Information Systems Workshop


Information Systems Workshop:
Part 1: SAP Business Suite
Part 2: Data and Cyber Security

Duration:  10 Seminar Days
Venue: Leipzig, Germany
Price: 1000 € for 10 seminar days.
If you prefer an all in arrangement, including course fees, travel and accommodation please inquire at SCI Stephan Consulting International

Contact us by email if you want to join us in this workshop!

Contents part 1:

SAP Business Suite

SAP Business Suite is a bundle of business applications that provide • integration of information and processes, • collaboration, • industry-specific functionality • scalability.
SAP Business Suite is based on SAP‘s technology platform called NetWeaver. Thanks to its modular structure, SAP Business Suite gives customers a wide variety of applications.
SAP Business Suite not only offers end-to-end processes for all industries, but also provides industry-specific applications. These applications are based on business processes that occur regularly in certain industries. Together with partners and customers, SAP integrated value scenarios into the suite and preconfigured certain applications.

Contents part 2:

Applied Cryptography
This topic will focus on cryptographic algorithms (symmetrical and asymmetrical), their strengths and weaknesses, implementations and choosing the correct cryptographic algorithm for a specific task.

Multi-Language Secure Coding
In this topic, we will focus on coding and design techniques to reduce security exposure. Special consideration will be given to buffer overflows and input sanitizing.

Digital Forensics + Mobile forensics
After a short introduction to the secure-analyze-present model that’s standard in digital forensics, students will start with dead-disk forensics and its standard techniques such as file carving. This topic will also contain live forensics, on single computer systems as well as in networks.

Wireless Networks Security
This topic will focus on wireless security protocols, their known weaknesses and attacks, as well as general threats and risks.

Social Engineering
Techniques for obtaining passwords and other protected data by social manipulation will be taught in this topic. Special consideration will be given to spear phishing attacks, i.e. fake e-mails tailored to one recipient or a small group of recipients.

Penetration Testing and Vulnerability Assessment
This topic will focus on planning, executing and evaluating penetration tests. The course will introduce basic concepts and will focus on hands-on work with penetration testing tools used in the real world.