Protection

Learn how to provide real-time protection through risk-based conditional access policies. Discover how CrowdStrike Falcon Identity Protection uses a unified sensor to detect and stop identity-based attacks.

Threat Hunting with the CrowdStrike Falcon® platform

Learn the principles of threat hunting through this hands-on lab. This course demonstrates multiple search techniques and the power of integrating investigations with CrowdStrike Threat Intelligence.

Get real-time access to the Falcon Platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.

Introduction to the CrowdStrike Falcon® platform

Learn the basics of the CrowdStrike Falcon® platform through a hands-on attack scenario. You’ll detect, investigate, and respond to the threat – all while learning how to use the Falcon platform.

Accelerating Investigations with CrowdStrike Falcon® Intelligence

Join our experts as they go through a real-life investigation and explain how actionable threat intelligence can help security analysts understand the who, how and why behind an endpoint detection.

Monitoring the Criminal Underground for Stolen Credentials

Learn how to investigate stolen credentials and monitor the hidden areas of the internet such as the dark web. This course introduces CrowdStrike Falcon® Intelligence Recon.

Securing Cloud-Native Applications

Learn how to use CrowdStrike Cloud Security solutions to secure cloud-native applications using a single platform. You’ll discover how to visualize your cloud estate, monitor and fix misconfigurations, address indicators of attack, and protect your cloud environment.

Stopping Modern Attacks with CrowdStrike Falcon® Identity Protection

Learn how to provide real-time protection through risk-based conditional access policies. Discover how CrowdStrike Falcon Identity Protection uses a unified sensor to detect and stop identity-based attacks.

Threat Hunting with the CrowdStrike Falcon® platform

Learn the principles of threat hunting through this hands-on lab. This course demonstrates multiple search techniques and the power of integrating investigations with CrowdStrike Threat Intelligence.

Get real-time access to the Falcon Platform. Each Falcon Encounter Hands-on Lab is hosted live so you can ask product experts questions as you navigate through the experience.