Privilege Escalation Vulnerabilities
Learn to identify and prevent privilege escalation vulnerabilities in ABAP®
Like with all programming languages, ABAP®-based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify code flaws due to missing or erroneous control flow that can allow privilege escalation and what threats they can pose to the SAP system.
In this E-Learning course, you will:
- discover what remote services are taking information from your system
- determine the risk of the exposure from a specific service
- know which SAP specific protocols provide access to business logic
About the Author
Start Free Demo
Interested in signing up for our e-learning courses, but don't know what to expect?! Now you can sign up for our free demo course. read moreLearn more about the NO MONKEY Security Matrix
The NO MONKEY Security Matrix combines the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF), and our own IPAC model (In... read more