Financial Management Blogs by Members
Dive into a treasure trove of SAP financial management wisdom shared by a vibrant community of bloggers. Submit a blog post of your own to share knowledge.
Showing results for 
Search instead for 
Did you mean: 
Active Contributor
We are hearing a new buzz word ‘Cybersecurity’ during this Pandemic time; in this blog we will talk about learning materials on Cybersecurity and knowledge required about the topic.

First of all thanks to Hasso Plattner Institute for Digital Engineering gGmbH (HPI), Professor Dr. Christoph Meinel and his team for the wonderful course on the topic which made us aware more about Cybersecurity in the internet.

With the technology improving every day, number of smart/IoT devices which connects to internet has increased progressively. Internet has become one of the basic needs in addition to Food, Clothing and Shelter.

Lacking in Knowledge and awareness - many times we are not aware about the security and features of internet devices / software products which we use in day-to-day and ways to protect us from Cyber-attacks.

Cybersecurity Basics – Exam’ which covers questions from courses

  • Confidential Communication in the Internet

  • Digital Identities

  • Cyberthreats by Malware

Details of the course can be found in -
Below are the list of topics and study time for each topic

Course Topics Covered Study Time
Confidential Communication in the Internet

  • Potential for Damage

  • Security Goals

  • Cryptography

  • Traditional Symmetric Procedures

  • Data Encryption Standard

  • Advanced Encryption Standard

  • Hash-Functions

  • Asymmetrical Procedures

  • Cryptographic Protocols

  • Attacks on Cryptographic Protocols

  • Encryption

  • Hybrid Encryption

  • Digital Signature

  • Feasible Digital Signatures

  • Trust-Problem

  • Trust-Model

  • Public Key Infrastructure

  • Digital Certificates

  • Certificate Standards

  • PKIs in the Internet

  • Crypto patents and standards

  • Crypto-Products

  • GPG

9 Hours
Digital Identities

  • What is a Digital Identity?

  • Identity Management and Identity Provider

  • ID Provider Models: Isolated and Centralized

  • ID Provider Models: Decentralized and Federalized

  • Authentication Methods: Knowledge, Ownership, Biometrics, Behavior

  • Secure Communication with Kerberos

  • Secure Authentication with OpenID Connect

  • Authentication by Digital Signatures with Public Key Infrastructures

  • FIDO

  • Data Collection of Online Services

  • Identity Theft − Attacks on Digital Identity

  • Identity Theft − Social Engineering Attacks on Users

  • Identity Theft − Social Engineering Attacks on Providers

  • Password Security − Authentification usings Passwords

  • Password protected Accounts − Weak Passwords

  • Attacks on Passwords: Guessing, Cracking, Sniffing

  • Password Length and its Importance

  • Strong Passwords

  • Password Manager

  • One−Time Passwords

9 Hours
Cyberthreats by Malware

  • Introduction: Cyberthreats by Malware

  • Internet – a Popular Target

  • Nowaday's Internet

  • Attackers and their Motivation

  • Most Common Attacks

  • Malware

  • Malware: Its Way to your Computer

  • Technical Failures

  • Human Factors

  • Short History of Cybercrime

  • Virus, Worm, Trojan

  • Botnets

  • Rootkits and Backdoors

  • Adware and Spyware

  • Scareware and Rogueware

  • Ransomware

  • Keylogger

  • Emotet

  • Carberp

  • Protective Measures

9 Hours


After spending 27 Hours of study + 2 Hours of exam has made a big impact in day-to-day things by being cyber secured in every aspect professionally and personally.

“The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and  Resilience. Do remember: "Cybersecurity is much more than an IT topic.”
- Stéphane Nappo


Top kudoed authors