sap-training-courses

SAP Enterprise Threat Detection Fundamentals

Skills Gained This course will prepare you to: -Understand what SAP Enterprise Threat Detection is, what it does -and how it works -Have a basic understanding of technical components, system...

Read More
$2,601 USD
Course Code SECETD-v002
Duration 3 days
Available Formats Virtual, Classroom
5784 Reviews star_rate star_rate star_rate star_rate star_half
Course Image

Skills Gained

  • This course will prepare you to:
       -Understand what SAP Enterprise Threat Detection is, what it does
       -and how it works
       -Have a basic understanding of technical components, system
       -connections and setup options
       -Get a detailed view into the different log data especially coming
       -out of the SAP ERP systems
       -Understand how to ingest non-pre-learned/non-SAP log data into ETD
       -Understand the semantic data model of ETD, i.e. semantic log events
       -and semantic attributes
       -Get a detailed understanding how to process alerts in ETD
       -Get a detailed understanding how to do Security Analysis in ETD and
       -Threat Hunting

Who Can Benefit

  • SAP Security Analyst/Specialist/Expert
  • IT Security Analyst/Specialist/Expert
  • Inhouse Security Response Team member
  • Security & Compliance Responsible
  • System Administrator
  • System Architect
  • Technology Consultant

Prerequisites

  • Essential:
       -none

Course Details

Course Content

  • Introduction
  • Technical Overview – Solution Architecture
  • Technical Overview – Log Sources
  • Semantic Data Model
  • Technical Overview – System Landscape, Sizing and High
  • Availability
  • Readiness Checks and Troubleshooting/Monitoring (Hana Cockpit-
  • Tools/Smart Data Streaming)
  • Pattern Creation Introduction
  • Technical Overview – High Availability, Log-Loss Prevention,
  • Pattern Replay
  • Integration Scenarios - 3rd Party to ETD
  • Integration Scenarios - ETD to 3rd Party
  • Onboarding Lifecycle Overview
  • Alert Processing
  • Business Process Threat Patterns
  • Pseudonymization of User Data
  • Monitoring Dashboard
  • Compliance (Retention period, ETD logs, Who did what in ETD?)
  • Good Practices on Onboarding Lifecycle
  • Read Access Logging and UI logging as Special Log Sources
  • Pattern Building Best Practices
  • Custom Extensions
  • Possible role-play with exchanging roles, one group of participants acting as attackers, the other group acting as defenders. >

Course based on software release

  • SAP Enterprise Threat Detection installed on a HANA in Memory Database plus an S4H ERP system
Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward