Overview
This course covers the following learning outcomes and goals: understanding SAP security threats, practical threats, target attacks, broad attacks, honeypots, types of honeypots, and the goals of HoneySAP.
Individual skills and tools taught include setting up honeypots, utilizing different components of HoneySAP such as Datastore, Message Server, HTTP Services, Binary Services, Virtual Services, and Forward Traffic, as well as addressing performance and security challenges.
The teaching method of the course includes a combination of theoretical explanations, practical demonstrations, and challenges to enhance learning.
The intended audience for this course includes cybersecurity professionals, IT professionals, and individuals interested in SAP security and honeypot technologies.
Syllabus
Introduction
What is SAP
SAP security
Threats to SAP
Practical threats
Target attacks
Broad attacks
Landscape
What do we have
What do we need
What are honeypots
Types of honeypot
Goals of honeypot
Other honeypots
HoneySAP
Goals
Agility
Easy deployment
Components
Datastore
Message Server
HTTP Services
Binary Services
Virtual Services
Forward Traffic
Integration
Standard feeds
External profile
Honeypot demo
Challenges
Performance
Security Challenges
Sharing Information
Open Source
New Source of Information
Taught by
WEareTROOPERS