Introduction into SAP authorisation security flaws
Learn about common user authorisation flaws in SAP systems.
Security flaws by permissive authorizations can pose severe threats. They are a ubiquitous security challenge for SAP customers. To identify authorization security flaws, you'll learn how to determine the criticality of assigned authorizations and how to use the standard analytical tools to detect authorization flaws.
Start Free Demo
Interested in signing up for our e-learning courses, but don't know what to expect?! Now you can sign up for our free demo course. read moreLearn more about the NO MONKEY Security Matrix
The NO MONKEY Security Matrix combines the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF), and our own IPAC model (In... read moreVote for the Next E-Learning Course
To fit your needs, we continually expand our SAP security training offering with current cybersecurity topics. So let us know what’s interesting to you. read more