eLearning Course Backlog

Fundamentals of On Premise Network Security Designs

Learn practical approaches to network security when designing your on-premise SAP network.

Security Overview of Hybrid Integration Scenarios for SAP

Learn how to protect your data and environment in SAP cloud to on-premise integration scenarios.

Fundamentals of Network intrusion detection for SAP

Learn to identify attacks on your SAP via network intrusion detection.

Fundamentals of SAP Process Interaction Model

Learn how SAP application clusters work and how to protect the cluster management from compromisation.

Fundamentals of SAP Specific Operating System Hardening

Learn to harden your SAP's operating system sufficiently.

Fundamentals of Security Incident Network Containment

Learn what options you have to contain and respond to the attacker's movements in your SAP environment

Principals of RFC Gateway & Message Server hardening

Learn how to secure and harden the SAP RFC Gateway and Message Server components.

Best Practices of RFC Security Monitoring

Learn how you can monitor and inventory interfaces of the RFC protocol.

Best Practices of RFC Communication Hardening

Learn how to increase the protection level of the RFC protocol.

Introduction into SAP User Management & Authentication

Learn the basics of managing access and verifying SAP user identities.

Fundamental Attack Vectors to the SAP Standard

Learn what the commonly used attack vectors to SAP systems are.

Fundamental Attack Vectors to the SAP Application Lifecycle and Change Management

Learn what the commonly used software lifecycle attack vectors to SAP are.

Fundamental Attacks Vectors to the SAP Proprietary Clients

Understand how adversaries can attack your environment via commonly used SAP proprietary client software.

Overview of Advanced SAP data Security Features

Get an overview of the more advanced data protection concepts possible in SAP.

Fundamentals of SAP Interface and Configuration Monitoring

Learn how you can detect security events by monitoring SAP interfaces and configuration.

Introduction to Cryptography for SAP S4/HANA

Learn about the cryptographic features of S/4HANA.

Introduction to the SAP Authorization Concept

Understand how the concept of user authorisation works in SAP systems.

Fundamentals of Interface & Start Authorizations

Learn how to identify too excessive user permissions on interfaces and programs.

Fundamentals of Organizational & Structural Authorizations

Learn how to identify authorisation flaws in separating access between organisations in an SAP system.

Introduction into SAP Authorization Security Flaws

Learn about common user authorisation flaws in SAP systems.

Access & Authorization Tracing

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Best Practices to Minimize Attack Surface on Start Authorizations

Learn what features you can use to minimise SAP user start-authorisation to the needful.

Best Practices to Minimize Attack Surface on Remote Access Authorizations

Learn what features you can use to minimise SAP user remote access authorisation to the needful.

Fundamentals of Common Code Security Design Flaws

Learn to avoid the most common code security design flaws in ABAP.

Stored Procedures Injection Vulnerabilities

Learn to identify and prevent Stored Prceude injection vulnerabilities in ABAP

Trap- / Backdoors

Learn to identify trap- and backdoors in ABAP

Privilege Escalation Vulnerabilties

Learn to identify and prevent privilege escalation vulnerabilities in ABAP

Cross Site Request Forgery Vulnerabilities (XSRF)

Learn to identify and prevent cross-site request forgery vulnerabilities in ABAP

Cross Site Scripting & Click Jacking Vulnerabilities (XSS)

Learn to identify and prevent cross-site scripting and click-jacking vulnerabilities in ABAP

Forceful Browsing Vulnerabilities

Learn to identify and prevent forceful browsing vulnerabilities in ABAP

Server Side Request Forgery Vulnerabilities (SSRF)

Learn to identify and prevent server-side request forgery vulnerabilities in ABAP

Proprietary Client Attack Vulnerabilties

Learn to identify and prevent ABAP vulnerabilities allowing the attack of proprietary clients.

Best Practices for Application Security Concepts

Best Practices for application security concepts

Fundamentals of Application Security Requirements Engineering

Learn to determine the security requirements of your business applications like an engineer.

Best Practices for Custom Interface Logging

Learn how to implement audit and tracing requirements in your ABAP application correctly.

Fundamentals of Cryptography in Business Systems

Get an overview of cryptography in SAP solutions.

Introduction to Cryptography for SAP HANA

Learn about the cryptographic protection capabilities of HANA

Overview of Identity Management and SSO

Learn about the central identity management and single-sign-on options for S/4HANA.

Overview of SAP Solution Manager Security Capabilities

Get an overview of how the SAP Solution Manager can help you to automate SAP security operations.

Fundamental Aspects of Code Security for ABAP Applications

Understand the security traits of ABAP applications.

Fundamental Threats to PaaS Cloud Applications

Know your PaaS security threats for the SAP Business Technology Platform

Overview of Protective Capabilities in SAP Cloud Foundry

Get an overview how SAP cloud foundry can help to secure your applications

Fundamentals of Node.JS code Security Flaws

Understand typical security flaws when you use Node.JS on the SAP Business Technology platform.

Fundamental Aspects of Code Security for Node.JS Applications

Learn how you can implemenat a more secure Node.JS app.

Best Practices of SAP Threat Modelling

Master SAP threat modelling

Common Attacks to the Software Supply Chain

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Managing and Troubleshooting S/4HANA User Authorization

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamental Threats to PaaS Cloud Applications

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Overview of Protective Capabilities in SAP Cloud Foundry

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Node.JS Code Security Flaws

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Best Practices to Apply Code Analysis Within Change and Release Management

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Assessing Cryptographic Systems

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Hardening Cryptographic Setups in Business Software

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of SAP Authentication Protocols

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Overview of SAP BTP Authentication and Authorisation Protocols

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Introduction to Hybrid Environment Authentication Scenarios in SAP BTP

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Introduction to SAP BTP Identity Authentication Service

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Introduction to the SAP BTP Identity & Authentication Provider Integration Options

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Managing Federated Identities

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Overview of the SAP BTP Authorisation Concept

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Introduction of managing SAP BTP Authorizations

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Testing SAP BTP Authorizations

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Cyber-Attack Kill Chains

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Security Operations Methods and Approaches

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Network Traffic Analysis

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Overview of Security Event Analysis Concepts and Terms

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Security Event Analysis

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Network Intrusion Detection for SAP

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.

Fundamentals of Security Incident Network Containment

Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.