Access & Authorization Tracing

Elevating privileges by assigning critical authorizations and impersonating legitimate users are common approaches by adversaries. You'll learn which logs and traces for user access and authorization changes are available in an SAP system and how you can access them to identify relevant events.

General Information

  • Each e-learning lasts 1 hour and costs one Kujambel Credit (or 100 Euro plus VAT)
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements

Access

  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains

Infrastructure

  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

We'll let you know when this course is ready

Please note that this e-learning module is not yet in production.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY