SAP Threat Modeling - Identify and Address Potential Security Risks Before they Become a Problem - Webinar von NO MONKEY Security GmbH

Inhalte

SAP systems have unique characteristics and potential vulnerabilities that are distinctive to SAP technology. Learning to conduct threat modeling specifically for your landscape can significantly improve how you identify and prioritize threats and vulnerabilities and develop effective strategies to mitigate them. The course will help you better protect your organization from security incidents, reduce the impact of incidents that do occur, and meet compliance requirements. The group exercises are interactive, hands-on, and based on real-life examples, allowing participants to gain practical experience with SAP Security. It will cover modeling threats in a complex environment such as a hybrid SAP landscape consisting of SAP BTP applications, S/4HANA Solutions, or an on-premise SAP landscape consisting of legacy implementations. In addition, you will be immersed in the attacker’s and defender’s points of view. You will also gain insight into how potential attackers might approach your SAP system, what methods they might use to compromise it, then develop effective defensive strategies and controls to improve protection. To ensure that your threat modeling is effective and comprehensive, we will also highlight “best practices” for SAP threat modeling.

SAP systems have unique characteristics and potential vulnerabilities that are distinctive to SAP technology. Learning to conduct threat modeling specifically for your landscape can significantly impro ...

Mehr Informationen >>

Lernziele

Understand the fundamental concepts of threat modeling

Recognize how threat modeling can help you prioritize mitigation techniques and defense mechanisms

Learn how to implement threat modeling for your organization or customers

Analyze how attackers and penetration testers can map out attack vectors through real-life exercises

Identify critical paths across your threat model

Utilize a structured approach to threat modeling, such as the STRIDE methodology, to consider all potential threats and vulnerabilities

Identify critical assets in your SAP system, such as sensitive data, important business processes, and critical infrastructure components, to prioritize threat modeling efforts

Learn both offensive and defensive techniques for SAP threat modeling

Improve stakeholder involvement from across the organization, including business units, IT, and security teams, in the threat modeling process for a comprehensive understanding of potential threats and vulnerabilities to your SAP system

Understand the fundamental concepts of threat modeling

Recognize how threat modeling can help you prioritize mitigation techniques and defense mechanisms

Learn how to implement threat modeling for you ...

Mehr Informationen >>

Zielgruppen

Application Administrators Network AdministratorsSAP Security ConsultantsApplication Security ExpertsSecurity ArchitectsPenetration Tester or Red TeamerSOC SpecialistsIT Security Auditor

Who Else Might Be A Good FitIf you have a traditional background in SAP operations and database administration and want to get into cybersecurity this course is a great fit to help you expand your existing skills with a security point of view

Application Administrators Network AdministratorsSAP Security ConsultantsApplication Security ExpertsSecurity ArchitectsPenetration Tester or Red TeamerSOC SpecialistsIT Security Auditor

Who Else Migh ...

Mehr Informationen >>

Termine und Orte

Datum Uhrzeit Dauer Preis
Webinar
02.09.2024 09:00 - 13:00 Uhr 4 h Mehr Informationen > Jetzt buchen ›

SG-Seminar-Nr.: 7457865

Termine

  • 02.09.2024

    Webinar

Seminare mit Termin haben Plätze verfügbar. Rechnung erfolgt durch Veranstalter. Für MwSt. Angabe auf den Termin klicken.

Jetzt buchen ›
Seminar merken ›

Semigator berücksichtigt

  • Frühbucher-Preise
  • Last-Minute-Preise
  • Gruppenkonditionen

und verfügt über Sonderkonditionen mit einigen Anbietern.

Der Anbieter ist für den Inhalt verantwortlich.

Veranstaltungsinformation

  • Webinar
  • Englisch
    • Teilnahmebestätigung
  • 4 h

Ihre Vorteile mehr erfahren

  • Anbietervergleich von über 1.500 Seminaranbietern
  • Vollständige Veranstaltungsinformationen
  • Schnellbuchung
  • Persönlicher Service
Datum Uhrzeit Dauer Preis
Webinar
02.09.2024 09:00 - 13:00 Uhr 4 h Mehr Informationen > Jetzt buchen ›