eLearning
Fundamental Attack Vectors to the SAP Standard

In this course, you will learn how adversaries can attack SAP systems using common attack vectors ranging from taking advantage of initial configuration to more advanced exploitation techniques. Whether you're a security professional, SAP administrator, or IT manager, this course will provide the foundational understanding of the related threats to SAP systems and the skills to mitigate the corresponding risk. You'll understand practical strategies for security monitoring, applying updates and patches, utilizing authentication frameworks, and implementing robust infrastructure-level access controls.


Objectives

  You understand the common attack vectors adversaries use to target SAP systems

  You have an overview of the options to implement robust authentication mechanisms and additional access controls to prevent unauthorized access to sensitive SAP system services.

   You understand the crucial activities and strategies to patch SAP systems effectively.

 You have an overview of essential secure coding practices in the ABAP programming language to mitigate the risk of injection vulnerabilities.

 You know about the possible data protection measures in SAP systems for configuration management and encryption.

Duration

1 hour

Instructor

Course Access

24/7 all Year Round

Access and Infrastructure

Technical Requirements

Certification

 Certificate Upon Completion

Price

€ 149
per course

Prerequisites

 You have a fundamental understanding of the SAP technology ecosystem and the function of SAP technology for a business.
 You know how an SAP system landscape is operated and maintained.
 You understand the terms threat, vulnerability, and risk in the context of cyber security.
 You understand network protocol layer concepts such as the OSI or TCP model and how an SAP system provides services within a computer network.