eLearning

Attack Surface Map (Recon/Enum)

How do you defend your SAP environment against adversaries when you don't know their tactics and techniques? To approach real cybersecurity threats, you need to understand how advanced persistent threats (APTs) and other adversaries operate and use this to your advantage. In this eLearning, you'll learn about the Cyber Kill Chain developed by Lockheed Martin as an intelligence-driven defense model focusing on the reconnaissance and enumeration phase as the critical part of every attack. You'll learn tactics to observe threat actors – intruders, APTs, penetration testers, bug bounty hunters, and others- and use this information to create an SAP Attack Surface Map. Uncovering entry points for further attack vectors allows you to stay one step ahead of attackers and develop appropriate defense measures.

Objectives

 Learn how to find SAP systems and services from External and Internal network perimeters.

 
Learn how adversaries use passive (recon) and active (enum) techniques and how you can use these techniques for your defense.

 Know the toolsets to conduct reconnaisance and enumeration targeting SAP systems.

 Learn to create an SAP Attack Surface Map with reconnaisance and enumeration.

 Understand how you can reduce risk by making reconnaisance and enumeration more challenging with adjusting your defense.

Duration

1 hour

Instructor

Ivan Nagornov

Course Access

24/7 all Year Round

Access and Infrastructure

Technical Requirements

Certification

 Certificate Upon Completion

Price

€ 149
per course


Prerequisites

 You have a basic understanding of host services and interfaces.

 You have a fundamental understanding of network security concepts.

 You have basic knowledge of the functioning of IP networks.

 You know some of the most important SAP network services.