Fundamentals of Assessing Security Controls and the Security Posture of SAP Systems - Webinar von NO MONKEY Security GmbH

A Comprehensive Leap into the Security Traits of Critical SAP Systems for Security Professionals

Inhalte

Finally, a course to demystify SAP for security professionals! In this Live Online Training, penetration testers and application security experts take a deep dive into the security traits of SAP technology and the organizations and processes running them in boot camp style. After an extensive four-day training, you can organize, plan and conduct assessments on critical SAP business applications in a gray-box approach resulting in a comprehensive description of the security posture of an SAP system. You will learn how to perform vulnerability assessments, code security reviews, access audits, penetration tests, and red-team engagements in an SAP landscape by providing crystal-clear findings and recommendations SAP organizations can relate to. This training is hands-on, structured with a mix of exercises, demonstrations and coaching. New knowledge and skills become directly applicable and easier to recall later. Access to a practice lab along with a ready-to-use set of SAP-specific and agnostic assessment tools provides you with a boilerplate for your future tool chain and SAP security intelligence sources.

Finally, a course to demystify SAP for security professionals! In this Live Online Training, penetration testers and application security experts take a deep dive into the security traits of SAP techno ...

Mehr Informationen >>

Lernziele

Learn how to conduct a comprehensive reconnaissance for SAP software installations on the internet or in a corporate network environment to identify targets and understand network protection measures

Understand common security issues related to the typical use of SAP business software applications to create more specific and practical advice to remediate or mitigate identified vulnerabilitiesI

dentify common vulnerabilities caused by insufficient hardening of SAP system components or their interaction and how they can be used to compromise a system completely

Learn the security traits of some SAP proprietary remote protocols and how an attacker can leverage them for lateral movement and exploitation

Take a journey through the typical roles in an SAP IT department to understand their security responsibilities and conflicts of interest to ask the right stakeholders about information or support required for an assessment or to exploit the organization's processes and traits like attackers do

Gain practical experience to identify and proof the exploit-ability of vulnerabilities without causing business disruption to implement a safe approach to assess the security state of your SAP environment

Understand the different options on how to defend an SAP system against the most common attacks and adversarial techniques by putting SAP-specific and agnostic protective measures in place

Learn how to conduct a comprehensive reconnaissance for SAP software installations on the internet or in a corporate network environment to identify targets and understand network protection measures

... Mehr Informationen >>

Zielgruppen

Penetration Tester or Red TeamerApplication Security ExpertBlue TeamerIT Security Auditor

Who Else Might Be A Good FitIf you have a traditional background in SAP operations and database administration and want to get into cybersecurity this course is a great fit to help you expand your existing skills with a security point of view

Penetration Tester or Red TeamerApplication Security ExpertBlue TeamerIT Security Auditor

Who Else Might Be A Good FitIf you have a traditional background in SAP operations and database administration ...

Mehr Informationen >>

Termine und Orte

SG-Seminar-Nr.: 7457862

Termine

  • 24.06.2024 - 27.06.2024

    Webinar

  • 23.09.2024 - 26.09.2024

    Webinar

  • 09.12.2024 - 12.12.2024

    Webinar

Seminare mit Termin haben Plätze verfügbar. Rechnung erfolgt durch Veranstalter. Für MwSt. Angabe auf den Termin klicken.

Jetzt buchen ›
Seminar merken ›

Semigator berücksichtigt

  • Frühbucher-Preise
  • Last-Minute-Preise
  • Gruppenkonditionen

und verfügt über Sonderkonditionen mit einigen Anbietern.

Der Anbieter ist für den Inhalt verantwortlich.

Veranstaltungsinformation

  • Webinar
  • Englisch
    • Teilnahmebestätigung
  • 32 h

Ihre Vorteile mehr erfahren

  • Anbietervergleich von über 1.500 Seminaranbietern
  • Vollständige Veranstaltungsinformationen
  • Schnellbuchung
  • Persönlicher Service