SAP Cyber Security
4.2 (65 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,233 students enrolled
Wishlisted Wishlist

Please confirm that you want to add SAP Cyber Security to your Wishlist.

Add to Wishlist

SAP Cyber Security

SAP Cyber Security beyond Segregation of Duties - learn how to earn a 6-digit salary in the new cybersecurity market
Best Seller
4.2 (65 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,233 students enrolled
Last updated 5/2016
English
Current price: $10 Original price: $50 Discount: 80% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Answer to the question how SAP Cyber Security differs from SoD
  • 13 risks for different SAP Systems to speak the same language with owners
  • Technical details of ABAP, JAVA, HANA, Mobile platforms security
  • Recommendations on how to secure SAP Systems
  • 50-page guideline to analyze SAP Systems security
View Curriculum
Requirements
  • Basic IT Security background
  • Desire to learn more about the next big thing
Description

Hey SAP Security wannabes,

Stop spending your time on old-school “SAP Security” trainings! Of course, 

segregation of duties and access control are important but we are in 2016 

now! All the top consulting companies now offer SAP Cyber Security services 

and CISOs from Fortune 2000 companies want to know more about REAL 

SAP Security, how hackers can compromise their systems and how to secure 

them.

Cyber-Security market is estimated 70 billion dollars and expected to grow 170 

billion dollars by 2020. Taking into account that SAP is one of the most important 

systems, the SAP Cyber-security will be a big part of this pie. 

Before this course, this information was only available for a few companies. Now 

you can learn it from one of the world-known experts in this area and extend your 

knowledge in IT or SAP and be a much more competitive employee in the market.

For IT Security guys:

If you have no idea what SAP is but want to know why it's an important topic, this 

course is for you! Here are some noteworthy things:

Interest in SAP security is growing exponentially and the numerous 

attacks play a significant role in driving this interest. Take, for example, 

the recent breaches revealed in SAP system of a government contractor 

USIS. SAP systems and business-critical applications store the most critical 

corporate data that can at some point be used for espionage, sabotage or 

fraudulent purposes.

Analysts from different firms such as Gartner, IDC, 451Research, KuppingerCole and 

Qoucirca agreed on the significant importance of ERP security tests and 

lack of this functionality in traditional tools. 

Top consulting companies have already included ERP security services in 

their portfolio. 

But are you prepared for changes and do you have qualified expertise to 

address growing ERP Security market?


Agenda

I will start with the history of SAP Cyber Security and why and how SAP Cyber 

security differs from IT Security. Then I will show the most critical risks for 

organizations. After that we will be able to understand details of all the SAP 

Systems such as ABAP or HANA and their vulnerabilities. To prove the importance, 

I will also show examples of the real attacks on SAP Systems. Finally, we will 

spend the rest of the time on learning how to secure SAP Systems from different 

angles from secure coding and SoD to vulnerability management and threat 

detection.

Who is the target audience?
  • CISO's and Security managers
  • IT Security Engineers
  • SAP BASIS Administrators
  • SAP Security engineers
  • Cybersecurity Consultants / auditors
  • Penetration testers
Compare to Other Cyber Security Courses
Curriculum For This Course
23 Lectures
02:58:39
+
Introduction to SAP
4 Lectures 38:54

Why i think that SAP Cyber-Security is important 

Preview 05:17

Lesson1 Quiz
3 questions

Introduction to SAP
17:01

Lesson2 Quiz
10 questions

Learn why people started to care about SAP Cyber Security and how the situation has changed since 2006

Preview 07:06

Lesson3 Quiz
2 questions

I’ll show you how SAP Security differs from traditional IT security and what kind of unique features and myths are there

SAP Security features
09:30

Lesson4 Quiz
4 questions
+
SAP Risks
1 Lecture 21:30

the most comprehensive list of risks affecting different organizations across all industries that use SAP solutions from ERP to Portal

13 risks threaten SAP Applications
21:30

Lesson5 Quiz
7 questions
+
SAP Vulnerabilities
6 Lectures 35:15

Learn how the number of SAP vulnerabilities reached 3000th barrier and will continue to grow

