Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

SAP Security Training

Discover vulnerabilities through the eyes of an attacker

In today's digital landscape, SAP systems form the backbone of critical business operations for enterprises worldwide. Yet, these complex environments frequently harbor vulnerabilities that could leave your organization exposed to serious security risks. Our intensive, hands-on SAP Security Training equips you with the specialized knowledge and practical skills needed to identify, understand, and remediate these vulnerabilities before attackers can exploit them.

Unlike theoretical courses that merely cover security concepts, our training puts you in the mindset of an attacker, revealing how SAP systems are actually compromised in real-world scenarios. You'll work with the same tools and techniques used by both security professionals and malicious actors, gaining invaluable experience that can be immediately applied to strengthen your organization's security posture.

Why Choose Our SAP Security Training

Our specialized training stands apart by offering a practical, real-world approach to SAP security. We've carefully designed this program based on years of experience conducting SAP security assessments, penetration testing, and vulnerability research across hundreds of enterprise environments. This unique perspective ensures you're learning actual attack vectors and defense strategies that matter in today's threat landscape.

🔍

Attacker's Perspective

See SAP through the eyes of an attacker and understand the sophisticated techniques used to compromise systems. This unique viewpoint reveals security gaps that standard security reviews might miss, enabling you to build more effective defenses.

🛠️

Hands-on Experience

Theory alone isn't enough. Our training emphasizes practical, hands-on exercises in a controlled lab environment. You'll work with real tools and techniques to discover, exploit, and mitigate vulnerabilities across different SAP components and architectures.

🔄

Comprehensive Coverage

Modern SAP environments are complex ecosystems. Our training covers security aspects across ABAP, Java, S/4HANA, Fiori, and Cloud components, ensuring you gain a holistic understanding of threats throughout the entire SAP landscape.

Immediate Application

Every technique and concept taught can be applied immediately in your own environment. You'll leave with actionable strategies, custom scripts, and verification methods that can be implemented right away to enhance your SAP security posture.

🏆

Industry Recognition

Our "SAP Security Administration and Security Core Concepts" course has been selected for the prestigious Udemy Business collection—an achievement reached by only 3% of all courses. This recognition reflects the exceptional quality and relevance of our training materials.

👨‍🏫

Expert Instructors

Learn directly from security researchers who have identified over 150 vulnerabilities in ERP systems and presented their findings at leading security conferences worldwide. Our instructors bring real-world experience that bridges the gap between theory and practical application.

Comprehensive Course Agenda

Our meticulously structured two-day program balances theoretical knowledge with extensive hands-on exercises. The training is organized as a progressive journey through the SAP security landscape, covering all critical components and attack vectors that security professionals need to understand.

Day 1: ABAP Stack Security
Day 2: Java Stack & Advanced Topics
10:00 - 11:30 CET

VA/PT/TM/Tools

We begin by establishing the fundamental methodologies for security assessment. You'll learn the critical differences between Vulnerability Assessment, Penetration Testing, and Threat Modeling specifically for SAP environments. This module also covers essential security tools used throughout the training. This foundation ensures you can properly scope and execute security evaluations within your organization.

11:45 - 13:00 CET

Attack on SAP ABAP

This session explores common and advanced vulnerabilities in SAP ECC, S/4HANA, Business Suite, and NetWeaver AS ABAP. Through hands-on exercises, you'll learn to identify security issues in transaction codes, custom programs, and authorization configurations. You'll practice exploiting these vulnerabilities in a controlled environment and develop effective mitigation strategies.

13:00 - 13:45 CET

Lunch Break

13:45 - 14:45 CET

Vuln. Exploitation

This module takes a deep dive into vulnerability exploitation techniques specific to SAP systems. You'll learn about attack vectors such as RFC callback attacks, debug mode exploitation, and privilege escalation through SAP processes. The session combines theory with practical demonstrations of how attackers leverage these vulnerabilities to compromise SAP systems.

15:00 - 16:00 CET

Enqueue/MS issues

The final session of Day 1 focuses on the SAP Enqueue Server and Message Server components, which are critical for SAP system operations but often overlooked in security assessments. You'll learn about potential security issues with these components, including how attackers can bypass SAP ABAP lock functionality through "phantom attacker" techniques, and how to properly secure these services.

