
Offer ending in
Course Overview
Requirements
- Basic understanding of Cybersecurity
- Knowledge of Endpoint Security
- IT Administration
Target Audience
- Cybersecurity Professional
- System Administrator
- Security Analyst
- IT Managers
- Security Consultant
What I will learn?
- In this Crowdstrike EDR Training, you'll master the Falcon Platform, from user management to sensor deployment and prevention policies
- Dive into custom IOA rules, containment strategies, and USB policies
- Gain practical skills in host management, sensor reporting, and effective threat response, ensuring robust cybersecurity for your organization
Why Trainify Trainings?










Course Curriculum
Introduction of Falcon Platoform
-
Understanding Architecture of Falcon Platform
00:00 -
Navigate through the Falcon console
00:00 -
Identify all applications within the Falcon console
00:00
User Management
-
Determine roles required for access to features
00:00 -
Create a new user,delete a user and edit a user
00:00
Sensor Deployement
-
Analyze the pre-installation OS/Networking requirements prior to installing the Falcon sensor
00:00 -
Analyze the default policies and apply best practices in order to prepare workloads for the Falcon sensor
00:00 -
Apply appropriate settings to successfully install a Falcon sensor on Windows, Linux and MacOS
00:00 -
Uninstall a sensor
00:00 -
Troubleshoot a sensor
00:00
Host Management
-
Filter and search the Falcon console to find and manage hosts
00:00
Group Creation
-
Determine the appropriate group assignment for endpoints and understand how this impacts the application of policies
00:00
Prevention policies
-
Determine the appropriate prevention policy settings for endpoints and explain how this impacts security posture
00:00
Custom IOA Rules
-
Create custom IOA rules to monitor behavior that is not fundamentally malicious
00:00
No Quarantine Policy
Containment Policies
-
Configure an allow list appropriate IP addresses, while the network is under containment, based on security workflow requirements
00:00
Exclusions
Monitor business requirement in order to allow trusted activity, and resolve false positives and performance issues
-
Monitor business requirement in order to allow trusted activity, and resolve false positives and performance issues
00:00
Sensor Reports
-
Explain the different types of sensor reports and what each report provides
00:00
USB Policies
-
Apply a USB device policy to restrict or allow access to USB devices
00:00
Sensor Update Policies
-
Determine the appropriate sensor update policy settings and related general settings in order to control the update process
00:00
Firewall Policies
-
Describe how to create a firewall policy
00:00 -
Describe how to configure rule groups, configure traffic rules and apply rule groups to firewall policies
00:00
Detection Analysis
-
Detections App
00:00 -
Filtering
00:00 -
Detection Types
00:00 -
Prevention Types
00:00
Analyst Workflows
-
Assigning a detection
00:00 -
Updating detection status
00:00 -
Network Contain
00:00
Detection using Falcon
-
Performing a hash search
00:00 -
PowerShell related detection
00:00 -
PowerShell Hunting Reports
00:00 -
False Positives
00:00
Reporting
ProActive Investigations/Huntings
-
BulkIP Search
00:00 -
Bulk Domain Search
00:00 -
IP and Domain Searching
00:00
Reviews & Ratings
Frequently Asked Questions
Ans. No, This is a Paid Course with lots of supporting material and live Simulations to learn throughout the course duration.
Ans. You can opt for batch as well as for one-to-one training. So, you have a choice between batch or one-on-one training, it would totally depend on your preference which option you have to choose.
Ans. All the Available learning material which requires or needs for a better understanding of this course will be provided in this training only. So, you don’t have to worry about the course material. Typically, these training programs include a combination of resources such as presentations, slide decks, documentation, hands-on exercises, sample scenarios, and access to a training environment. These materials are designed to help you understand the concepts, features, and functionality of the course more deeply than you enroll.
Ans. Yes, there are live classes which will be conducted in real-time, led by a course instructor who guides participants through the training content, explains concepts, demonstrates practical examples, and addresses questions and doubts.
Q. Job opportunities after learning this course?
Ans. Certification of training completion will be shared by us once you completed the course successfully by clearing all the goals mentioned in the course. Also, this certification validates that you have completed the training and acquired a good knowledge of this course.
Demo Video

