Endpoint Security
CrowdStrike Tech Hub
Your ultimate resource for the CrowdStrike Falcon® platform: In-depth videos, tutorials, and training.
Select a product category below to get started.
Falcon Encounter Hands-On Labs
Falcon Identity Protection in Action
Falcon Encounter Hands-On Labs
Falcon Cloud Security
Falcon Encounter Hands-On Labs
Next-Gen SIEM Demo Video
Falcon Encounter Hands-On Labs
Falcon Data Protection
Falcon Encounter Hands-On Labs
Falcon Exposure Management
Falcon Encounter Hands-On Labs
Falcon for IT
Falcon Encounter Hands-On Labs
CrowdStrike Counter Adversary Operations
Falcon Encounter Hands-On Labs
Charlotte AI
Conversations with Charlotte AI: Malware Families
Falcon Encounter Hands-On Labs
Endpoint Security - Real Time Response
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Real-Time-Response-1.png)
Play Video
Endpoint Security - Automated Remediation
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/th-automated-remediation-c.png)
Play Video
Endpoint Security - Falcon Fusion with Real Time Response
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/th-falconfusionrtr.png)
Play Video
Endpoint Security - Customized Dashboards
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/th-customized-dashboards-c.png)
Play Video
Endpoint Security - Context Enrichment
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/th-contextenrichment.png)
Play Video
Endpoint Security - Falcon Go for Small and Medium Businesses
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Falcon-GO.png)
Play Video
Identity Protection - Protect Against Exposed Credentials
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/IDP_ReconIDP-bbar.png)
Play Video
Identity Protection - Honeytoken
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/HoneyTokens.png)
Play Video
Identity Protection - Stop Lateral Movement
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Stopping-Lateral-Movement.png)
Play Video
Identity Protection - Risk-Based Conditional Access
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Rick-Based-Conditional-Access.png)
Play Video
Identity Protection - Protection for Hybrid Environments
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Hybrid-AD.png)
Play Video
Identity Protection - Secure Your Cloud Identity Environment
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/IDP-Secure-your-cloud-identity-environment.png)
Play Video
Cloud Security - Cloud Detection and Response
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Cloud-Detection-and-Response-1.png)
Play Video
Cloud Security - Adversary Attack Path
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Adversary-Attack-Path-1.png)
Play Video
Cloud Security - Infrastructure as Code
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/IaC-1.png)
Play Video
Cloud Security - Kubernetes Admission Controller
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/KAC-1.png)
Play Video
Cloud Security - Application Security Posture Management (ASPM)
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Falcon-ASPM.png)
Play Video
Cloud Security - Automated Remediation
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/cloud-automated-remediation-c.png)
Play Video
NG-SIEM - AI Assisted Investigation
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/AI-Assisted.png)
Play Video
NG-SIEM - Adversary Driven Detection
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Adversary-Driven-Detection-1.png)
Play Video
NG-SIEM - Streamline The SOC
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Streamline-the-SOC.png)
Play Video
NG-SIEM - Harnessing Email Data to Stop Phishing Attacks
![](https://www.crowdstrike.com/wp-content/uploads/2024/06/ng-seim-stop-phishing-thumb.png)
Play Video
NG-SIEM - Leveraging Identity Data to Stop Attacks
![](https://www.crowdstrike.com/wp-content/uploads/2024/06/techhub-ng-siem-leveraging-idp-vid-thumb.png)
Play Video
Falcon Fusion SOAR
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Falcon-Fusion.png)
Play Video
Data Protection - Protecting PCI Data
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Protecting-PCI-Data.png)
Play Video
Data Protection - Preventing GenAI Data Loss
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Preventing-GenAI-Data-Loss.png)
Play Video
Exposure Management - Active Asset Scanning
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Active-Asset-Discovery.png)
Play Video
Exposure Management - Security Configuration Assessment
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/SCA.png)
Play Video
Exposure Management - Internet Exposure Identification
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Internet-Exposure-ID.png)
Play Video
Exposure Management - Asset Criticality Rules
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Asset-Criticality-Rules.png)
Play Video
Exposure Management - Identifying Internet Asset Risks
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/identifying-internet-asset-risks-with-fem-c-1.png)
Play Video
Exposure Management - Identifying and Triaging Unmanaged Assets
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Triaging-Unmanaged-Assets-with-Falcon-Exposure-Management-c.png)
Play Video
Falcon for IT - Get Instant Answers
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Ask-Any-Question-Get-Instant-Answers.png)
Play Video
Adversary Intelligence - Premium
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Falcon-Adversary-Intel-Premium-1.png)
Play Video
Adversary OverWatch - Identity Credential Monitoring
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Falcon-Adversary-OverWatch.png)
Play Video
Adversary Intelligence
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Falcon-Adversary-Intelligence-c.png)
Play Video
Adversary Intelligence - Exposed Credentials
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Exposed-data-c.png)
Play Video
Adversary Intelligence - Typosquatting
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Typosquatting-c.png)
Play Video
Adversary Intelligence - Recon Search
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/recon-search-c.png)
Play Video
Conversations with Charlotte AI: Scattered Spider
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Charlotte-AI-1-Thumbnail.png)
Play Video
Conversations with Charlotte AI: Failed Login Attempts
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Charlotte-AI-2-Failed-logins.png)
Play Video
Conversations with Charlotte AI: Writing Search Queries
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Charlotte-AI-8-PowerShell.png)
Play Video
Conversations with Charlotte AI: Credential Exposure on Win10 Hosts
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Charlotte-AI-5-Windows-10.png)
Play Video
Conversations with Charlotte AI: Rapid Assessment of Critical Detections
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Charlotte-AI-10-Critical-Detections.png)
Play Video
Conversations with Charlotte AI: Assessing Potential Attacks
![](https://www.crowdstrike.com/wp-content/uploads/2024/05/Charlotte-AI-9-Log4j.png)
Play Video
Want to learn even more?
View all content