SAP systems have unique characteristics and potential vulnerabilities that are distinctive to SAP technology. Learning to conduct threat modeling specifically for your landscape can significantly improve how you identify and prioritize threats and vulnerabilities and develop effective strategies to mitigate them. The course will help you better protect your organization from security incidents, reduce the impact of incidents that do occur, and meet compliance requirements. The group exercises are interactive, hands-on, and based on real-life examples, allowing participants to gain practical experience with SAP Security. It will cover modeling threats in a complex environment such as a hybrid SAP landscape consisting of SAP BTP applications, S/4HANA Solutions, or an on-premise SAP landscape consisting of legacy implementations. In addition, you will be immersed in the attacker’s and defender’s points of view. You will also gain insight into how potential attackers might approach your SAP system, what methods they might use to compromise it, then develop effective defensive strategies and controls to improve protection. To ensure that your threat modeling is effective and comprehensive, we will also highlight “best practices” for SAP threat modeling.
SAP systems have unique characteristics and potential vulnerabilities that are distinctive to SAP technology. Learning to conduct threat modeling specifically for your landscape can significantly impro ...
Mehr Informationen >>Understand the fundamental concepts of threat modeling
Recognize how threat modeling can help you prioritize mitigation techniques and defense mechanisms
Learn how to implement threat modeling for your organization or customers
Analyze how attackers and penetration testers can map out attack vectors through real-life exercises
Identify critical paths across your threat model
Utilize a structured approach to threat modeling, such as the STRIDE methodology, to consider all potential threats and vulnerabilities
Identify critical assets in your SAP system, such as sensitive data, important business processes, and critical infrastructure components, to prioritize threat modeling efforts
Learn both offensive and defensive techniques for SAP threat modeling
Improve stakeholder involvement from across the organization, including business units, IT, and security teams, in the threat modeling process for a comprehensive understanding of potential threats and vulnerabilities to your SAP system
Understand the fundamental concepts of threat modeling
Recognize how threat modeling can help you prioritize mitigation techniques and defense mechanisms
Learn how to implement threat modeling for you ...
Mehr Informationen >>Application Administrators Network AdministratorsSAP Security ConsultantsApplication Security ExpertsSecurity ArchitectsPenetration Tester or Red TeamerSOC SpecialistsIT Security Auditor
Who Else Might Be A Good FitIf you have a traditional background in SAP operations and database administration and want to get into cybersecurity this course is a great fit to help you expand your existing skills with a security point of view
Application Administrators Network AdministratorsSAP Security ConsultantsApplication Security ExpertsSecurity ArchitectsPenetration Tester or Red TeamerSOC SpecialistsIT Security Auditor
Who Else Migh ...
Mehr Informationen >>Datum | Uhrzeit | Dauer | Preis | ||
---|---|---|---|---|---|
Webinar | |||||
02.09.2024 | 09:00 - 13:00 Uhr | 4 h | Mehr Informationen > | Jetzt buchen › |
Datum | Uhrzeit | Dauer | Preis | ||
---|---|---|---|---|---|
Webinar | |||||
02.09.2024 | 09:00 - 13:00 Uhr | 4 h | Mehr Informationen > | Jetzt buchen › |