Fundamentals of network intrusion detection for SAP

Learn to identify attacks on your SAP via network intrusion detection.

A mix of standardized and proprietary application and management protocols and gateway systems in an SAP system landscape creates difficulties for intrusion detection on the network level what you can do to detect living off the land approaches and protocol-specific attacks in an SAP network.

Completing this E-Learning course:

  • Understand common network attacks facing SAP Systems
  • Hardware used in network architecture and their proper placement
  • Basic traffic analysis in SAP environments and identify the common network behavior
  • Understand the tools and concepts of network forensics

General Information

  • Each e-learning lasts 1 hour and costs one Kujambel Credit (or 100 Euro plus VAT)
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements

Access

  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains

Infrastructure

  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

Waseem AjrabHead of SAP Security Advisory, NO MONKEY
  • Security professional with over seven years of experience
  • Involved in several areas of activities in cybersecurity, such as red team activities, blue team activities, audit, and compliance
  • Certified CISSP, Open FAIRTM, OSCP, ISO 27001 Lead Auditor, CEH, CISCO CCNA

We'll let you know when this course is ready

Please note that this e-learning module is currently in production and will be available soon.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY