Instructor-Led Online Training
Fundamentals of Assessing Security Controls & the Security Posture of SAP Systems

Overview
-
Instructor: Waseem Ajrab
-
Duration: 4 Full Days, 32 hours total
-
Time: 09:00–13:00 and 14:00–18:00 CET
-
Language: English
-
Price: € 3,200 per learner
-
Certification: Upon Completion
A Comprehensive Leap Into the Security Traits of Critical SAP Systems for Security Professionals
Overview
Number of Modules: 32
Duration: 4 full-days, 36 hours total, (8:00 - 17:00 CET)
Class size: 7-14 participants per class
Investment: €3,200 per person (excluding taxes)
Software Version: Unrestricted
Instructor: Waseem Ajrab
Modules Covered in Online Class
- Fundamentals for Cybersecurity Professionals
- Overview of the Security Systems in SAP solutions
- Common Security Flaws of SAP applications and systems
- Common Security Flaws of an SAP System Landscape and Operations
*NO MONKEY SAP Security training content is referenced to existing standards for application security such as OWASP, NIST , and SAP recommendations.
Who's a Good Fit
- Penetration Tester or Red Teamer
- Application Security Expert
- Blue Teamer
- IT Security Auditor
Who Else Might Be A Good Fit
If you have a traditional background in SAP operations and database administration and want to get into cybersecurity this course is a great fit to help you expand your existing skills with a security point of view.
NIST/NICE Cybersecurity Workforce Framework Work Roles
- (SAP) Secure Software Assessor (SP-DEV-002)
- SAP Security Control Assessor (SP-RSK-002)
A Taste of What You Will Learn
- Learn how to conduct a comprehensive reconnaissance for SAP software installations on the internet or in a corporate network environment to identify targets and understand network protection measures
- Understand common security issues related to the typical use of SAP business software applications to create more specific and practical advice to remediate or mitigate identified vulnerabilities
- Identify common vulnerabilities caused by insufficient hardening of SAP system components or their interaction and how they can be used to compromise a system completely
- Learn the security traits of some SAP proprietary remote protocols and how an attacker can leverage them for lateral movement and exploitation
- Take a journey through the typical roles in an SAP IT department to understand their security responsibilities and conflicts of interest to ask the right stakeholders about information or support required for an assessment or to exploit the organization's processes and traits like attackers do
- Gain practical experience to identify and proof the exploit-ability of vulnerabilities without causing business disruption to implement a safe approach to assess the security state of your SAP environment
- Understand the different options on how to defend an SAP system against the most common attacks and adversarial techniques by putting SAP-specific and agnostic protective measures in place
Prerequisits
- Good knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defence-in-depth).
- General understanding of Security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA])
- General knowledge of Security models (e.g., Bell-LaPadula model, Biba integrity model, Clark- Wilson integrity model).
- Good understanding of Penetration testing principles, tools, and techniques
- Common understanding of common security controls related to the use, processing, storage, and transmission
- Good understanding of typical Application Security Risks (e.g. Open Web Application Security Project Top 10 list
- Familiarity of working with command line applications and Unix shells
Recommended
- You can conduct vulnerability scans and can recognize vulnerabilities in security systems.
- Familiarity with Apply confidentiality, integrity, and availability principles.
- Good understanding how to discern the protection needs (i.e., security controls) of information systems and networks.
- Familiarity with conducting application vulnerability assessments.
- Ability to Interpret vulnerability scanner results to identify vulnerabilities.
Helpful
- Fundamental knowledge about how to determine how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
- You know how to perform a target system analysis.
- General understanding of the meaning and use of critical SAP applications
Technical Prerequisites
For more information, click here.
Practice Environment Tools
For this course you will use a lab environment hosted by us to practice. The lab provides access to an SAP S/4HANA© landscape consisting of two stages. You can access to environment by a virtual desktop system with all necessary tools preinstalled
In Addition You Will Need
- A HTML5 ready browser preferably Edge, Chrome, Firefox
- Optional: Zoom client
Other Teams Found These Trainings Helpful
Get the Latest SAP Security Insights & Training Straight to Your Inbox
Be the first to know about new training dates, expert insights, and exclusive content — tailored for SAP security professionals.
Stay sharp. Stay secure. Sign up and never miss a critical update
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Get in Touch
Get Social


I am interested in learning more about purchasing multiple subscriptions!
Thank you for your vote!
Thank you for your vote!
Training Canceled