Endpoint Security
CrowdStrike Tech Hub
Your ultimate resource for the CrowdStrike Falcon® platform: In-depth videos, tutorials, and training.
Select a product category below to get started.
Falcon Encounter Hands-On Labs
Falcon Identity Protection in Action
Falcon Encounter Hands-On Labs
Falcon Cloud Security
Falcon Encounter Hands-On Labs
Next-Gen SIEM Demo Video
Falcon Encounter Hands-On Labs
Falcon Data Protection
Falcon Encounter Hands-On Labs
Falcon Exposure Management
Falcon Encounter Hands-On Labs
Falcon for IT
Falcon Encounter Hands-On Labs
CrowdStrike Counter Adversary Operations
Falcon Encounter Hands-On Labs
Charlotte AI
Conversations with Charlotte AI: Malware Families
Falcon Encounter Hands-On Labs
What's new
Blog - AI Innovations to Expedite Security Operations and Upgrade the Analyst Experience
Tech blog - Outpace the Adversary: CrowdStrike’s AI-native Falcon Platform in Action
Blog - Falcon Identity Protection Innovations for Entra ID and Privileged Access
Blog - Innovations in Falcon Cloud Security at Fal.Con 2024
Tech Blog - Outpace the Adversary: CrowdStrike’s AI-native Falcon Platform in Action
Demo Showcase - Stopping CURLY SPIDER with Falcon Next-Gen SIEM
Blog - Detecting Microsoft Entra ID Primary Refresh Token Abuse with Falcon Next-Gen SIEM
Tech Hub - Data Protection - Preventing GenAI Data Loss
Tech Blog - Outpace the Adversary: CrowdStrike’s AI-native Falcon Platform in Action
Press Release - New CrowdStrike Falcon Platform Innovations Unify End-to-End Security and IT Operations
Demo - See Falcon for IT in Action
Demo - Falcon for IT Visibility + Response: Demo Drill Down
Proactive Security: Outpace the Adversary - CrowdStrike's AI-native Falcon Platform in Action - Featuring Falcon for IT
Blog - How CrowdStrike Hunts, Identifies and Defeats Cloud-Focused Threats
Blog - International Authorities Indict, Sanction Additional INDRIK SPIDER Members and Detail Ties to BITWISE SPIDER and Russian State Activity
Press Release - CrowdStrike Unleashes New Agentic, Outcome-Driven AI Innovations to Power the Next Evolution of the SOC
Blog - CrowdStrike Launches Agentic AI Innovations to Fortify the AI-Native SOC
Latest videos
Endpoint Security - Real Time Response

Play Video
Endpoint Security - Automated Remediation

Play Video
Endpoint Security - Falcon Fusion with Real Time Response

Play Video
Endpoint Security - Customized Dashboards

Play Video
Endpoint Security - Context Enrichment

Play Video
Endpoint Security - Falcon Go for Small and Medium Businesses

Play Video
Identity Protection - Protect Against Exposed Credentials

Play Video
Identity Protection - Honeytoken

Play Video
Identity Protection - Stop Lateral Movement

Play Video
Identity Protection - Risk-Based Conditional Access

Play Video
Identity Protection - Protection for Hybrid Environments

Play Video
Identity Protection - Secure Your Cloud Identity Environment

Play Video
Cloud Security - Cloud Detection and Response

Play Video
Cloud Security - Adversary Attack Path

Play Video
Cloud Security - Infrastructure as Code

Play Video
Cloud Security - Kubernetes Admission Controller

Play Video
Cloud Security - Application Security Posture Management (ASPM)

Play Video
Cloud Security - Automated Remediation

Play Video
NG-SIEM - Detection Posture Management

Play Video
NG-SIEM - Adversary Driven Detection

Play Video
NG-SIEM - AI Assisted Investigation

Play Video
NG-SIEM - Harnessing Email Data to Stop Phishing Attacks

Play Video
NG-SIEM - Leveraging Identity Data to Stop Attacks

Play Video
Falcon Fusion SOAR

Play Video
Data Protection - Protecting PCI Data

Play Video
Data Protection - Preventing GenAI Data Loss

Play Video
Exposure Management - Predictors of Attack

Play Video
Exposure Management - Security Configuration Assessment

Play Video
Exposure Management - Internet Exposure Identification

Play Video
Exposure Management - Asset Criticality Rules

Play Video
Exposure Management - Identifying Internet Asset Risks

Play Video
Exposure Management - Identifying and Triaging Unmanaged Assets

Play Video
Falcon for IT - Get Instant Answers

Play Video
Adversary Intelligence - Premium

Play Video
Adversary OverWatch - Identity Credential Monitoring

Play Video
Adversary Intelligence

Play Video
Adversary Intelligence - Exposed Credentials

Play Video
Adversary Intelligence - Typosquatting

Play Video
Adversary Intelligence - Recon Search

Play Video
Charlotte AI Agentic Detection Triage

Play Video
Charlotte AI Agentic Response

Play Video
Charlotte AI Agentic Workflows

Play Video
Conversations with Charlotte AI: Credential Exposure on Win10 Hosts

Play Video
Conversations with Charlotte AI: Rapid Assessment of Critical Detections

Play Video
Conversations with Charlotte AI: Assessing Potential Attacks

Play Video
Want to learn even more?
View all content