Udemy

SAP CyberSecurity, SAP Technical Security Administration

Enroll Now
  • 1,376 Students
  • Updated 11/2025
  • Certificate Available
4.7
(58 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
4 Hour(s) 36 Minute(s)
Language
English
Taught by
Jacek Chodera
Certificate
  • Available
  • *The delivery and distribution of the certificate are subject to the policies and arrangements of the course provider.
Rating
4.7
(58 Ratings)

Course Overview

SAP CyberSecurity, SAP Technical Security Administration

SAP CyberSecurity. Learn how to protect the SAP system.

Description

Dive deep into the secrets of SAP Cyber Security. This course will empower the security consultants, IT professionals and SAP administrators to safeguard SAP environments that keep the crown jewels of most big companies.

We will begin with the basics. You will learn how the standard security processes of vulnerability management and threat detection can be implemented in the SAP world. Next you will learn how to properly design SAP architecture so that it fulfills the security requirements.

You will also learn about hardening of SAP products. That includes SAP WebDispatcher, RFC Gateway, configuration of security logs, UCON and many others. I will also go through several well known technical vulnerabilities and demonstrate why they are dangerous and how they can be remediated.

Here are the highlights of the course:

   Section 1: Introduction
   Section 2: Vulnerability Management in SAP (security SAP Notes)
   Section 3: Threat Detection (SAP Enterprise Threat Detection)
   Section 4: Secure SAP Architecture
   Section 5: Passwords and Password Hashes
   Section 6: RFC Security
   Section 7: Security Logs
   Section 8: WebDispatcher
   Section 9: SAP GUI
   Section 10: Remote Enabled FMs and UCON
   Section 11: SAP Process Orchestration

Who this course is for:

  • Security consultants - you will learn how to translate high level security requirements into the SAP world

  • SAP Basis consultants - you will learn security concepts and methods to harden the SAP systems.

  • SAP Security and SAP Authorization consultants – you will learn the technical aspect of the SAP security.

  • SAP system owner and SAP Manager - you most likely you believe that your SAP system is secure. This training will help you to verify it and also challenge your teams.

Course Content

  • 11 section(s)
  • 52 lecture(s)
  • Section 1 Introduction
  • Section 2 Vulnerability Management
  • Section 3 Threat Detection
  • Section 4 Secure Architecture
  • Section 5 Passwords and Password Hashes
  • Section 6 RFC security
  • Section 7 Security Logs
  • Section 8 WebDispatcher
  • Section 9 SAP GUI
  • Section 10 Remote Enabled FMs and UCON
  • Section 11 Process Orchestration

What You’ll Learn

  • SAP CyberSecurity
  • SAP Architecture
  • SAP Security Hardening
  • SAP Vulnerability Management
  • SAP Threat Management


Reviews

  • K
    Kamilthetanker
    5.0

    Very informative training, I recommend to all Security professionals, well explained, in details.

  • R
    René Wagner
    5.0

    Great course! The content is well-structured and easy to follow, even for complex SAP security topics. I especially appreciated the clear explanations and practical examples. Highly recommended for anyone working in SAP Basis or Security!

  • I
    Ido Abramov
    4.5

    Very good course ! It just would be nice to have more topics related to S/4 Security (Cloud related), Hana DB security, how to configure and manage SSO and Authentications, maybe other tools of SAP to check customized code and more.

  • A
    Amanda Arinete de Faria Gonçalves Ferreirinha
    5.0

    Excellent course.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed