Statements (65)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Educational_Institution
|
gptkbp:affiliatedWith |
CrowdStrike
|
gptkbp:focusesOn |
Incident response
Threat intelligence Endpoint security |
gptkbp:hasAudience |
Students
Security professionals IT professionals |
gptkbp:hasLocation |
Online
|
gptkbp:hasPart |
Compliance training
Risk management training Security awareness training Security technology training Incident response training Incident management training Advanced threat detection course Cloud incident response training Cyber threat intelligence course Cybersecurity compliance training Cybersecurity fundamentals course Cybersecurity incident response training Cybersecurity leadership training Cybersecurity policy training Cybersecurity risk assessment training Cybersecurity threat landscape training Data breach response training Data protection training Endpoint protection course Incident response planning training Incident response tabletop exercises IoT security training Mobile security training Phishing simulation training Red team vs blue team exercises Security architecture training Security compliance frameworks training Security metrics training Security operations center training Security operations management training Security operations training Threat hunting training Threat modeling training Vulnerability management course Falcon_platform_training |
https://www.w3.org/2000/01/rdf-schema#label |
CrowdStrike Academy
|
gptkbp:isPartOf |
gptkb:CrowdStrike_Holdings,_Inc.
|
gptkbp:offers |
Networking opportunities
Workshops Webinars Certification programs Instructor-led training Self-paced learning Free resources Cybersecurity training Industry certifications |
gptkbp:offersCoursesIn |
Malware analysis
Cloud security Network security Digital_forensics |
gptkbp:provides |
Online courses
Hands-on labs Learning paths Certification exams Career development resources |
gptkbp:wasFoundedIn |
2018
|