Instructor-Led Online Training
SAP Security Crash Course for Cybersecurity Professionals

Overview
-
Instructor: Waseem Ajrab
-
Duration: 4 Full Days, 32 hours total
-
Time: 09:00–13:00 and 14:00–18:00 CET
-
Language: English
-
Price: € 3,200 per learner
-
Certification: Upon Completion
Protect Your Organization's Critical SAP Systems with Confidence
Overview
Number of Modules: 32
Duration: 4 full-days, 32 hours total, (09:00 - 13:00, 14:00 - 18:00 CET)
Class Size: 7-14 participants per class
Investment: €3200 per person (excluding taxes)
Software Version: Unrestricted
Instructor: Waseem Ajrab
Modules Covered in Online Class
- Understanding SAP Security Fundamentals
- SAP Proprietary Network Security
- Concepts of Hardening SAP Systems
- Introduction to Secure Interfaces
- Monitoring and Detecting Threats in an SAP Environment
- Hands-on Exercise in Identifying an SAP Attack Surface
*NO MONKEY SAP Security training content is referenced to existing standards for application security such as OWASP, NIST , and SAP recommendations.Accordion Description
Who’s a Good Fit
- Information Security Leaders
- Information Security Analysis
- Cyber Defense
- Incident Responders
- SOC Analysts
What You Will Learn
- Core SAP Security Principles: Start by building a strong foundation in SAP security. This module introduces SAP system architecture and its critical components, helping you understand how various security teams contribute to safeguarding business-critical information. Explore user authentication methods, authorization concepts, and key SAP security controls. Additionally, learn about data encryption strategies, the role of staging and software distribution, and the importance of patch and system management tools for secure and efficient operations.
- SAP Proprietary Network Security: Dive into the unique aspects of SAP’s network infrastructure and learn how to secure it effectively. This section focuses on applying security measures across SAP communication channels, including network segmentation and secure communication protocols. You’ll also explore strategies to fortify external interfaces, ensuring the protection of sensitive SAP data and minimizing the attack surface posed by third-party integrations.
- Concepts of Hardening SAP Systems: Understand the foundational principles of hardening SAP systems through a layered security approach. This module covers key techniques for securing SAP services and protocols to reduce vulnerabilities. Gain insights into monitoring and addressing SAP security baselines, and explore how these baselines contribute to maintaining a mature security posture. Learn the essentials of incident response planning, emphasizing how proactive controls can enhance your readiness to respond to emerging threats.
- Introduction to Secure Interfaces: This module provides an overview of the various types of interfaces that SAP systems connect to, both internal and external, which can pose security risks. You will explore authentication mechanisms used to secure these connections and learn best practices for safeguarding interfaces and third-party integrations. This includes enforcing secure communication protocols and implementing access control measures. Additionally, you will learn the capabilities available to detect and respond to threats, helping you develop the skills needed to monitor these connections effectively and mitigate potential risks.
- Monitoring and Detecting Threats in an SAP Environment: Equip yourself with the skills to identify and mitigate threats within SAP environments. This module emphasizes the importance of active monitoring, teaching you how to detect suspicious activities and respond quickly to incidents.
- Hands-On Exercise: Identifying SAP Attack Surfaces: Apply your knowledge in an interactive session by dissecting a real-world SAP architecture to identify potential threats. Implement targeted security controls and develop strategies to mitigate risks effectively.
Prerequisites
N/A
Recommended
- An understanding of the network OSI model.
- An understanding of the TCP protocol and traits.
- Different network devices and their use in an IP-based network.
- Network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Common controls related to the use, processing, storage, and transmission of data in a network, such as firewalls, reverse proxies, and authentication.
Helpful
N/A
Practice Environment Tools
For this course, you will conduct hands-on practice defining the threat landscape of an SAP environment. You will be assigned to individual groups to work on exercises based on each module.
In addition you will need
HTML 5-ready Browser, preferably Edge, Chrome, or Firefox (Optional) Zoom client
Other Teamers Found These Trainings Helpful
Get the Latest SAP Security Insights & Training Straight to Your Inbox
Be the first to know about new training dates, expert insights, and exclusive content — tailored for SAP security professionals.
Stay sharp. Stay secure. Sign up and never miss a critical update
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Headline with SEO related keywords for the current page
Can't find the exact course you're looking for in our Live Online Training catalog? No worries! At No Monkey Academy, we pride ourselves on offering tailored training solutions to meet your organization's unique needs and skill gaps. Whether it's a specialized topic or a specific skill set you require, our expert instructors are here to craft a custom-made training that perfectly aligns with your goals. With our tailored approach, you'll have the opportunity to address your team's specific challenges and foster skill development precisely where it's needed most. Don't settle for anything less than the perfect fit - experience the power of personalized learning with us!
Get in Touch
Get Social


I am interested in learning more about purchasing multiple subscriptions!
Thank you for your vote!
Thank you for your vote!
Training Canceled