The growing number of SAP vulnerabilities
02:08

Lesson6 Quiz
2 questions

The most important notes about ABAP platform, its architecture, vulnerabilities, and trends

SAP NetWeaver ABAP platform Security
12:46

Lesson7 Quiz
3 questions

The most important notes about J2EE platform,  its architecture,  vulnerabilities, and trend

SAP NetWeaver J2EE platform Security
03:48

Lesson8 Quiz
2 questions

The most important notes about SAP Business Objects platform, its architecture, vulnerabilities, and trends

SAP NetWeaver Business Objects  platform Security
04:25

Lesson9 Quiz
2 questions

The most important notes about SAP HANA  platform security, its vulnerabilities, and trends

SAP HANA platform Security
05:02

Lesson10 Quiz
2 questions

The most important notes about SAP Mobile platform, its vulnerabilities, and trends

SAP Mobile platform Security
07:06

Lesson11 Quiz
3 questions
+
SAP Security Incidents
2 Lectures 13:30

If you still think that SAP is not a juicy target for cyberattacks and there were no incidents, sorry, I’ll disappoint you. You will learn lessons from 5 the most interesting examples

Latest SAP Attacks and incidents
08:02

Lesson12 Quiz
5 questions

Learn The key takeaways from USIS Data breach - the biggest breach in the history of SAP Securityy

Preview 05:28

Lesson13 Quiz
3 questions
+
SAP Security landscape
4 Lectures 46:51

learn what SAP Security is within less than 5 minutes

3 aspects of SAP Cyber Security
05:37

Lesson14 Quiz
3 questions

Introduction to Segregation of Duties, SOX compliance, and access control

Segregation of Duties
15:41

lesson15 quiz
4 questions

You will learn what kind of issues an uncontrolled customization of SAP programs can cause

Custom Code Security
10:28

lesson16 quiz
4 questions

Application Platform security
15:05

lesson17 quiz
5 questions
+
Securing SAP Systems
6 Lectures 22:39

this chapter will shed a light on how you can secure your systems from all issues step by step

Securing SAP Systems
02:10

lesson18 quiz
2 questions

Learn how you can easily start SAP Cyber Security audit and what’s the difference between SAP Pentesting and SAP Security Audit & Vulnerability Assessment

SAP Security Assessment
05:26

lesson19 quiz
2 questions

Today your system is secure, tomorrow it won’t. Everything is changing - how can you survive in this environment?

SAP Security Monitoring
05:36

lesson20 quiz
4 questions

How to identify if your system was compromised and monitor malicious activity

SAP Threat Detection
02:09

lesson21 quiz
4 questions

Learn how to configure your workflow to automatically respond to attacks and quickly remediate vulnerabilities

Remediation and Response
02:53

lesson22 quiz
2 questions

Most important takeaways and lessons learnt

Conclusion
04:25

lesson23 quiz
2 questions
About the Instructor
Alexander Polyakov
4.2 Average rating
64 Reviews
1,233 Students
1 Course
CTO, SAP Security Evangelist

CTO of ERPScan. President of EAS-SEC.org, an organization focused on enterprise application cyber security. He has been recognized as R&D Professional of the Year by 2013 Hot Companies and Entrepreneur of the Year at 2013 Golden Bridge Awards. His expertise covers the security of enterprise business-critical software like ERP, CRM, SRM, and industry specific solutions from SAP and Oracle.

He has published 12 whitepapers on SAP security, and they include the golden award-winning “SAP Security in Figures” at the Global Excellence Awards by InfoSecurity Product Guide. It is the first research ever about the current situation of SAP security.

Alexander presented his research on SAP Cyber Security at more than 60 conferences held in more than 20 countries across all continents. He has held customized trainings for the CISOs of Fortune 2000 companies, including private trainings for SAP SE.


Alexander is engaged in creating ERPScan Security Monitoring Suite for SAP, an internationally acclaimed corporate solution, covering all areas of SAP security. His work with SAP Product Security Response Team started with finding vulnerabilities, with more than 200 issues discovered, it has led to an official partnership with SAP SE.