Fundamentals of interface & start authorisations
Learn how to identify too excessive user permissions on interfaces and programs.
Authorization to restrict users to start programs or remote enabled interfaces are the first line of the inner defense in an SAP system. You'll learn the fundamental approaches to identify the too excessive start and remote execution privileges and how to determine their attack surface.
Start Free Demo
Interested in signing up for our e-learning courses, but don't know what to expect?! Now you can sign up for our free demo course. read moreLearn more about the NO MONKEY Security Matrix
The NO MONKEY Security Matrix combines the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF), and our own IPAC model (In... read moreVote for the Next E-Learning Course
To fit your needs, we continually expand our SAP security training offering with current cybersecurity topics. So let us know what’s interesting to you. read more