NO MONKEY ACADEMY Trainers & Authors
Become a Driving Force in Shaping the SAP Security Experts of Tomorrow
Makes an Impact in SAP Security!
New to Course Creation?
...No Problem!
Rest assured, we've taken significant steps to simplify the course creation journey. Even for first timers! While it may not be effortless, we are here to support you every step of the way, making the process as manageable and rewarding as possible.
Even if it's your first time, with NO MONKEY you can use your knowledge and skills to create impactful courses that empower learners in the field of SAP security.
Course Creation Support - We've Got Your Back!
Streamlined Process with Templates
Extensive Support Materials
Guidance from Seasoned Experts:
Personalised Coaching
User-Friendly Platform
Time-Management Support
Pssst...Want to Know a Great Reason to Join the NO MONKEY TEAM?
Your Expertise Matters: Compensation that Reflects Your Contribution
eLearning Authors
Live Online Trainers
Empower the Next Generation of SAP Security Professionals While Elevating Your Career to New Heights
Step 1
Reach Out to Us
Connect with our team to express your interest and showcase your qualifications. We can't wait to learn more about your expertise and how you can contribute to our thriving community of authors and trainers.
Step 2
Course Selection
Together, let's identify the perfect course topic that aligns with your expertise and meets the needs of our learners. Your knowledge is valuable, and we want to ensure your course makes a lasting impact on aspiring cybersecurity professionals.
Step 3
Confirm Contract & Get Started
Once all the formalities are complete, it's time to bring your ideas to life! We'll agree on compensation and sign the contract, ensuring a transparent and rewarding partnership. You'll receive all the support and materials you need to start creating your eLearning course or live online training.
Take the First Step - Start Creating Inspiring Courses Today!
Meet Our Core Team of Authors & Trainers
Marco Hammel
- 8+ years of expertise in educating, advising, and securing people, processes, and SAP technology.
- Focused on code and software pipeline security with a background as a seasoned software developer.
- CISSP certified cybersecurity expert with specialized knowledge in SAP technology.
Waseem Arjab
- 10+ years of hands-on experience as a cybersecurity professional with a diverse skill set.Proficient in red team activities, blue team activities, threat modeling, risk analysis, audit, and compliance.
- Holds prestigious certifications including CISSP, Open FAIR™, OSCP, ISO 27001 Lead Auditor, CEH, and CISCO CCNA, showcasing a commitment to expertise and excellence.
Wolfgang Steiger
- 20+ years experience in securing user access in SAP core technologies
- Trusted SAP access management adviser of DAX30 corporate
- SAP Authorization Specialist
Alexander Meier
- 5+ years experience in IT security consulting, cloud architecture, and SAP security consulting
- Security researcher with several published advisories on SAP security
Raschin Tavakoli
- 8+ years of experience in IT security consulting, penetration testing, and SAP security consulting
- Over 14 years of experience in software development
- Security researcher with several published advisories
Clemens Krüger
- Several years of experience with SAP
- SecurityCo-authored the book "Getting Started with SAP HANA", published by Rheinwerk Verlag in 2021
- Master's degree in Advanced Security & Digital Forensics
Jordan Santarsieri
- 14+ years of researching and diving deep into the into the ERP (SAP/Oracle) world to help teach organizations how to understand and improve cybersecurity
- Specializes in helping organizations, especially global Fortune-500 companies and defense contractors identify, analyze and mitigate vulnerabilities affecting ERP systems and business-critical applications
- Frequent speaker at international security conferences such as Black-Hat, Insomnihack, Code Blue, YSTS, Auscert, Sec-T, Rootcon, NanoSec, Hacker Halted, OWASP US, 8dot8, DragonJAR and Ekoparty
Have More Questions About Becoming an Author?
Find Answers Here!
Content Creation - eLearnings & Live Online Training
A: We believe that the best way to increase cybersecurity is by educating the Three Lines of Defense, focusing on establishing security as a bedrock within each line’s culture. When employees are taught how to secure a system, when learning and security become a part of the workplace culture, they are able to secure their SAP systems. We are looking to work with those who will help NO MONKEY ACADEMY make the cyber word a safer place by excelling cybersecurity knowledge across the globe.
Q: How do I become an author/instructor with NO MONKEY?
A: NO MONKEY ACADEMY is looking for authors and instructors who are interested in creating innovative, gamified content in the form of hour long eLearnings or leading live, online, interactive courses on SAP security solutions.
Q: What is an eLearning?
A: Authors create one-hour courses which include videos, interactive games, and occasional quizzes to make learning highly engaging. Each course falls within a distinct cross-section within the NO MONKEY Security Matrix.
Q: What is a Live Online Training?
A: Instructors lead Live Online Trainings which consist of small classes, where learners receive a personalized, high-quality education from one of our hand-picked SAP security experts. Live Online Trainings last 4 to 8 hours, include breakout sessions which allow learners to work in teams as they work to complete and solve interactive games and puzzles. Most importantly, your course will turn theory into practice by offering learners the opportunity to apply the skills they have learned on our own SAP training machine.
Q: Can I create an eLearning and also lead a Live Online Training?
A: Absolutely! Our security experts often enjoy creating both eLearning content and leading Live Online Trainings on a regular basis.
Q: What content is NO MONKEY looking for?
A: When it comes to selecting the content you want to create, choose what you are most passionate about. If it is not yet on our list, let us know if you think it should be. We invite new ideas and perspectives.
Q: What is the NO MONKEY Security Matrix?
A: The NO MONKEY Security Matrix is the basis for our courses and our classroom trainings. Click here to learn more about how NO MONKEY combines the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF), and our own IPAC Model (Integration, Platform, Access, Customization) to create a holistic governance model for application security in SAP.
Q: How do authors create eLearnings and Live Online Trainings with NO MONKEY?
A: NO MONKEY authors/trainers are granted access to our LMS and our Author’s Guide which lays out all of the steps needed to create a highly engaging, interactive, eLearning and/or Live Online Training.
Author & Trainer Compensation
A: Authors and instructors are encouraged to review our compensation model here. It outlines how authors and instructors are compensated for creating eLearnings and for leading Live Online Trainings.
NO MONKEY ACADEMY offers authors and instructors straight forward contracts that outline how we will work together as you create content or lead trainings which will change the way professionals and organizations protect business critical systems.