SECURITY

SECURITY

Inductions

The threat to the company data and applications has steadily increased over the period of last 10 years. That’s why the demand for consultants who can help protect vital data has reached all time high.SAP is dedicated to developing the most secure enterprise software, for them it’s a never ending process, where CHANGE is the only constant. SAP Security is the first and foremost concern in any SAP audit. When a company first receives SAP it is almost devoid of all security measures. When implementing SAP a company must go through an extensive process of outlining their processes and then building their system security from the ground up to ensure proper segregation of duties and proper access.

Through security you are able to monitor who has access to what data and processes and ensure that there is sufficient segregation of duties so as to prevent someone from perpetrating fraud. One of the major advantages of SAP is that it can be programmed to perform various audit functions for you. SAP solutions are actually built from the basic level to assure the highest level security in the most sensitive environments.

SAP Security training is designed to help you set up the authorization environment in the customer system using Profile Generator. With this course participant will understand the concepts of the security in SAP applications, which can be used to build a p knowledge base on security so that it can be used for further developing security or any of the new SAP application. For new employees it is important that their access is set up properly and that future access granted has proper approval. People of this skill are highly in demand by the project managers for all stages of the implementation.

Notes:

  • Please note that VPN is used for SAP Server Connectivity. This VPN has been tested on Apple and Windows OS (Operating Systems). IIBS will help you to troubleshoot but IIBS does not guarantee to fix all of your computer problems. Your virus protection, your computer internal policies need to be changed by you.

  • Apple computers and Operating System generally works but IIBS support mainly Windows Operating Systems. Please note Windows XP generally works but is no longer in the supported platform.

Course Contents:

Competency

Topic

AIS & other Security monitoring tools

Audit Log

Configure AIS

Monitoring

Cryptography and Encryption

Certificates

Cryptography

Digital signatures

SNC

TCS

Internet Transaction Server Security

Internet Transaction Server Security

Network Basics

Firewalls and DMZ

Network ports

SAPRouter

Protecting System Services

Protect System Services, Background processing and spool

Protect tables and programs

SAP R/3 Authorization Concept

Authorization in Role administration

Authorization objects

Role administration using PFCG

User Buffer / Roles

Securing Systems through user, role and authorization maintenance

Applications-, WebFlow-, ChangeTables Logs

Protect tables and transaction codes

System Parameters

User Information System

Single Sign-On

PAS

SAP Logon Tickets

Tools for conducting security audits and goals for audits

Security aspects to an audit

Tools for an audit / questions

Web-AS Security

Enterprise Portal Security

Load Balancing

SSL

To Know about SAP SECURITY certification and FAQ please visit the below link

White paper

http://iibs.ca/knowledge-updates/security/

Certifications

http://iibs.ca/certifications/

SAP Training, SAP Training Toronto, SAP Training Mississauga,SAP ABAP