SAP Cyber Security
4.3 (144 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,684 students enrolled

SAP Cyber Security

SAP Cyber Security beyond Segregation of Duties - learn how to earn a 6-digit salary in the new cybersecurity market
4.3 (144 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,683 students enrolled
Last updated 5/2016
English [Auto]
Current price: $34.99 Original price: $49.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3 hours on-demand video
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Answer to the question how SAP Cyber Security differs from SoD
  • 13 risks for different SAP Systems to speak the same language with owners
  • Technical details of ABAP, JAVA, HANA, Mobile platforms security
  • Recommendations on how to secure SAP Systems
  • 50-page guideline to analyze SAP Systems security
  • Basic IT Security background
  • Desire to learn more about the next big thing

Hey SAP Security wannabes,

Stop spending your time on old-school “SAP Security” trainings! Of course, 

segregation of duties and access control are important but we are in 2016 

now! All the top consulting companies now offer SAP Cyber Security services 

and CISOs from Fortune 2000 companies want to know more about REAL 

SAP Security, how hackers can compromise their systems and how to secure 


Cyber-Security market is estimated 70 billion dollars and expected to grow 170 

billion dollars by 2020. Taking into account that SAP is one of the most important 

systems, the SAP Cyber-security will be a big part of this pie. 

Before this course, this information was only available for a few companies. Now 

you can learn it from one of the world-known experts in this area and extend your 

knowledge in IT or SAP and be a much more competitive employee in the market.

For IT Security guys:

If you have no idea what SAP is but want to know why it's an important topic, this 

course is for you! Here are some noteworthy things:

Interest in SAP security is growing exponentially and the numerous 

attacks play a significant role in driving this interest. Take, for example, 

the recent breaches revealed in SAP system of a government contractor 

USIS. SAP systems and business-critical applications store the most critical 

corporate data that can at some point be used for espionage, sabotage or 

fraudulent purposes.

Analysts from different firms such as Gartner, IDC, 451Research, KuppingerCole and 

Qoucirca agreed on the significant importance of ERP security tests and 

lack of this functionality in traditional tools. 

Top consulting companies have already included ERP security services in 

their portfolio. 

But are you prepared for changes and do you have qualified expertise to 

address growing ERP Security market?


I will start with the history of SAP Cyber Security and why and how SAP Cyber 

security differs from IT Security. Then I will show the most critical risks for 

organizations. After that we will be able to understand details of all the SAP 

Systems such as ABAP or HANA and their vulnerabilities. To prove the importance, 

I will also show examples of the real attacks on SAP Systems. Finally, we will 

spend the rest of the time on learning how to secure SAP Systems from different 

angles from secure coding and SoD to vulnerability management and threat 


Who this course is for:
  • CISO's and Security managers
  • IT Security Engineers
  • SAP BASIS Administrators
  • SAP Security engineers
  • Cybersecurity Consultants / auditors
  • Penetration testers
Course content
Expand all 23 lectures 02:58:39
+ Introduction to SAP
4 lectures 38:54

Why i think that SAP Cyber-Security is important 

Preview 05:17
Lesson1 Quiz
3 questions
Introduction to SAP
Lesson2 Quiz
10 questions

Learn why people started to care about SAP Cyber Security and how the situation has changed since 2006

Preview 07:06
Lesson3 Quiz
2 questions

I’ll show you how SAP Security differs from traditional IT security and what kind of unique features and myths are there

SAP Security features
Lesson4 Quiz
4 questions
+ SAP Risks
1 lecture 21:30

the most comprehensive list of risks affecting different organizations across all industries that use SAP solutions from ERP to Portal

13 risks threaten SAP Applications
Lesson5 Quiz
7 questions
+ SAP Vulnerabilities
6 lectures 35:15

Learn how the number of SAP vulnerabilities reached 3000th barrier and will continue to grow

The growing number of SAP vulnerabilities
Lesson6 Quiz
2 questions

The most important notes about ABAP platform, its architecture, vulnerabilities, and trends

SAP NetWeaver ABAP platform Security
Lesson7 Quiz
3 questions

The most important notes about J2EE platform,  its architecture,  vulnerabilities, and trend

SAP NetWeaver J2EE platform Security
Lesson8 Quiz
2 questions

The most important notes about SAP Business Objects platform, its architecture, vulnerabilities, and trends

SAP NetWeaver Business Objects  platform Security
Lesson9 Quiz
2 questions

The most important notes about SAP HANA  platform security, its vulnerabilities, and trends

SAP HANA platform Security
Lesson10 Quiz
2 questions

The most important notes about SAP Mobile platform, its vulnerabilities, and trends

SAP Mobile platform Security
Lesson11 Quiz
3 questions
+ SAP Security Incidents
2 lectures 13:30

If you still think that SAP is not a juicy target for cyberattacks and there were no incidents, sorry, I’ll disappoint you. You will learn lessons from 5 the most interesting examples

Latest SAP Attacks and incidents
Lesson12 Quiz
5 questions

Learn The key takeaways from USIS Data breach - the biggest breach in the history of SAP Securityy

Preview 05:28
Lesson13 Quiz
3 questions
+ SAP Security landscape
4 lectures 46:51

learn what SAP Security is within less than 5 minutes

3 aspects of SAP Cyber Security
Lesson14 Quiz
3 questions

Introduction to Segregation of Duties, SOX compliance, and access control

Segregation of Duties
lesson15 quiz
4 questions

You will learn what kind of issues an uncontrolled customization of SAP programs can cause

Custom Code Security
lesson16 quiz
4 questions
Application Platform security
lesson17 quiz
5 questions
+ Securing SAP Systems
6 lectures 22:39

this chapter will shed a light on how you can secure your systems from all issues step by step

Securing SAP Systems
lesson18 quiz
2 questions

Learn how you can easily start SAP Cyber Security audit and what’s the difference between SAP Pentesting and SAP Security Audit & Vulnerability Assessment

SAP Security Assessment
lesson19 quiz
2 questions

Today your system is secure, tomorrow it won’t. Everything is changing - how can you survive in this environment?

SAP Security Monitoring

lesson20 quiz
4 questions

How to identify if your system was compromised and monitor malicious activity

SAP Threat Detection
lesson21 quiz
4 questions

Learn how to configure your workflow to automatically respond to attacks and quickly remediate vulnerabilities

Remediation and Response
lesson22 quiz
2 questions

Most important takeaways and lessons learnt

lesson23 quiz
2 questions