Open Training Session
Identify and Neutralize the Bad Guys – An Introduction to Security Operations for Enterprise IT Environments Using SAP Technology
This online training is designed for SAP technology experts and security professionals looking to improve their incident detection and response skills within their SAP Landscape. You will learn about the MITRE Attack framework as a tool for realistic attack simulation and response, including the triage process when addressing prioritized alarms or events. This includes how to analyze and filter network traffic information, identify suspicious patterns in network traffic, and understand the general terms and concepts of a security incident and event management. As a bonus, we will address typical security event sources for SAP systems and how to query them. Upon completion, you will be able to determine applicable deception and active countermeasures tactics for common adversary scenarios and recognize different security event sources across the OSI layer. The best part is you will be learning with a live instructor, which means you get the opportunity to pose questions along the way, receive direct feedback, and participate in an ‘ask-anything’ session to reinforce your knowledge. If you are ready to get ‘great’ at detecting the bad guys quickly and responding properly - this class is for you!
Price
€ 800per learner
Live instructor
Learners
Maximum 14 Learners
Duration
8 hours
Certification
Certificate Upon Completion
Start Date
7 October 2025
Who’s a Good Fit
A Taste of What You Will Learn:
-
Learn the MITRE Attack framework as a mid-level approach to attack simulation and response
-
Understand the triage process when addressing prioritized alarms or events
-
Learn how to determine applicable operation techniques for simple adversary scenarios and describe different security event sources across the OSI layer
-
Learn how to analyze and filter network traffic information and identify suspicious patterns in network traffic
-
Understand the general terms and concepts of a security incident and event management
-
Determine and implement simple correlations of security events, including alert thresholds based on examples
-
Learn typical security event sources for SAP applications and infrastructure and how to access them