Our Programs

CrowdStrike Certified Falcon Administrator Training

CrowdStrike Certified Falcon Administrator Training - Self-Paced, Grouped Live Classes & 1-on-1 Mentorship

The CrowdStrike Certified Falcon Administrator certification is a role-based credential offered by CrowdStrike, a global leader in endpoint protection. This certification validates your ability to deploy, configure, and manage the CrowdStrike Falcon platform for enterprise cybersecurity. Our training program offers flexible self-paced learning, expert-led live sessions, and personalized mentorship to prepare professionals for efficient use of Falcon and success in the certification exam. 

CrowdStrike Certification Training Course Curriculum

This course is designed to prepare cybersecurity professionals to effectively use and manage the CrowdStrike Falcon platform. It covers core functionalities including sensor deployment, policy configuration, host management, and workflows. 

Covers access control, role creation, and API key management in the Falcon console. 

  • Determine roles required for feature access 
  • Create and assign user roles based on permissions 
  • Manage API keys 
 
Scroll to Top

Focuses on managing and monitoring hosts within the Falcon platform. 

  • Use filters in the Host Management page 
  • Disable detections for a host and understand the impact 
  • Understand Reduced Functionality Mode (RFM) and identify affected hosts 
  • Locate inactive sensors and retention timelines 
  • Generate and review host-specific reports 

Covers endpoint grouping strategies and their impact on policy application. 

  • Assign endpoints to appropriate groups 
  • Apply best practices for managing host groups 

Teaches how to configure prevention and update policies, and manage user activity logs. 

  • Configure prevention policy settings to enhance security posture 
  • Set sensor update policies 
  • Apply roles and review Falcon RTR audit logs 
  • Understand and configure containment policies 
  • Exclude IPs/subnets from containment based on workflow needs 
  • Manage quarantined files 

Covers creation and customization of detection rules and managing false positives. 

  • Create custom IOA rules for behavioral monitoring 
  • Adjust rules based on business requirements and false positive resolution 
  • Configure IOC settings for custom security posturing 
  • Apply CID-wide configurations within General Settings 

Explores reporting features and audit log utilization. 

  • Identify sensor report types and their use cases 
  • Understand available audit logs and how to use them 

Covers setting up automated workflows within Falcon to streamline response. 

  • Configure automated workflows based on specific triggers 

Who This Is For:

Eligibility Criteria:

Basic knowledge of cybersecurity principles and endpoint systems is recommended. No formal prerequisites required. 

Do’s & Don’ts for Exam:

Do’s:

Don’ts:

Exam Pattern

Certification

On passing the assessment, participants receive the CrowdStrike Certified Falcon Administrator credential from CrowdStrike, proving their operational expertise in using Falcon for enterprise security. 

Reserve your Spot

We’re Here to Secure Your Hard Work

Whether you’re just starting out or stepping up your cybersecurity career, Red Cloud Academy is your launchpad.

Scroll to Top