SAP Cyber Security

SAP Cyber Security beyond Segregation of Duties - learn how to earn a 6-digit salary in the new cybersecurity market
4.3 (36 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,032 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 23
  • Length 3 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2016 English

Course Description

Hey SAP Security wannabes,

Stop spending your time on old-school “SAP Security” trainings! Of course, 

segregation of duties and access control are important but we are in 2016 

now! All the top consulting companies now offer SAP Cyber Security services 

and CISOs from Fortune 2000 companies want to know more about REAL 

SAP Security, how hackers can compromise their systems and how to secure 

them.

Cyber-Security market is estimated 70 billion dollars and expected to grow 170 

billion dollars by 2020. Taking into account that SAP is one of the most important 

systems, the SAP Cyber-security will be a big part of this pie. 

Before this course, this information was only available for a few companies. Now 

you can learn it from one of the world-known experts in this area and extend your 

knowledge in IT or SAP and be a much more competitive employee in the market.

For IT Security guys:

If you have no idea what SAP is but want to know why it's an important topic, this 

course is for you! Here are some noteworthy things:

Interest in SAP security is growing exponentially and the numerous 

attacks play a significant role in driving this interest. Take, for example, 

the recent breaches revealed in SAP system of a government contractor 

USIS. SAP systems and business-critical applications store the most critical 

corporate data that can at some point be used for espionage, sabotage or 

fraudulent purposes.

Analysts from different firms such as Gartner, IDC, 451Research, KuppingerCole and 

Qoucirca agreed on the significant importance of ERP security tests and 

lack of this functionality in traditional tools. 

Top consulting companies have already included ERP security services in 

their portfolio. 

But are you prepared for changes and do you have qualified expertise to 

address growing ERP Security market?


Agenda

I will start with the history of SAP Cyber Security and why and how SAP Cyber 

security differs from IT Security. Then I will show the most critical risks for 

organizations. After that we will be able to understand details of all the SAP 

Systems such as ABAP or HANA and their vulnerabilities. To prove the importance, 

I will also show examples of the real attacks on SAP Systems. Finally, we will 

spend the rest of the time on learning how to secure SAP Systems from different 

angles from secure coding and SoD to vulnerability management and threat 

detection.

What are the requirements?

  • Basic IT Security background
  • Desire to learn more about the next big thing

What am I going to get from this course?

  • Answer to the question how SAP Cyber Security differs from SoD
  • 13 risks for different SAP Systems to speak the same language with owners
  • Technical details of ABAP, JAVA, HANA, Mobile platforms security
  • Recommendations on how to secure SAP Systems
  • 50-page guideline to analyze SAP Systems security

What is the target audience?

  • CISO's and Security managers
  • IT Security Engineers
  • SAP BASIS Administrators
  • SAP Security engineers
  • Cybersecurity Consultants / auditors
  • Penetration testers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction to SAP
05:17

Why i think that SAP Cyber-Security is important 

Lesson1 Quiz
3 questions
Introduction to SAP
17:01
Lesson2 Quiz
10 questions
07:06

Learn why people started to care about SAP Cyber Security and how the situation has changed since 2006

Lesson3 Quiz
2 questions
09:30

I’ll show you how SAP Security differs from traditional IT security and what kind of unique features and myths are there

Lesson4 Quiz
4 questions
Section 2: SAP Risks
21:30

the most comprehensive list of risks affecting different organizations across all industries that use SAP solutions from ERP to Portal

Lesson5 Quiz
7 questions
Section 3: SAP Vulnerabilities
02:08

Learn how the number of SAP vulnerabilities reached 3000th barrier and will continue to grow

Lesson6 Quiz
2 questions
12:46

The most important notes about ABAP platform, its architecture, vulnerabilities, and trends

Lesson7 Quiz
3 questions
03:48

The most important notes about J2EE platform,  its architecture,  vulnerabilities, and trend

Lesson8 Quiz
2 questions
04:25

The most important notes about SAP Business Objects platform, its architecture, vulnerabilities, and trends

Lesson9 Quiz
2 questions
05:02

The most important notes about SAP HANA  platform security, its vulnerabilities, and trends

Lesson10 Quiz
2 questions
07:06

The most important notes about SAP Mobile platform, its vulnerabilities, and trends

Lesson11 Quiz
3 questions
Section 4: SAP Security Incidents
08:02

If you still think that SAP is not a juicy target for cyberattacks and there were no incidents, sorry, I’ll disappoint you. You will learn lessons from 5 the most interesting examples

Lesson12 Quiz
5 questions
05:28

Learn The key takeaways from USIS Data breach - the biggest breach in the history of SAP Securityy

Lesson13 Quiz
3 questions
Section 5: SAP Security landscape
05:37

learn what SAP Security is within less than 5 minutes

Lesson14 Quiz
3 questions
15:41

Introduction to Segregation of Duties, SOX compliance, and access control

lesson15 quiz
4 questions
10:28

You will learn what kind of issues an uncontrolled customization of SAP programs can cause

lesson16 quiz
4 questions
Application Platform security
15:05
lesson17 quiz
5 questions
Section 6: Securing SAP Systems
02:10

this chapter will shed a light on how you can secure your systems from all issues step by step

lesson18 quiz
2 questions
05:26

Learn how you can easily start SAP Cyber Security audit and what’s the difference between SAP Pentesting and SAP Security Audit & Vulnerability Assessment

lesson19 quiz
2 questions
05:36

Today your system is secure, tomorrow it won’t. Everything is changing - how can you survive in this environment?

4 questions

02:09

How to identify if your system was compromised and monitor malicious activity

lesson21 quiz
4 questions
02:53

Learn how to configure your workflow to automatically respond to attacks and quickly remediate vulnerabilities

lesson22 quiz
2 questions
04:25

Most important takeaways and lessons learnt

lesson23 quiz
2 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Alexander Polyakov, CTO, SAP Security Evangelist

CTO of ERPScan. President of EAS-SEC.org, an organization focused on enterprise application cyber security. He has been recognized as R&D Professional of the Year by 2013 Hot Companies and Entrepreneur of the Year at 2013 Golden Bridge Awards. His expertise covers the security of enterprise business-critical software like ERP, CRM, SRM, and industry specific solutions from SAP and Oracle.

He has published 12 whitepapers on SAP security, and they include the golden award-winning “SAP Security in Figures” at the Global Excellence Awards by InfoSecurity Product Guide. It is the first research ever about the current situation of SAP security.

Alexander presented his research on SAP Cyber Security at more than 60 conferences held in more than 20 countries across all continents. He has held customized trainings for the CISOs of Fortune 2000 companies, including private trainings for SAP SE.


Alexander is engaged in creating ERPScan Security Monitoring Suite for SAP, an internationally acclaimed corporate solution, covering all areas of SAP security. His work with SAP Product Security Response Team started with finding vulnerabilities, with more than 200 issues discovered, it has led to an official partnership with SAP SE.

Ready to start learning?
Take This Course