31 August 2019
Information Technology - SAP Training and Cyber Security
SAP Business Suite
SAP Business Suite is a bundle of business applications that provide
integration of information and processes
SAP Business Suite is based on SAP‘s technology platform called NetWeaver. Thanks to its modular structure, SAP Business Suite gives customers a wide variety of applications. SAP Business Suite not only offers end-to-end processes for all industries, but also provides industry-specific applications. These applications are based on business processes that occur regularly in certain industries. Together with partners and customers, SAP integrated value scenarios into the suite and preconfigured certain applications.
Applied Cryptography: This topic will focus on cryptographic algorithms (symmetrical and asymmetrical), their strengths and weaknesses, implementations and choosing the correct cryptographic algorithm for a specific task.
Penetration Testing and Vulnerability Assessment: This topic will focus on planning, executing and evaluating penetration tests. The course will introduce basic concepts and will focus on hands-on work with penetration testing tools used in the real world.
Digital Forensics: After a short introduction to the secure-analyze-present model that’s standard in digital forensics, student will start with dead-disk forensics and its standard techniques such as file carving.
Incident Handling & Response: In this topic, we will focus on recognizing incidents, detecting, analyzing and mitigating attacks, as well es gathering critical information.
Malware Analysis/Reverse Engineering: Techniques, tools and methods for reverse engineering will be taught in this topic. Students will learn to perform static and dynamic code analysis as well as analysis of network communications.
Wireless Networks Security: This topic will focus on wireless security protocols, their known weaknesses and attacks, as well as general threats and risks.
Social Engineering: Techniques for obtaining passwords and other protected data by social manipulation will be taught in this topic. Special consideration will be given to spear phishing attacks, i.e. fake e-mails tailored to one recipient or a small group of recipients
SCI - Stephan Consulting International - Chappe Institute
Students up 4th semester, undergraduates, young graduates
A hands-on training to be prepared better for the future job career
Depends on university, if they recognize the training as part of the committed internship training
EUR 2680: Including training, accommodation BB in double rooms, airport group transfer, professional excursion, accident and liability insurance
Not included is flight, visa and health insurance