Endpoint Security
CrowdStrike Tech Hub
Your ultimate resource for the CrowdStrike Falcon® platform: In-depth videos, tutorials, and training.
Select a product category below to get started.
Falcon Encounter Hands-On Labs
Falcon Identity Protection in Action
Falcon Encounter Hands-On Labs
Falcon Cloud Security
Falcon Encounter Hands-On Labs
Next-Gen SIEM Demo Video
Falcon Encounter Hands-On Labs
Falcon Data Protection
Falcon Encounter Hands-On Labs
Falcon Exposure Management
Falcon Encounter Hands-On Labs
Falcon for IT
Falcon Encounter Hands-On Labs
CrowdStrike Counter Adversary Operations
Falcon Encounter Hands-On Labs
Charlotte AI
Conversations with Charlotte AI: Malware Families
Falcon Encounter Hands-On Labs
What's new
Blog - AI Innovations to Expedite Security Operations and Upgrade the Analyst Experience
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Blog - Falcon Identity Protection Innovations for Entra ID and Privileged Access
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Blog - Innovations in Falcon Cloud Security at Fal.Con 2024
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Blog - AI Innovations to Expedite Security Operations and Upgrade the Analyst Experience
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Blog - Detecting Microsoft Entra ID Primary Refresh Token Abuse with Falcon Next-Gen SIEM
Tech Hub - Data Protection - Preventing GenAI Data Loss
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Press Release - New CrowdStrike Falcon Platform Innovations Unify End-to-End Security and IT Operations
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Blog - Hunting Weaponized Chrome Extensions with Falcon for IT
Blog - CrowdStrike Drives Cybersecurity Forward
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Blog - How CrowdStrike Hunts, Identifies and Defeats Cloud-Focused Threats
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Blog - International Authorities Indict, Sanction Additional INDRIK SPIDER Members and Detail Ties to BITWISE SPIDER and Russian State Activity
Blog - AI Innovations to Expedite Security Operations and Upgrade the Analyst Experience
Fal.Con - Register to watch the keynotes and 80+ sessions on-demand with the digital access pass to Fal.Con Digital
Latest videos
Endpoint Security - Real Time Response

Play Video
Endpoint Security - Automated Remediation

Play Video
Endpoint Security - Falcon Fusion with Real Time Response

Play Video
Endpoint Security - Customized Dashboards

Play Video
Endpoint Security - Context Enrichment

Play Video
Endpoint Security - Falcon Go for Small and Medium Businesses

Play Video
Identity Protection - Protect Against Exposed Credentials

Play Video
Identity Protection - Honeytoken

Play Video
Identity Protection - Stop Lateral Movement

Play Video
Identity Protection - Risk-Based Conditional Access

Play Video
Identity Protection - Protection for Hybrid Environments

Play Video
Identity Protection - Secure Your Cloud Identity Environment

Play Video
Cloud Security - Cloud Detection and Response

Play Video
Cloud Security - Adversary Attack Path

Play Video
Cloud Security - Infrastructure as Code

Play Video
Cloud Security - Kubernetes Admission Controller

Play Video
Cloud Security - Application Security Posture Management (ASPM)

Play Video
Cloud Security - Automated Remediation

Play Video
NG-SIEM - Detection Posture Management

Play Video
NG-SIEM - Adversary Driven Detection

Play Video
NG-SIEM - AI Assisted Investigation

Play Video
NG-SIEM - Harnessing Email Data to Stop Phishing Attacks

Play Video
NG-SIEM - Leveraging Identity Data to Stop Attacks

Play Video
Falcon Fusion SOAR

Play Video
Data Protection - Protecting PCI Data

Play Video
Data Protection - Preventing GenAI Data Loss

Play Video
Exposure Management - Predictors of Attack

Play Video
Exposure Management - Security Configuration Assessment

Play Video
Exposure Management - Internet Exposure Identification

Play Video
Exposure Management - Asset Criticality Rules

Play Video
Exposure Management - Identifying Internet Asset Risks

Play Video
Exposure Management - Identifying and Triaging Unmanaged Assets

Play Video
Falcon for IT - Get Instant Answers

Play Video
Adversary Intelligence - Premium

Play Video
Adversary OverWatch - Identity Credential Monitoring

Play Video
Adversary Intelligence

Play Video
Adversary Intelligence - Exposed Credentials

Play Video
Adversary Intelligence - Typosquatting

Play Video
Adversary Intelligence - Recon Search

Play Video
Conversations with Charlotte AI: Scattered Spider

Play Video
Conversations with Charlotte AI: Failed Login Attempts

Play Video
Conversations with Charlotte AI: Writing Search Queries

Play Video
Conversations with Charlotte AI: Credential Exposure on Win10 Hosts

Play Video
Conversations with Charlotte AI: Rapid Assessment of Critical Detections

Play Video
Conversations with Charlotte AI: Assessing Potential Attacks

Play Video
Want to learn even more?
View all content