Best Practices of SAP Threat Modelling
Master SAP threat modelling
Are you able to create and update threat models? But you don't know the specific threats and attack libraries relevant to SAP systems and applications? In this course, you'll learn to use SAP specific attack libraries and how you can incorporate them into your threat model. You'll also be able to determine threats specific to your organisation's customisation and integration scenarios.
Start Free Demo
Interested in signing up for our e-learning courses, but don't know what to expect?! Now you can sign up for our free demo course. read moreLearn more about the NO MONKEY Security Matrix
The NO MONKEY Security Matrix combines the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF), and our own IPAC model (In... read moreVote for the Next E-Learning Course
To fit your needs, we continually expand our SAP security training offering with current cybersecurity topics. So let us know what’s interesting to you. read more