The threat to the company data and applications has steadily increased over the period of last 10 years. That’s why the demand for consultants who can help protect vital data has reached all time high.SAP is dedicated to developing the most secure enterprise software, for them it’s a never ending process, where CHANGE is the only constant.

SAP Security is the first and foremost concern in any SAP audit. When a company first receives SAP it is almost devoid of all security measures. When implementing SAP a company must go through an extensive process of outlining their processes and then building their system security from the ground up to ensure proper segregation of duties and proper access.

Through security you are able to monitor who has access to what data and processes and ensure that there is sufficient segregation of duties so as to prevent someone from perpetrating fraud. One of the major advantages of SAP is that it can be programmed to perform various audit functions for you.

SAP solutions are actually built from the basic level to assure the highest level security in the most sensitive environments.

SAP Security training is designed to help you set up the authorization environment in the customer system using Profile Generator. With this course participant will understand the concepts of the security in SAP applications, which can be used to build a strong knowledge base on security so that it can be used for further developing security or any of the new SAP application. For new employees it is important that their access is set up properly and that future access granted has proper approval

People of this skill are highly in demand by the project managers for all stages of the implementation.


  1. Please note that VPN is used for SAP Server Connectivity. This VPN has been tested on Apple and Windows OS (Operating Systems). IIBS will help you to troubleshoot but IIBS does not guarantee to fix all of your computer problems. Your virus protection, your computer internal policies need to be changed by you.
  2. Apple computers and Operating System generally works but IIBS support mainly Windows Operating Systems. Please note Windows XP generally works but is no longer in the supported platform.

Course Contents:

Competency Topic
AIS & other Security monitoring tools Audit Log
Configure AIS
Cryptography and Encryption Certificates
Digital signatures
Internet Transaction Server Security Internet Transaction Server Security
Network Basics Firewalls and DMZ
Network ports
Protecting System Services Protect System Services, Background processing and spool
Protect tables and programs
SAP R/3 Authorization Concept Authorization in Role administration
Authorization objects
Role administration using PFCG
User Buffer / Roles
Securing Systems through user, role and authorization maintenance Applications-, WebFlow-, ChangeTables Logs
Protect tables and transaction codes
System Parameters
User Information System
Single Sign-On PAS
SAP Logon Tickets
Tools for conducting security audits and goals for audits Security aspects to an audit
Tools for an audit / questions
Web-AS Security Enterprise Portal Security
Load Balancing

To know about SAP Security – FAQ, certification and course outline, please visit the links below:

Course Outline

SAP Training, SAP Training Toronto, SAP Training Mississauga, SAP Security training