eLearning Course Backlog
Fundamentals of On Premise Network Security Designs
Learn practical approaches to network security when designing your on-premise SAP network.
Security Overview of Hybrid Integration Scenarios for SAP
Learn how to protect your data and environment in SAP cloud to
on-premise integration scenarios.
Fundamentals of Network intrusion detection for SAP
Learn to identify attacks on your SAP via network intrusion detection.
Fundamentals of SAP Process Interaction Model
Learn how SAP application clusters work and how to protect the cluster management from compromisation.
Fundamentals of SAP Specific Operating System Hardening
Learn to harden your SAP's operating system sufficiently.
Fundamentals of Security Incident Network Containment
Learn what options you have to contain and respond to the attacker's movements in your SAP environment
Principals of RFC Gateway & Message Server hardening
Learn how to secure and harden the SAP RFC Gateway and Message Server components.
Best Practices of RFC Security Monitoring
Learn how you can monitor and inventory interfaces of the RFC protocol.
Best Practices of RFC Communication Hardening
Learn how to increase the protection level of the RFC protocol.
Introduction into SAP User Management & Authentication
Learn the basics of managing access and verifying SAP user identities.
Fundamental Attack Vectors to the SAP Standard
Learn what the commonly used attack vectors to SAP systems are.
Fundamental Attack Vectors to the SAP Application Lifecycle and Change Management
Learn what the commonly used software lifecycle attack vectors to SAP are.
Fundamental Attacks Vectors to the SAP Proprietary Clients
Understand how adversaries can attack your environment via commonly used SAP proprietary client software.
Overview of Advanced SAP data Security Features
Get an overview of the more advanced data protection concepts possible in SAP.
Fundamentals of SAP Interface and Configuration Monitoring
Learn how you can detect security events by monitoring SAP interfaces and configuration.
Introduction to Cryptography for SAP S4/HANA
Learn about the cryptographic features of S/4HANA.
Introduction to the SAP Authorization Concept
Understand how the concept of user authorisation works in SAP systems.
Fundamentals of Interface & Start Authorizations
Learn how to identify too excessive user permissions on interfaces and programs.
Fundamentals of Organizational & Structural Authorizations
Learn how to identify authorisation flaws in separating access between organisations in an SAP system.
Introduction into SAP Authorization Security Flaws
Learn about common user authorisation flaws in SAP systems.
Access & Authorization Tracing
Elevating privileges by assigning critical authorizations and impersonating legitimate users are common approaches by adversaries. You'll learn which logs and traces for user access and authorization changes are available in an SAP system and how you can access them to identify relevant events.
Best Practices to Minimize Attack Surface on Start Authorizations
Learn what features you can use to minimise SAP user start-authorisation to the needful.
Best Practices to Minimize Attack Surface on Remote Access Authorizations
Learn what features you can use to minimise SAP user remote access authorisation to the needful.
Fundamentals of Common Code Security Design Flaws
Learn to avoid the most common code security design flaws in ABAP.
Stored Procedures Injection Vulnerabilities
Learn to identify and prevent Stored Prceude injection vulnerabilities in ABAP
Trap- / Backdoors
Learn to identify trap- and backdoors in ABAP
Privilege Escalation Vulnerabilties
Learn to identify and prevent privilege escalation vulnerabilities in ABAP
Cross Site Request Forgery Vulnerabilities (XSRF)
Cross Site Scripting & Click Jacking Vulnerabilities (XSS)
Learn to identify and prevent cross-site scripting and click-jacking vulnerabilities in ABAP
Forceful Browsing Vulnerabilities
Learn to identify and prevent forceful browsing vulnerabilities in ABAP
Server Side Request Forgery Vulnerabilities (SSRF)
Learn to identify and prevent server-side request forgery vulnerabilities in ABAP
Proprietary Client Attack Vulnerabilties
Learn to identify and prevent ABAP vulnerabilities allowing the attack of proprietary clients.
Best Practices for Application Security Concepts
Best Practices for application security concepts
Fundamentals of Application Security Requirements Engineering
Learn to determine the security requirements of your business applications like an engineer.
Best Practices for Custom Interface Logging
Learn how to implement audit and tracing requirements in your ABAP application correctly.
Fundamentals of Cryptography in Business Systems
Get an overview of cryptography in SAP solutions.
Introduction to Cryptography for SAP HANA
Learn about the cryptographic protection capabilities of HANA
Overview of Identity Management and SSO
Learn about the central identity management and single-sign-on options for S/4HANA.
Overview of SAP Solution Manager Security Capabilities
Get an overview of how the SAP Solution Manager can help you to automate SAP security operations.
Fundamental Aspects of Code Security for ABAP Applications
Understand the security traits of ABAP applications.
Fundamental Threats to PaaS Cloud Applications
Know your PaaS security threats for the SAP Business Technology Platform
Overview of Protective Capabilities in SAP Cloud Foundry
Get an overview how SAP cloud foundry can help to secure your applications
Fundamentals of Node.JS code Security Flaws
Understand typical security flaws when you use Node.JS on the SAP Business Technology platform.
Fundamental Aspects of Code Security for Node.JS Applications
Learn how you can implemenat a more secure Node.JS app.
Best Practices of SAP Threat Modelling
Master SAP threat modelling
Common Attacks to the Software Supply Chain
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Managing and Troubleshooting S/4HANA User Authorization
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamental Threats to PaaS Cloud Applications
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Overview of Protective Capabilities in SAP Cloud Foundry
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Node.JS Code Security Flaws
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Best Practices to Apply Code Analysis Within Change and Release Management
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Assessing Cryptographic Systems
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Hardening Cryptographic Setups in Business Software
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of SAP Authentication Protocols
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Overview of SAP BTP Authentication and Authorisation Protocols
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Introduction to Hybrid Environment Authentication Scenarios in SAP BTP
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Introduction to SAP BTP Identity Authentication Service
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Introduction to the SAP BTP Identity & Authentication Provider Integration Options
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Managing Federated Identities
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Overview of the SAP BTP Authorisation Concept
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Introduction of managing SAP BTP Authorizations
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Testing SAP BTP Authorizations
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Cyber-Attack Kill Chains
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Security Operations Methods and Approaches
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Network Traffic Analysis
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Overview of Security Event Analysis Concepts and Terms
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Security Event Analysis
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Network Intrusion Detection for SAP
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.
Fundamentals of Security Incident Network Containment
Our training is designed to provide the skills in a practical approach. Our students' success is our best asset in showing the quality of our training.