10:00 - 11:30 CET

Attack on SAP NW Java

Day 2 begins with a deep dive into the Java stack of SAP NetWeaver. This session covers critical vulnerabilities including authentication bypasses, directory traversals, and Java deserialization attacks. You'll gain hands-on experience exploiting these vulnerabilities and implementing effective countermeasures to protect your Java-based SAP applications.

11:45 - 13:00 CET

Fiori, OData, and UI5 Security

Modern SAP interfaces bring new security challenges. This module focuses on vulnerabilities in Fiori applications, OData services, and UI5 implementations. Through practical exercises, you'll learn to identify and exploit weaknesses in these interfaces, including injection flaws, broken access controls, and API vulnerabilities, along with proven remediation techniques.

13:00 - 13:45 CET

Lunch Break

13:45 - 14:45 CET

P4 exploitation & SAP Cloud Connector

This session covers two critical components of modern SAP landscapes. First, you'll learn about exploiting vulnerabilities in SAP's proprietary P4 remote method invocation technology. Then, the session explores security issues in SAP Cloud Connector, which is used to securely connect cloud applications with on-premises systems. You'll gain hands-on experience identifying and mitigating these vulnerabilities.

15:00 - 16:00 CET

Forensic Tricks

The training concludes with essential forensic techniques for SAP environments. You'll learn 5 basic techniques to identify compromises and threats, including detecting malicious JSP/JSPX files, finding unsigned files, analyzing auto-start components, monitoring request frequency, and identifying suspicious authentication attempts. This module provides practical approaches to incident response specifically tailored for SAP systems.

Learn from Industry-Leading Experts

The quality of security training depends heavily on the expertise of the instructors. Our trainers aren't just educators—they're active security researchers and practitioners with extensive experience identifying vulnerabilities in enterprise SAP environments. Their practical knowledge of current attack techniques and mitigation strategies ensures you receive the most relevant, up-to-date security training available.

SAP Security Research Team

Led by Senior SAP Security Researchers

Our lead instructors have been conducting SAP security research since 2010, identifying over 150 vulnerabilities in ERP systems and collaborating with organizations worldwide to improve their security posture. This practical experience informs every aspect of the training, ensuring you learn real-world techniques that address actual threats.

Our team members are regular presenters at prestigious international security conferences, including:

  • BlackHat (Singapore 2016, 2025)
  • BlackHat Saudi Arabia (2023)
  • Defcon (2021)
  • Troopers (2015, 2016, 2017)
  • OWASP (2012, 2015, 2018)
  • NorthSec (2022)
  • Hack In Paris (2022)

This combination of deep technical expertise and teaching experience creates an exceptional learning environment where complex security concepts become accessible and immediately applicable to your daily work.

Customized Training for Enterprise Teams

For organizations looking to train multiple team members or address specific security challenges, we offer comprehensive on-site training options tailored to your unique environment. On-site training provides several advantages, including customized content focusing on your specific SAP landscape, confidential discussion of your actual security concerns, and team-building opportunities as your staff works together to improve security practices.

Tailored Content

We customize the training material to address the specific SAP modules, versions, and configurations in your environment, ensuring maximum relevance and immediate applicability.

Comprehensive Materials

All participants receive extensive documentation, lab guides, custom scripts, and tools that can be referenced long after the training concludes.

Extended Support

On-site training includes 90 days of email support, allowing your team to ask follow-up questions as they implement new security measures.

Environment Assessment

As part of the training, we can conduct a high-level security assessment of your SAP landscape, identifying potential vulnerabilities and providing specific remediation guidance.

Contact us for custom pricing and to discuss how we can tailor our training to meet your organization's specific security objectives.

Register for Upcoming Training Sessions

Take the next step in strengthening your SAP security expertise by joining one of our upcoming training sessions. Our June 2025 schedule offers multiple opportunities to participate in this comprehensive security program. Early registration is recommended as sessions often reach capacity quickly.

June 16-17 2025
Limited Seats

For more information or to secure your place in an upcoming session, please contact us at [email protected]. Our team will assist with registration details and answer any questions about the training program.

Please enable JavaScript in your browser to complete this form.

Registrant Information

Registrant's Name

Course Information

Training Options

Explore More

SAP Security Patch Day RedRays

SAP Security Patch Day – May 2025

On May 13, 2025, SAP released its monthly Security Patch Day updates, addressing 18 new vulnerabilities across various SAP products and components.

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.