Fundamental attacks vectors to the SAP standard

Learn what the commonly used attack vectors to SAP systems are.

To protect against opponents, you need to understand how they think and act. You'll learn what are the fundamental attack vectors of cybercriminals when attacking SAP systems. You'll understand what tactics are used to spoof user identities, tampering the system or data, disclose information, create a denial of service, or elevate privileges. These tactics work by exploiting common weaknesses and flaws of the architecture, design, and misconfiguration of an SAP environment. You'll get a fundamental understanding of the tactics and the pre-requisites of an attacker to succeed.

General Information

  • Each e-learning lasts 1 hour and costs 149 Euro plus VAT
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements


  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains


  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

We'll let you know when this course is ready

Please note that this e-learning module is not yet in production.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY