SAP 10 Veranstaltungen

Verwandte Suchbegriffe: wird geladen ...

Fundamentals of Assessing Security Controls and the Security Posture of SAP Systems

Sponsored NO MONKEY Security GmbH

Finally, a course to demystify SAP for security professionals! In this Live Online Training, penetration testers and application security experts take a deep dive into the security traits of SAP technology and the organizations and processes running them in boot camp style.

PREFERRED

NO MONKEY Security GmbH

Welcome to the fundamentals of SAP remote services. In this class you will learn how to safeguard the most important network services for SAP applications. Minimizing the exposure of services is crucial to the security of software. The same applies f...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

Learn threat modeling and how to apply this exercise for SAP system landscapes. Threat modeling is an important exercise to prioritize security activities according to the organization's cyber threats. It is key when dealing with limited resources to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

This course covers the main security mechanisms that SAP provides as part of an SAP S/4HANA©system. S/4HANA©consists of two distinct components: the Application Server (ABAP) which contains the business logic, and the database (HANA) which stores the...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

FORUM Institut für Management GmbH (146)

- Prozessoptimierung bei der Abschlusserstellung (Fast Close) - Beschleunigung des Abschlussprozesses durch die SAP® Tools Schedule Manager und Closing Cockpit - Erstellung eines Rückstellungsspiegels mit SAP® - Abstimmung der Intercompany-Konten mit...

  • E-Learning
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. As a result of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As a developer or software security engineer, it's essential to know the security traits of the technology and tools used to create and run the software application. ABAP® is no different. Because of SAP's ABAP® product strategy and how specific prot...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert