SAP Cyber Security

SAP Cyber Security beyond Segregation of Duties - learn how to earn a 6-digit salary in the new cybersecurity market
4.2 (47 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,092 students enrolled
70% off
Take This Course
  • Lectures 23
  • Length 3 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2016 English

Course Description

Hey SAP Security wannabes,

Stop spending your time on old-school “SAP Security” trainings! Of course, 

segregation of duties and access control are important but we are in 2016 

now! All the top consulting companies now offer SAP Cyber Security services 

and CISOs from Fortune 2000 companies want to know more about REAL 

SAP Security, how hackers can compromise their systems and how to secure 


Cyber-Security market is estimated 70 billion dollars and expected to grow 170 

billion dollars by 2020. Taking into account that SAP is one of the most important 

systems, the SAP Cyber-security will be a big part of this pie. 

Before this course, this information was only available for a few companies. Now 

you can learn it from one of the world-known experts in this area and extend your 

knowledge in IT or SAP and be a much more competitive employee in the market.

For IT Security guys:

If you have no idea what SAP is but want to know why it's an important topic, this 

course is for you! Here are some noteworthy things:

Interest in SAP security is growing exponentially and the numerous 

attacks play a significant role in driving this interest. Take, for example, 

the recent breaches revealed in SAP system of a government contractor 

USIS. SAP systems and business-critical applications store the most critical 

corporate data that can at some point be used for espionage, sabotage or 

fraudulent purposes.

Analysts from different firms such as Gartner, IDC, 451Research, KuppingerCole and 

Qoucirca agreed on the significant importance of ERP security tests and 

lack of this functionality in traditional tools. 

Top consulting companies have already included ERP security services in 

their portfolio. 

But are you prepared for changes and do you have qualified expertise to 

address growing ERP Security market?


I will start with the history of SAP Cyber Security and why and how SAP Cyber 

security differs from IT Security. Then I will show the most critical risks for 

organizations. After that we will be able to understand details of all the SAP 

Systems such as ABAP or HANA and their vulnerabilities. To prove the importance, 

I will also show examples of the real attacks on SAP Systems. Finally, we will 

spend the rest of the time on learning how to secure SAP Systems from different 

angles from secure coding and SoD to vulnerability management and threat 


What are the requirements?

  • Basic IT Security background
  • Desire to learn more about the next big thing

What am I going to get from this course?

  • Answer to the question how SAP Cyber Security differs from SoD
  • 13 risks for different SAP Systems to speak the same language with owners
  • Technical details of ABAP, JAVA, HANA, Mobile platforms security
  • Recommendations on how to secure SAP Systems
  • 50-page guideline to analyze SAP Systems security

Who is the target audience?

  • CISO's and Security managers
  • IT Security Engineers
  • SAP BASIS Administrators
  • SAP Security engineers
  • Cybersecurity Consultants / auditors
  • Penetration testers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction to SAP

Why i think that SAP Cyber-Security is important 

Lesson1 Quiz
3 questions
Introduction to SAP
Lesson2 Quiz
10 questions

Learn why people started to care about SAP Cyber Security and how the situation has changed since 2006

Lesson3 Quiz
2 questions

I’ll show you how SAP Security differs from traditional IT security and what kind of unique features and myths are there

Lesson4 Quiz
4 questions
Section 2: SAP Risks

the most comprehensive list of risks affecting different organizations across all industries that use SAP solutions from ERP to Portal

Lesson5 Quiz
7 questions
Section 3: SAP Vulnerabilities

Learn how the number of SAP vulnerabilities reached 3000th barrier and will continue to grow

Lesson6 Quiz
2 questions

The most important notes about ABAP platform, its architecture, vulnerabilities, and trends

Lesson7 Quiz
3 questions

The most important notes about J2EE platform,  its architecture,  vulnerabilities, and trend

Lesson8 Quiz
2 questions

The most important notes about SAP Business Objects platform, its architecture, vulnerabilities, and trends

Lesson9 Quiz
2 questions

The most important notes about SAP HANA  platform security, its vulnerabilities, and trends

Lesson10 Quiz
2 questions

The most important notes about SAP Mobile platform, its vulnerabilities, and trends

Lesson11 Quiz
3 questions
Section 4: SAP Security Incidents

If you still think that SAP is not a juicy target for cyberattacks and there were no incidents, sorry, I’ll disappoint you. You will learn lessons from 5 the most interesting examples

Lesson12 Quiz
5 questions

Learn The key takeaways from USIS Data breach - the biggest breach in the history of SAP Securityy

Lesson13 Quiz
3 questions
Section 5: SAP Security landscape

learn what SAP Security is within less than 5 minutes

Lesson14 Quiz
3 questions

Introduction to Segregation of Duties, SOX compliance, and access control

lesson15 quiz
4 questions

You will learn what kind of issues an uncontrolled customization of SAP programs can cause

lesson16 quiz
4 questions
Application Platform security
lesson17 quiz
5 questions
Section 6: Securing SAP Systems

this chapter will shed a light on how you can secure your systems from all issues step by step

lesson18 quiz
2 questions

Learn how you can easily start SAP Cyber Security audit and what’s the difference between SAP Pentesting and SAP Security Audit & Vulnerability Assessment

lesson19 quiz
2 questions

Today your system is secure, tomorrow it won’t. Everything is changing - how can you survive in this environment?

4 questions


How to identify if your system was compromised and monitor malicious activity

lesson21 quiz
4 questions

Learn how to configure your workflow to automatically respond to attacks and quickly remediate vulnerabilities

lesson22 quiz
2 questions

Most important takeaways and lessons learnt

lesson23 quiz
2 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Alexander Polyakov, CTO, SAP Security Evangelist

CTO of ERPScan. President of, an organization focused on enterprise application cyber security. He has been recognized as R&D Professional of the Year by 2013 Hot Companies and Entrepreneur of the Year at 2013 Golden Bridge Awards. His expertise covers the security of enterprise business-critical software like ERP, CRM, SRM, and industry specific solutions from SAP and Oracle.

He has published 12 whitepapers on SAP security, and they include the golden award-winning “SAP Security in Figures” at the Global Excellence Awards by InfoSecurity Product Guide. It is the first research ever about the current situation of SAP security.

Alexander presented his research on SAP Cyber Security at more than 60 conferences held in more than 20 countries across all continents. He has held customized trainings for the CISOs of Fortune 2000 companies, including private trainings for SAP SE.

Alexander is engaged in creating ERPScan Security Monitoring Suite for SAP, an internationally acclaimed corporate solution, covering all areas of SAP security. His work with SAP Product Security Response Team started with finding vulnerabilities, with more than 200 issues discovered, it has led to an official partnership with SAP SE.

Ready to start learning?
Take This Course