SQL Injection Vulnerabilities

Like with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify SQL injection vulnerabilities in their different ABAP® code variations and what threats they can pose to the SAP system.


 What are the risks of SQL injection vulnerabilities in SAP ABAP® systems

 How to check ABAP® code for this kind of vulnerabilities

 How attackers can misuse these vulnerabilities

 How to mitigate the risks of dynamic database access of ABAP® applications

Empty space, drag to resize

1 hour


Course Access

24/7 - 365

Access and Infrastructure

 Technical Requirements


 Certificate Upon Completion


149 € per course


  • Read & Understand simple ABAP® implementations
  • Know the modularisation concept of ABAP®
  • Know the general frameworks for input processing
  • Know the fundamentals of software applications interacting with database systems