Overview
This course covers the following learning outcomes and goals: understanding the importance of protecting SAP systems, identifying risks associated with SAP custom code and subsystems, learning about security compliance and best practices for securing SAP systems, and gaining knowledge on creating new users, custom code statistics, benchmarks, and total control of SAP systems. The course teaches individual skills such as assessing security risks, implementing security measures, and analyzing custom code statistics. The teaching method includes lectures, slides, and interactive discussions. The intended audience for this course includes IT professionals, cybersecurity specialists, and individuals responsible for SAP system security.
Syllabus
Introduction
Overview
About us
Why should we protect SAP
SAP Custom Code
SAP Subsystems
Biggest Risk
Statistics
Security Compliance
Total Control
Owning an sap system
Creating a new user
Custom code statistics
Best practices
Benchmarks
Questions
Taught by
WEareTROOPERS