Overview of protective capabilities in SAP Cloud Foundry

Get an overview how SAP cloud foundry can help to secure your applications

SAP cloud foundry as an opinionated concept to develop, build and run applications includes various protective capabilities to make an application comply with security requirements. You'll get an overview of these protective mechanisms, their limitations, and default behaviour.

Completing this E-Learning course:

  • The learner knows the protective capabilities and their limitations of SAP cloud foundry.
  • The learner knows the data security features and their limitations of SAP cloud foundry
  • The learner can determine if you can implement a security requirement with SAP cloud foundry sufficiently

General Information

  • Each e-learning lasts 1 hour and costs 149 Euro plus VAT
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements


  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains


  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

Marco HammelCo-Founder and CTO, NO MONKEY
  • More than eight years in educating, advising, and securing people, processes, and SAP technology
  • With his experience as a software developer, the topic of code and software pipeline security is his main focus
  • CISSP certified cybersecurity expert with an SAP technology background
Fundamentals of Securing ABAP® Based Business Applications

We'll let you know when this course is ready

Please note that this e-learning module is not yet in production.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY