Gain an overview of how the current threat situation in SAP systems is developing and learn how to check your SAP system for typical security vulnerabilities. This four-hour training begins by bringing you up-to-date on the most current attack vectors being implemented in the business world and IT landscapes. Following this overview, you will learn how to gain a comprehensive assessment of the current security status of your SAP system without performing an elaborate pentest or audit. Finally, you will learn to set up a playbook for your SAP system and its security needs. The playbook is focused primarily on determining security checks in SAP system landscapes and is based on the BSI guideline APP 4.3 SAP ERP from the German Federal Office for Information Security. These contain the minimum requirements for a hardened and protected SAP system.
Gain an overview of how the current threat situation in SAP systems is developing and learn how to check your SAP system for typical security vulnerabilities. This four-hour training begins by bringing ...
Mehr Informationen >>Gain an overview of the current SAP threat situation and identify the most important components for the protection of SAP systems
Gain insight into critical SAP security topics and learn general SAP security measures
Learn how to quickly check SAP systems for basic security and mitigate the most critical SAP security vulnerabilities
Learn how to test all important components of an SAP system with test guidelines in accordance with BSI
Gain an overview of the current SAP threat situation and identify the most important components for the protection of SAP systems
Gain insight into critical SAP security topics and learn general SAP s ...
Mehr Informationen >>Application Security ExpertsBlue TeamersSAP Basis AdministratorsSAP Security AdministratorsSAP System OwnersSAP IT Auditors
Who Else Might Be a Good FitThe target group is all users who need to carry out a formal evaluation of SAP systems without having to go through the effort of a revision or an extensive pen test. Essential methods are described here using the example of the minimum requirements of the BSI guideline and translated into an action guideline.
Application Security ExpertsBlue TeamersSAP Basis AdministratorsSAP Security AdministratorsSAP System OwnersSAP IT Auditors
Who Else Might Be a Good FitThe target group is all users who need to carry ...
Mehr Informationen >>Datum | Dauer | Preis |
---|