Fundamental attacks vectors to the SAP proprietary clients
Understand how adversaries can attack your environment via commonly used SAP proprietary client software.
SAP provides some proprietary clients for their software solutions for different purposes, from the end-user, data analyst to the system administrator, and developer. These clients come with different capabilities to interact with the user's personal computer operating system and have various security traits. You'll learn how and by what prerequisites attackers can use these proprietary clients to get a foothold into a corporate network or impersonate a user in an SAP system. You'll understand as a result what are the security specifics of SAP GUI, SAP Business Client, ABAP® Development, and SAP HANA® Tools compared to a web browser
Start Free Demo
Interested in signing up for our e-learning courses, but don't know what to expect?! Now you can sign up for our free demo course. read moreLearn more about the NO MONKEY Security Matrix
The NO MONKEY Security Matrix combines the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF), and our own IPAC model (In... read moreVote for the Next E-Learning Course
To fit your needs, we continually expand our SAP security training offering with current cybersecurity topics. So let us know what’s interesting to you. read more