Fundamental attacks vectors to the SAP application lifecycle and change management

Learn what the commonly used software lifecycle attack vectors to SAP are.

To protect against opponents, you need to understand how they think and act. You'll learn the fundamental attack vectors of cybercriminals when attacking SAP software via the application lifecycle and the change management. You'll know what threats can be realized by an opponent via software and customizing deployments, the opponent's prerequisites to be successful, and how you can detect these kinds of attacks.

General Information

  • Each e-learning lasts 1 hour and costs 149 Euro plus VAT
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements


  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains


  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

We'll let you know when this course is ready

Please note that this e-learning module is not yet in production.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY