Course Information
- Available
- *The delivery and distribution of the certificate are subject to the policies and arrangements of the course provider.
Course Overview
SAP CyberSecurity. Learn how to protect the SAP system.
Description
Dive deep into the secrets of SAP Cyber Security. This course will empower the security consultants, IT professionals and SAP administrators to safeguard SAP environments that keep the crown jewels of most big companies.
We will begin with the basics. You will learn how the standard security processes of vulnerability management and threat detection can be implemented in the SAP world. Next you will learn how to properly design SAP architecture so that it fulfills the security requirements.
You will also learn about hardening of SAP products. That includes SAP WebDispatcher, RFC Gateway, configuration of security logs, UCON and many others. I will also go through several well known technical vulnerabilities and demonstrate why they are dangerous and how they can be remediated.
Here are the highlights of the course:
Section 1: Introduction
Section 2: Vulnerability Management in SAP (security SAP Notes)
Section 3: Threat Detection (SAP Enterprise Threat Detection)
Section 4: Secure SAP Architecture
Section 5: Passwords and Password Hashes
Section 6: RFC Security
Section 7: Security Logs
Section 8: WebDispatcher
Section 9: SAP GUI
Section 10: Remote Enabled FMs and UCON
Section 11: SAP Process Orchestration
Who this course is for:
Security consultants - you will learn how to translate high level security requirements into the SAP world
SAP Basis consultants - you will learn security concepts and methods to harden the SAP systems.
SAP Security and SAP Authorization consultants – you will learn the technical aspect of the SAP security.
SAP system owner and SAP Manager - you most likely you believe that your SAP system is secure. This training will help you to verify it and also challenge your teams.
Course Content
- 11 section(s)
- 52 lecture(s)
- Section 1 Introduction
- Section 2 Vulnerability Management
- Section 3 Threat Detection
- Section 4 Secure Architecture
- Section 5 Passwords and Password Hashes
- Section 6 RFC security
- Section 7 Security Logs
- Section 8 WebDispatcher
- Section 9 SAP GUI
- Section 10 Remote Enabled FMs and UCON
- Section 11 Process Orchestration
What You’ll Learn
- SAP CyberSecurity
- SAP Architecture
- SAP Security Hardening
- SAP Vulnerability Management
- SAP Threat Management
Skills covered in this course
Reviews
-
KKamilthetanker
Very informative training, I recommend to all Security professionals, well explained, in details.
-
RRené Wagner
Great course! The content is well-structured and easy to follow, even for complex SAP security topics. I especially appreciated the clear explanations and practical examples. Highly recommended for anyone working in SAP Basis or Security!
-
IIdo Abramov
Very good course ! It just would be nice to have more topics related to S/4 Security (Cloud related), Hana DB security, how to configure and manage SSO and Authentications, maybe other tools of SAP to check customized code and more.
-
AAmanda Arinete de Faria Gonçalves Ferreirinha
Excellent course.