Live Online Training
Identify and Neutralize the Bad Guys – An Introduction to Security Operations for Enterprise IT Environments Using SAP Technology

Don't miss this opportunity to enhance your knowledge and improve your incident detection and response skills. Join this live training designed for SAP technology experts and security professionals looking to expand their incident detection and response skills.
In this training, you will learn about the MITRE Attack framework as a tool for realistic attack simulation and response, including the triage process when addressing prioritized alarms or events. After the two half-day events, you will also be able to determine applicable deception and active countermeasures tactics for common adversary scenarios and recognize different security event sources across the OSI layer.
This includes how to analyze and filter network traffic information, identify suspicious patterns in network traffic, and understand the general terms and concepts of a security incident and event management.  
As a bonus, you will learn about typical security event sources for SAP systems and how to query them. On top of that, you will be able ask questions along the way, receive direct feedback, and participate in a ‘ask-anything’ session with your instructor. This training is perfect for anyone looking to improve their incident detection and response skills, especially in the context of SAP systems.

Duration

8 hours

Live instructor

Learners

Maximum 14 Learners

Access and Infrastructure

Certification

 Certificate Upon Completion

Price

€ 800
per Learner

Who’s a Good Fit

 SAP Basis Administrators
 SAP Security Consultant
 SOC Analysts
 Blue Teamers

A Taste of What You Will Learn:

  • You will learn the MITRE Attack framework as a mid-level approach to attack simulation and response
  • You will understand the triage process when addressing prioritized alarms or events
  • You will be able to determine applicable operation techniques for simple adversary scenarios and describe different security event sources across the OSI layer
  • You will learn how to analyse and filter network traffic information and identify suspicious patterns in network traffic
  • You will understand the general terms and concepts of a security incident and event management
  • You will be able to determine and implement simple correlations of security events, including alert thresholds based on examples
  • You will learn typical security event sources for SAP applications and infrastructure and how to access them

Course Information

Overview
Who's a Good Fit
Prerequisites
Practice Environment Tools

SAP Operations Line of Defense

  • SAP Basis Administrator
  • SAP Security Consultant

Information Security Line of Defense

  • Blue Teamers
  • SOC Analysts

Who Else Might Be A Good Fit

If you have a traditional ABAP® development background and are just beginning with Javascript this course is a great fit to help you understand JavaScript and CDS Views from a security point of view and enhance your capability to develop secure apps

NIST/NICE Cybersecurity Workforce Framework Work Roles

Work Role Title Work Role ID
SAP Cyber Defense Analyst PR-CDA-001
SAP Cyber Defense Incident Responder PR-CIR-001

Mandatory

  • You know the network OSI model
  • You know the common traits of the TCP protocol
  • You know the different kind of network devices and their use in an IP-based network
  • You can describe confidentiality, integrity, and availability principles

Recommended:

  • You're familiar with common network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth)
  • You know common controls related to the use, processing, storage, and transmission of data in a network such as firewalls, reverse proxies, and authentication.
  • You can perform simple conversions of data formats and encodings

Helpful:

  • You're familiar with the concepts of network flow analysis
  • You're know approaches to analysis application logs
  • Fundamental knowledge about SAP core technologies such as NetWeaver and HANA

SAP Security Training Overview

Number of Modules: 8
Duration: 2 days, 8 hours total, (Day 1, 9:00 – 13:00, Day 2, 9:00 - 13:00)
Class size: 7-14 participants per class
Investment: €800 per person (excluding taxes)
Software Version: Unrestricted
Instructor: Marco Hammel
Modules Covered in Training:
  • Fundamentals of Cyber-Attack Kill Chain
  • Fundamentals of Security Operations Methods and Approaches
  • Fundamentals of Network Traffic Analysis
  • Overview of Security Event Analysis Concepts and Terms
  • Fundamentals of Security Event Analysis
  • Fundamentals of network intrusion detection for SAP
  • Fundamentals of security incident network containment
*NO MONKEY SAP Security training content is referenced to existing standards for application security such as OWASP, NIST , and SAP recommendations.

Standard:

For this course you will use a lab environment hosted by us to practice. The lab provides access to an SAP S/4HANA© landscape consisting of two stages. You can access to environment by a virtual desktop system with all necessary tools preinstalled

In Addition You Will Need:

A HTML5 ready browser preferably Edge, Chrome, Firefox(optional) Zoom