Live Online Training
SAP Threat Modeling - Identify and Address Potential Security Risks Before They Become a Problem
SAP systems have unique characteristics and potential vulnerabilities that are distinctive to SAP technology. Learning to conduct threat modeling specifically for your landscape can significantly improve how you identify and prioritize threats and vulnerabilities and develop effective strategies to mitigate them. The course will help you better protect your organization from security incidents, reduce the impact of incidents that do occur, and meet compliance requirements. The group exercises are interactive, hands-on, and based on real-life examples, allowing participants to gain practical experience with SAP Security. It will cover modeling threats in a complex environment such as a hybrid SAP landscape consisting of SAP BTP applications, S/4HANA Solutions, or an on-premise SAP landscape consisting of legacy implementations. In addition, you will be immersed in the attacker’s and defender’s points of view. You will also gain insight into how potential attackers might approach your SAP system, what methods they might use to compromise it, then develop effective defensive strategies and controls to improve protection. To ensure that your threat modeling is effective and comprehensive, we will also highlight “best practices” for SAP threat modeling.
€ 400
per learner
per learner
Maximum 14 Learners
4 hours
Certificate Upon Completion
11 December 2023
Who’s a Good Fit
A Taste of What You Will Learn:
-
Understand the fundamental concepts of threat modeling
-
Recognize how threat modeling can help you prioritize mitigation techniques and defense mechanisms
-
Learn how to implement threat modeling for your organization or customers
-
Analyze how attackers and penetration testers can map out attack vectors through real-life exercises
-
Identify critical paths across your threat model
-
Utilize a structured approach to threat modeling, such as the STRIDE methodology, to consider all potential threats and vulnerabilities
-
Identify critical assets in your SAP system, such as sensitive data, important business processes, and critical infrastructure components, to prioritize threat modeling efforts
-
Learn both offensive and defensive techniques for SAP threat modeling
-
Improve stakeholder involvement from across the organization, including business units, IT, and security teams, in the threat modeling process for a comprehensive understanding of potential threats and vulnerabilities to your SAP system