Best Practices of SAP Threat Modelling

Master SAP threat modelling

Are you able to create and update threat models? But you don't know the specific threats and attack libraries relevant to SAP systems and applications? In this course, you'll learn to use SAP specific attack libraries and how you can incorporate them into your threat model. You'll also be able to determine threats specific to your organisation's customisation and integration scenarios.

General Information

  • Each e-learning lasts 1 hour and costs one Kujambel Credit (or 100 Euro plus VAT)
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements

Access

  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains

Infrastructure

  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

Waseem AjrabHead of SAP Security Advisory, NO MONKEY
  • Security professional with over seven years of experience
  • Involved in several areas of activities in cybersecurity, such as red team activities, blue team activities, audit, and compliance
  • Certified CISSP, Open FAIRTM, OSCP, ISO 27001 Lead Auditor, CEH, CISCO CCNA

We'll let you know when this course is ready

Please note that this e-learning module is not yet in production.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY