Identify and Neutralize the Bad Guys
An Introduction to Security Operations for Enterprise IT Environments Using SAP Technology.

The course also covers typical SAP security event sources and methods to query them effectively, ensuring a comprehensive understanding across OSI layers. With live instruction, participants can ask questions, receive immediate feedback, and engage in an “ask-anything” session to deepen their learning. This course is ideal for those ready to quickly and effectively detect and respond to threats in their SAP environments.
A Taste of What You Will Learn
- Learn the MITRE Attack framework as a mid-level approach to attack simulation and response
- Understand the triage process when addressing prioritized alarms or events
- Learn how to determine applicable operation techniques for simple adversary scenarios and describe different security event sources across the OSI layer
- Learn how to analyze and filter network traffic information and identify suspicious patterns in network traffic
- Understand the general terms and concepts of a security incident and event management
- Determine and implement simple correlations of security events, including alert thresholds based on examples
- Learn typical security event sources for SAP applications and infrastructure and how to access them
Who's a Good Fit
SAP Basis Administrator
SAP Security Consultant
Information Security Line of Defense
Blue Teamers
SOC Analysts
Who Else Might Be A Good Fit
If you have a traditional ABAP® development background and are just beginning with Javascript this course is a great fit to help you understand JavaScript and CDS Views from a security point of view and enhance your capability to develop secure apps.
NIST/NICE Cybersecurity Workforce Framework Work Roles
SAP Cyber Defense Analyst (PR-CDA-001)
SAP Cyber Defense Incident Responder (PR-CIR-001)
Prerequisits
You know the network OSI model.
You know the common traits of the TCP protocol.
You know the different kind of network devices and their use in an IP-based network.
You can describe confidentiality, integrity, and availability principles.
Recommended
You're familiar with common network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
You know common controls related to the use, processing, storage, and transmission of data in a network such as firewalls, reverse proxies, and authentication.
You can perform simple conversions of data formats and encodings.
Helpful
You're familiar with the concepts of network flow analysis
You're know approaches to analysis application logs
Fundamental knowledge about SAP core technologies such as NetWeaver and HANA
Practice Environment Tools
For this course you will use a lab environment hosted by us to practice. The lab provides access to an SAP S/4HANA© landscape consisting of two stages. You can access to environment by a virtual desktop system with all necessary tools preinstalled
In Addition You Will Need
A HTML5 ready browser preferably Edge, Chrome, Firefox(optional) Zoom
Book a Private Team Training
For teams of 7 or more - customize your learning experience.
Contact us today to book your session.
Other Learners Found These Trainings Helpful
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Get in Touch
Get Social


I am interested in learning more about purchasing multiple subscriptions!
Thank you for your vote!
Thank you for your vote!
Training Canceled