Fundamentals of security incident network containment

Learn what options you have to contain and respond to the attacker's movements in your SAP environment

The capability to detect attacks is of limited value when there is no competency in responding to the attack appropriately. The criticality of the SAP services' availability and integrity can easily yield more severe damage than the actual attack when the response is insufficient. You'll learn what you should consider when responding to an attack in an SAP landscape to contain the attack and minimize unintended side-effects as fundamental concepts of your response playbook.

General Information

  • Each e-learning lasts 1 hour and costs one Kujambel Credit (or 100 Euro plus VAT)
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements

Access

  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains

Infrastructure

  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

Waseem AjrabHead of SAP Security Advisory, NO MONKEY
  • Security professional with over seven years of experience
  • Involved in several areas of activities in cybersecurity, such as red team activities, blue team activities, audit, and compliance
  • Certified CISSP, Open FAIRTM, OSCP, ISO 27001 Lead Auditor, CEH, CISCO CCNA

We'll let you know when this course is ready

Please note that this e-learning module is not yet in production.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY